Before you can assign a SAML 2.0 authentication scheme to a realm, configure the scheme.
To configure the SAML 2.0 authentication scheme setup
The Authentication Scheme Properties dialog opens.
The contents of the Authentication Scheme dialog change to support the SAML 2.0 scheme.
In this dialog, you find the following:
Note: For HTTP-Artifact single sign-on, you can secure the artifact back channel using client certificate authentication. You can use non-FIPS 140 encrypted certificates to secure the back channel even if the Policy Server is operating in FIPS-only mode. However, for a strictly FIPS-only installation, use only certificates encrypted with FIPS 140-compatible algorithms.
Note: Click Help for descriptions of settings and controls, including their respective requirements and limits.
By default, signature processing is enabled; the SAML 2.0 specification requires it; therefore, it must be enabled in a production environment. However, for debugging your initial federation setup only, you can temporarily disable all signature processing for the Service Provider (both signing and verification of signatures) by selecting the Disable Signature Processing option.
The value you enter for the Issuer DN field must match the issuer DN of the certificate in the smkeydatabase. We recommend that you open a command window and enter the command smkeytool -lc to list the certificates and view the DN to be sure that you enter a matching value.
Important! If you disable signature processing, you are disabling a mandatory security function.
For this binding, enter information about the certificate used to validate the signature of the posted assertion. The Issuer DN and the Serial Number together identify the certificate corresponding to the private key the IdP used to sign the assertion.
For this binding, enter information about the certificate used to validate the signature of the SLO request.
Copyright © 2012 CA.
All rights reserved.
|
|