Previous Topic: Assertion Processing Customization (Relying Party)Next Topic: Single Sign-on Configuration (Relying Party)


Single Sign-on Configuration

This section contains the following topics:

Single Sign-on Configuration (Asserting Party)

Single Sign-on Configuration (Relying Party)

Assertion Validity for Single Sign-on

Session Validity at a Service Provider

Status Redirects for HTTP Errors (SAML 2.0 IdP)

SAML 2.0 Entities Allowed to Initiate Single Sign-on

Back Channel Authentication for Artifact SSO

How to Enable SAML 2.0 Attribute Query Support

How to Retrieve User Attribute Values from a Third-Party Source

How to Get User Consent to Send an Assertion

Enhanced Client or Proxy Profile Overview (SAML 2.0)

IDP Discovery Profile (SAML 2.0)

SAML 2.0 HTTP-POST Binding Configuration

Single Sign-on Configuration (Asserting Party)

When you configure single sign-on at the asserting party, you specify how the asserting party delivers an assertion to a relying party.

Only one single sign-on session is persisted in a browser. The session information is stored in the FEDSESSION cookie. If you access another partnership in the same browser, the FEDSESSION cookie is not valid, unless the underlying user directory is the same as the previously accessed partnership during the same browser session.

The FEDSESSION cookie uses the following timeout settings:

You cannot change these timeout settings in UI.

Follow these steps:

  1. Begin at the appropriate step in the Partnership wizard.
    SAML 1.1

    Single Sign-On

    SAML 2.0

    SSO and SLO

    Note: Click Help for a description of fields, controls, and their respective requirements.

  2. Select an option for the Authentication Mode in the Authentication group box.
    Authentication Mode

    Select Local or Delegated

    • Click Local if the federation system is handling user authentication.
    • Click Delegated if a third-party web access management (WAM) system is handling user authentication.
  3. Select the Authentication Type for the authentication mode you chose. The options change depending on whether you are using local or delegated authentication.
    Local Authentication Type (Local Mode only)

    Select Basic or Form based

    If you are using CA SiteMinder® Federation Standalone that is localized for Japanese or French users, select Forms based authentication scheme. Basic authentication is not supported for localized users.

    For forms authentication, sample log-in forms are available for Japanese and French. The forms are in the directory federation_install_dir/secure-proxy/proxy-engine/examples in the folders formsja (Japanese) and formsfr (French).

    To use the localized forms

    1. Navigate to federation_install_dir/secure-proxy/proxy-engine/examples.
    2. Make a backup copy of the forms folder.
    3. Rename the folder for your language (formsja for Japanese or formsfr for French) to forms.
    Delegated Authentication Type

    Select Legacy Cookie, Query String, Open-format Cookie

    Note: The open format cookie is the only FIPS-compatible option for delegated authentication.

  4. For Delegated Authentication only, configure the required parameters for the type of delegated authentication you chose.
    Legacy Cookie

    If user identity information is being passed from the third-party WAM in a cookie, configure the Delegated Authentication URL. This URL redirects the request to the WAM system if the user comes to CA SiteMinder® Federation Standalone first. The URL does not apply when the user visits the WAM first.

    Query String

    If user identity information is being passed from the third-party WAM in a query string, configure the following settings:

    • Delegated Authentication URL

      This URL redirects the request to the WAM system when the user comes to CA SiteMinder® Federation Standalone first. The URL does not apply when user goes to the WAM first.

    • Hash Secret
    • Confirm Hash Secret

    Open-format Cookie

    If user identity information is being passed from the third-party WAM in a FIPS-encrypted cookie, configure the Delegated Authentication URL. The open format cookie is the only FIPS-compatible option for delegated authentication. This URL redirects the request to the WAM system if the user comes to CA SiteMinder® Federation Standalone first. The URL does not apply when user goes to the WAM first.

    Note: If you select Legacy Cookie or Open-format Cookie as the Delegated Authentication Type, configure the required global cookie settings. Locate the deployment settings by navigating to Infrastructure, Deployment Settings.

  5. Complete the Authentication Class field by entering a URI for the user authentication method you want to use. This URI is placed in the AuthnContextClassRef element in the assertion to describe how a user is authenticated.

    Guidelines:

  6. Complete the required fields in the SSO group box to configure how single sign-on operates:

    Be aware of the following guidelines:

  7. Specify the URL for the Assertion Consumer Service. This service is the service at the relying party that processes received assertions.

Any values defined during the creation or import of the remote relying party are already filled in.

This procedure completes SSO configuration for the asserting party.

More information:

Assertion Validity for Single Sign-on

Delegated Authentication

Customize the Auto-POST form for HTTP-POST SSO

You can customize the auto-POST form sent to the relying party in a SAML response to improve the user experience.

To use a customized form, enter the name of the form in the Custom Post Form field of the SSO section of the SSO and SLO step of the wizard. The system uses the form you specify in the response. The product includes a form named defaultpostform.html.

Note: Enter only the name of the form, not the path to the form.

The physical page must reside in the directory federation_install_dir\customization, where federation_install_dir is the installed location of the product.

Authentication Options using Partnership Federation

Standalone partnership federation lets you select the authentication mode for federated single sign-on. You select the mode as part of the single sign-on configuration at the asserting party.