Before you can assign a SAML 2.0 authentication scheme to a realm, you must configure the scheme.
To configure the SAML 2.0 authentication scheme common setup
The Authentication Scheme Properties dialog box opens.
The contents of the SiteMinder Authentication Scheme dialog box change to support the SAML 2.0 scheme.
In this dialog you find the following:
Note: For HTTP-Artifact single sign-on, you may secure the artifact backchannel using client certificate authentication.You can use non-FIPS 140 encrypted certificates to secure the backchannel even if the Policy Server is operating in FIPS-only mode. However, for a strictly FIPS-only installation, use certificates only encrypted with FIPS 140-compatible algorithms.
Note: Click Help for descriptions of settings and controls, including their respective requirements and limits.
For this binding, enter information about the certificate used to validate the signature of the posted assertion. The Issuer DN and the Serial Number are of the entity who issued and signed the certificate.
For this binding, enter information about the certificate used to validate the signature of the SLO request.
By default, signature processing is enabled; it is required by the SAML 2.0 specification; therefore, it must be enabled in a production environment. However, for debugging your initial federation setup only, you can temporarily disable all signature processing for the Service Provider (both signing and verification of signatures) by checking the Disable Signature Processing option.
The value you enter for the Issuer DN field should match the issuer DN of the certificate in the smkeydatabase. We recommend you open a command window and enter the command smkeytool -lc to list the certificates and view the DN to ensure that you enter a matching value.
Important! If you disable signature processing, you are disabling a mandatory security function.
Copyright © 2010 CA. All rights reserved. | Email CA about this topic |