To configure an attribute
The SAML Service Provider Attribute dialog box opens.
The options are:
Determines how the name interpretation is left to your implementation
Indicates that the name format must use acceptable values from the set of values belonging to the primitive type xs:Name.
Indicates that the name format must follow the standards for a URI reference. How the URI is interpreted is specific to the application using the attribute value.
Returns data that remains constant.
Use a static attribute to return a string as part of a SiteMinder response. This type of response can be used to provide information to a Web application. For example, if a group of users has specific customized content on a Web site, the static response attribute, show_button = yes, could be passed to the application.
Returns profile information from a user's entry in a user directory.
This type of response attribute returns information associated with a user in a directory. A user attribute can be retrieved from an LDAP, WinNT, or ODBC user directory.
Note: For the Policy Server to return user directory attributes as response attributes, the user directories must be configured FSS Administrative UI.
Returns profile information from a directory object in an LDAP or ODBC user directory.
This type of attribute is used to return information associated with directory objects to which the user is related. Groups to which a user belongs, and Organizational Units (OUs) that are part of a user DN, are examples of directory objects whose attributes can be treated as DN attributes.
For example, you can use a DN attribute to return a company division for a user, based on the user's membership in a division.
Note: For the Identity Provider to return an attribute containing DN attributes values, the user directories must be configured in the Policy Server User Interface.
If you select the DN Attribute radio button, you may also select the Allow Nested Groups check box. Selecting this check box allows SiteMinder to return an attribute from a group that is nested in another group specified by a policy. Nested groups often occur in complex LDAP deployments.
Copyright © 2010 CA. All rights reserved. | Email CA about this topic |