SAML SSO Web Profile Authentication

The SAML SSO Web Profile Authentication resource template provides configuration fields for SAML SSO Web Profile Authentication.

General
Field Description
Entity Id (Required) Unique identifier for the service provider. This must be the same as that configured in the IdP.

Example: https://host:port/saml/saml/metadata

Authentication Successful URL (Required) URL for authentication successful landing page.

Example: /landing

IDP Metadata Source (Required)

SAML metadata describes service provider or identity provider.

Select one of the options from following:

  • IDP HTTP Metadata URL.
  • IDP String Metadata: Select this option if you have metadata source file present at local computer (For Google IdP).
IDP Metadata URL (Required) Location of IdP metadata source file (if IDP String Metadata option is selected) or

HTTP URL of IdP metadata (if IDP HTTP Metadata URL option is selected).

Example:

Google: D:\SAML\GoogleIDPMetadata.xml

AD FS: https://idp-alias/Metadata.xml

IDP Login URL (Required) URL to initiate SAML login.

Example: /login

IDP Logout URL (Required) URL to initiate SAML logout.

Example: /logout

IDP SSO URL (Required) URL where SAML assertions are posted back by IdP.

Example: /SSO

IDP Single Logout URL (Required) URL where logout response is sent back by IdP.

Example: /SingleLogout

Logout Successful URL (Required) URL for logout successful landing page.

Example: /loggedOut

Authentication Failure URL (Required) URL for authentication failure landing page.

Example: /error

Response Skew Time (seconds) (Required) Duration for which response from IdP is valid.

Example: 60 seconds

Unauthorize Redirect Requests (Optional)

For TIBCO ActiveMatrix BPM applications, this check box must be selected.

Default: Unchecked, for SOA applications

Max Authentication Age (seconds) (Optional)

You can configure this field to ensure that the existing SAML assertion returned by the IdP is not older than the value specified in this field.

Default: 7200 seconds

Local Logout (Optional) Select the check box if you are using Google IdP.

Advanced Tab

You can sign or encrypt SAML requests and responses for advanced security. The Advanced tab provides configuration fields for signing or encrypting SAML requests and responses. You must provide valid public key or certificate to the IdP so that it can identify signed requests. For more information about keystore, see Keystores.

Field Description

Keystore Provider (Required)

The name of a Keystore Provider resource.
Sign Authentication Request (Optional) If you select this check box, authentication request by service provider must be signed. You must provide valid public key or certificate to the IdP so that it can identify signed requests.
Sign Logout Request (Optional) Select the check box to sign logout request.
Sign Logout Response (Optional) If you select this check box, the IdP must sign the logout response before returning it to the service provider.
Sign Assertions (Optional) Select the check box to sign SAML assertions.
Sign Metadata (Optional) Select the check box to sign SAML metadata.
Encrypt Assertion (Optional) Select the check box to encrypt SAML assertion.
Key Alias to Encrypt and Key Alias Password (Optional) Name of the key alias used for encryption and password for the alias.
Key Alias to Sign and Key Alias Password (Optional) Name of the key alias used to sign and password for the alias.
Default Key Alias and Key Alias Password (Required) Name of the default key alias and password for the alias.
Use Load Balancer Select the check box if you are using the Load Balancer for an application.
Entity Base URL This is the URL where the IdP will send and receive SAML requests and responses.
Scheme (http/https) Name of the scheme (http or https).
Server Name Name of the server.
Server Port Port number of the server.
Include Server Port in Request URL Select the check box to include server port number in the URL.
Context Path

The prefix of a URL path that is used to select the contexts to which an incoming request is passed.

For example, the path is displayed as http://hostname.com/contextPath/.

Copying ADFS Encryption Certificate to Application Docker Image

If you want to use OpenID or SAML SSO with ADFS, you must have cacert containing ADFS encryption certificate for authentication purpose.

Procedure

  1. Copy default cacert from container to the host machine.
  2. Import ADFS encryption certificates to cacert by using Keystore Explorer or any other tool.
  3. Save the certificate in the certs folder inside the application folder that you pass to --app_location argument when building the Docker image.

  4. Create an application Docker image.