Previous Topic: Standalone Mode with the SiteMinder Connector at the Relying PartyNext Topic: Information Required by the Configuration Wizard


Deployment with the CA SiteMinder® Connector at the Asserting Party

At the asserting party, CA SiteMinder® Federation Standalone configured with the CA SiteMinder® Connector can use CA SiteMinder® for user authentication. After a successful authentication, the user must be redirected back to CA SiteMinder® Federation Standalone, which issues an assertion.

At the asserting party, CA SiteMinder® authenticates a user and then issues an SMSESSION cookie. When the user is sent back to CA SiteMinder® Federation Standalone, the presence of the SMSESSION cookie triggers the creation of the FEDSESSION cookie. The deployment mode (proxy or standalone) is not relevant in this case.

Note: If CA SiteMinder® Federation Standalone is operating in standalone mode, CA SiteMinder® Federation Standalone and the CA SiteMinder® Web Agent need to share the same cookie domain.

In a deployment with CA SiteMinder®, the user has to visit CA SiteMinder® first to authenticate. After authentication is successful, the web resource protected by CA SiteMinder® must send the user back to CA SiteMinder® Federation Standalone. A deployment with the CA SiteMinder® Connector is not the same as the CA SiteMinder® Federation Standalone feature called delegated authentication, which also allows a web access management system like CA SiteMinder® to handle user authentication. What distinguishes delegated authentication from a CA SiteMinder® Connector deployment without delegated authentication is that the user does not have to initiate authentication at CA SiteMinder®.

Delegated authentication lets CA SiteMinder® Federation Standalone initiate an authentication request and then redirect the user to CA SiteMinder®, enabling the redirect to occur automatically, assuming the feature is properly configured. To redirect the user back to CA SiteMinder® Federation Standalone after a successfully authenticating the user, the resource that CA SiteMinder® protects must be configured with a mechanism to redirect the user back to CA SiteMinder® Federation Standalone. The redirect must include all data that the protected resource received. For example, if the SiteMinder-protected resource received several query parameters from the initial authentication request, it must redirect the user back to CA SiteMinder® Federation Standalone with these same query parameters.

The following figure shows an architecture using the CA SiteMinder® Connector at the asserting party.

Graphic showing the deployment of the federation system with SiteMinder Connector at the asserting party

The previous figure shows the following communication flow at the asserting party:

  1. A user requests a federated resource, which triggers an authentication request to the CA SiteMinder® Web Agent at the asserting party.
  2. The authentication request is forwarded to the CA SiteMinder® Policy Server.
  3. The Policy Server authenticates the user and generates a CA SiteMinder® session ticket. The ticket is returned to the CA SiteMinder® Web Agent, which creates an SMSESSION cookie that contains this ticket.
  4. The Web Agent passes the SMSESSION cookie to the user's browser along with a redirect response to CA SiteMinder® Federation Standalone.
  5. The user's browser with the SMSESSION cookie is redirected to CA SiteMinder® Federation Standalone.
  6. CA SiteMinder® Federation Standalone contacts the CA SiteMinder® Policy Server to validate the SMESSION cookie.
  7. After successful validation of the SMSESSION cookie, the CA SiteMinder® Federation Standalone session gets created. CA SiteMinder® Federation Standalone then handles the rest of the federated communication to the relying party where the target resource resides.