The configuration of the WS-Federation authentication scheme provides information about the Account Partner that generates the assertion for the Resource Partner and instructs how the Resource Partner supports the authentication process.
To configure the common setup and scheme setup
The Authentication Scheme Properties dialog opens.
The contents of the SiteMinder Authentication Scheme dialog change for the scheme.
Note: Click Help for descriptions of settings and controls, including their respective requirements and limits.
Important! For debugging purposes only, you can temporarily disable all signature processing (both signing and verification of signatures) by enabling the Disable Signature Processing option.
After you configure an authentication scheme, associate the scheme with a realm that contains the resource you want to protect.
When you configure an authentication scheme, you define a way for the authentication scheme to look up a user in the local user store. After the correct user is located, the system generates a session for that user. Locating the user in the user store is the process of disambiguation. How SiteMinder disambiguates a user depends on the configuration of the authentication scheme.
For successful disambiguation, the authentication scheme first determines a LoginID from the assertion. By default, the LoginID is extracted from the Name ID value in the assertion. You can also obtain the LoginID by specifying an Xpath query.
After the authentication scheme determines the LoginID, SiteMinder checks if a search specification is configured for the authentication scheme. If no search specification is defined for the authentication scheme, the LoginID is passed to the Policy Server. The Policy Server uses the LoginID together with the user store search specification to locate the user. For example, imagine that the LoginID value is Username and the LDAP search specification is set to the uid attribute. The Policy Server uses the uid value (Username=uid) to search for the user.
If a search specification is configured for the authentication scheme, the LoginID is not passed to the Policy Server. Instead, the search specification is used to locate a user.
The disambiguation process involves two steps:
Note: The use of Xpath and the search specification are optional.
Copyright © 2012 CA.
All rights reserved.
|
|