Previous Topic: Solution 13: SAML 2.0 SSO with Dynamic Account Linking at the SP

Next Topic: Federation Security Services Process Flow

Configure SAML 2.0 SSO with Dynamic Account Linking at the SP

You need to configure several components at the Service Provider to enable SAML 2.0 single sign-on with dynamic account linking:

To enable dynamic account linking for POST or Artifact single sign-on, configure the following at the Service Provider

  1. For the linkaccount.jsp file, do the following:
  2. Enable the Allow/Create feature at the Service Provider.
  3. For the Web Agent at the Service Provider, set the POST Preservation parameter to yes. This enables the POST data from the SAML response to be preserved.
  4. Configure a redirect URL that sends the user to the linkaccount.jsp file if authentication fails. You must direct the user only to this file.

    The redirect URL is part of the SAML 2.0 authentication scheme setup at the Service Provider, specifically, in the Advanced tab of the SAML Auth Properties dialog.

    Complete the following fields with the values shown:

  5. Configure a Search Specification in the Users tab of the SAML Auth Scheme Properties dialog. For example, if buyerID is going to be replaced by the Name ID from the assertion, the Search Specification would be buyerID=%s.

More information:

Use Case 13: SSO with Dynamic Account Linking at the SP

Allow the Identity Provider to Assign a Value for the NameID

Permit the Creation of a Name Identifier for SSO

Configure User Disambiguation for User Look Ups

Locate User Records for Authentication


Copyright © 2010 CA. All rights reserved. Email CA about this topic