Previous Topic: Role of the Smkeydatabase at the Relying PartyNext Topic: Certificate Revocation Lists in the smkeydatabase


Certificates Stored in the smkeydatabase Only at the Asserting Party

The following types of certificates are stored in smkeydatabase at the relying party site:

Certificate Authority (CA) certificates

Used for establishing an SSL connection from a relying party to the web server at a asserting party.

A set of common root CA certificates are shipped with the default smkeydatabase. To use a certificate for a CA that are not already in the key store, you must import the certificate into the database.

Client certificates

Used for sending a certificate from a relying party to an asserting party. The certificate serves as credentials when the consumer must authenticate using a client certificate authentication scheme to access the Assertion Retrieval or Artifact Resolution Service.

Partner certificates

Used for performing digital signature verification at the relying party to ensure the partner issuing the assertion is a trusted site. At a SAML 2.0 Identity Provider, the partner certificate is used to verify the signed messages from the Service Provider during single logout. The Service Provider certificate must exist at Identity Provider's machine.

When the Web Agent initializes, it gets all the client and server certificates, but the keys remain at the Policy Server.