Previous Topic: Assertion Configuration at the Asserting PartyNext Topic: How to Configure Claims Transformation at the Asserting Party


How To Add Session Attributes to an Assertion

The Policy Server uses the session store to persist dynamic user information after a user is authenticated. The stored information includes authentication context information, SAML attributes, third-party IdPs that authenticate users, and claims from an OAuth authentication. The Policy Server can use this information for generating user tokens or making policy decisions.

For federated single sign-on, the Policy Server can add the attributes from the session store to an assertion to customize the requested application.

Session attributes are stored for the following deployments:

The following figure shows the steps that are required to configure session attributes and add then to assertions.

Graphic showing the steps for configuring session attributes for an assertion

Complete the following steps for session attribute support:

  1. Determine which session attributes are available.
  2. Add session attributes to the assertion configuration.
  3. Confirm the authentication mode and URL for SSO.

Determine which Session Attributes are Available

As the federation administrator, identify the session attributes used by the partnership. Work with the authentication source, such as a database or user directory so you are familiar with the available attributes.

Add Session Attributes to the Assertion Configuration

Add session attributes to the assertion configuration. The configuration is at the asserting party, such as the IdP-to-SP partnership.

Follow these steps:

  1. Log in to the Administrative UI.
  2. Navigate to the Assertion Configuration step of the partnership wizard.
  3. In the Assertion Attributes section, click Add Row.
  4. To configure a session attribute, complete the settings in the table. For example:
    Assertion Attribute

    IssuerID

    Retrieval Method

    SSO

    Format

    Unspecified

    Type

    Session Attribute

    Value

    IssuerID

    Click Help for detailed information about the attribute table.

  5. Add rows for as many entries as needed.
  6. (Optional). Select Encrypt to encrypt the attribute.
  7. Click Next to move to the SSO and SLO step.
Session Attribute Examples in the Administrative UI

The last two entries of the following graphic show examples of session attribute entries. This screen is for a SAML 2.0 partnership. The SAML 1.1 screen is similar, but the Retrieval Method and Format columns are missing. A Namespace column exists instead.

Graphic showing the Assertion Attributes table with some examples

Confirm the Authentication Mode and URL for SSO

Confirm that the partnership has the authentication mode and authentication URL set correctly.

Note: This procedure assumes that the other necessary SSO settings are configured.

Follow these steps:

  1. Navigate to the SSO and SLO step of the partnership wizard.
  2. In the Authentication section, verify the settings of the following fields:
    Authentication Mode

    Local

    Authentication URL

    This URL must point to the redirect.jsp file, for example:

    http://myserver.idpA.com/siteminderagent/redirectjsp/redirect.jsp

    myserver

    Identifies the web server with the Web Agent Option Pack or the SPS federation gateway. The redirect.jsp file is included with the Web Agent Option Pack or SPS federation gateway that is installed at the asserting party.

  3. Navigate to the Confirm step and click Finish.