To install a SAML Affiliate Agent, you must be logged into the account under which the web server was installed.
Note the following:
Additionally, set the DISPLAY variable to your terminal, as follows:
DISPLAY=111.11.1.12:0.0
export DISPLAY
111.11.1.12:0.0 is the XServer IP address and location.
If you try to run in GUI mode on a UNIX system using a telnet window without an X-Windows session, the installer throws a Java exception and exits.
If you prefer, you can run a command-line installation from a console window.
To install the SAML Affiliate Agent
Windows: Navigate to the win32 folder then double-click nete-af-version-win32.exe.
Solaris: From the solaris folder, copy nete-af-version-sol.bin to a local directory, navigate to that directory and enter the following in a console window:
./nete-af-version-sol.bin
Linux: From the linux folder, copy nete-af-version-linux.bin (for Linux 2.1) or nete-af-version-rhel30.bin (for Linux 3.0) to a local directory, navigate to that directory and enter the following in a console window:
./nete-af-version-linux.bin (for Linux 2.1)
./nete-af-version-rhel30.bin (for Linux 3.0)
The setup program prepares the installation files.
If you do not accept the agreement, the installation terminates.
The SAML artifact is sent across an SSL connection to the consumer.
Note: IIS and Sun Java System 6.0 can use one web server for SSL and non-SSL connections.
Important! Enter a root URL in the form http://address.domain.com:port—do not enter any additional text.
When you specify a value for a root URL, the installation script appends additional information to it in the AffiliateConfig.xml file. For example, if you enter https://interceptor.domain.com:90 for the SSL Interceptor Root URL, the script appends /smafa/amts/test1.htm to it.
https://mysslserver.example.com:90
The SSLInterceptorURL enables the SAML Affiliate Agent to obtain the SAML artifact, which identifies the SAML assertion stored at the producer. The assertion contains user profile and session information. After the SAML Affiliate Agent gets the artifact, it calls the producer across the SSL back channel to retrieve the actual assertion.
For all web servers, add the HTTPSPorts attribute to the AffiliateConfig.xml file and specify the same port number as you specify for the SSLInterceptorURL attribute. The HTTPSPorts attribute must be added to the GlobalInfo tag in the AffiliateConfig.xml file.
https://myserver.ca.com:81
The secret encrypts consumer cookies. You do not have to specify a corresponding secret in the Policy Server.
This password must match the password for a consumer defined in the Policy Server User Interface.
Note: For information about configuring a consumer, see the Federation Security Services Guide.
The setup program copies files to the specified location.
For Agents installed on IIS 6.0 Web Servers and Apache 1.x Web Servers, start the Affiliate Server before starting the web server.
| Copyright © 2011 CA. All rights reserved. | Email CA Technologies about this topic |