SAML SSO Web Profile Authentication Resource Template

SAML SSO Web Profile Authentication Resource Template provides configuration fields for SAML SSO Web Profile Authentication.

General Tab

Property Description
Entity Id (Required) Unique identifier for the service provider. This must be the same as that configured in the IdP

Example: https://host:port/saml/saml/metadata

Authentication Successful URL (Required) URL for authentication successful landing page

Example: /landing

IDP Metadata Source (Required) SAML Metadata describes service provider or identity provider.
Select one of the options from following:
  • IDP HTTP Metadata URL
  • Select the IDP String Metadata option if you have metadata source file present at local computer (For Google IdP).
IDP Metadata URL (Required) Location of IdP Metadata source file (if IDP String Metadata option is selected) or

HTTP URL of IdP Metadata (if IDP HTTP Metadata URL option is selected)

Example:

Google: D:\SAML\GoogleIDPMetadata.xml

ADFS: https://idp-alias/Metadata.xml

IDP Login URL (Required) URL to initiate SAML login

Example: /login

IDP Logout URL (Required) URL to initiate SAML logout

Example: /logout

IDP SSO URL (Required) URL where SAML assertions are posted back by IdP

Example: /SSO

IDP Single Logout URL (Required) URL where logout response is sent back by IdP

Example: /SingleLogout

Logout Successful URL (Required) URL for logout successful landing page

Example: /loggedOut

Authentication Failure URL (Required) URL for authentication failure landing page

Example: /error

Response Skew Time (seconds) (Required) Duration for which response from IdP is valid

Example: 60 seconds

Unauthorize Redirect Requests (Optional) By default this check box is not selected for SOA applications

For TIBCO ActiveMatrix BPM applications this check box must be selected.

Max Authentication Age (seconds) (Optional)

You can configure this field to ensure that the existing SAML assertion returned by the IdP is not older than the value specified in this field.

Default value: 7200 seconds

Local Logout (Optional) Select the check box if you are using Google IdP

Advanced Tab

You can sign or encrypt SAML requests and responses for advanced security. The Advanced tab provides configuration fields for signing or encrypting SAML requests and responses. You must provide valid public key or certificate to the IdP so that it can identify signed requests. For more information about keystore, see Keystores.

Property Description

Keystore Provider (Required)

The name of a Keystore Provider shared resource
Sign Authentication Request (Optional) If you select this check box, authentication request by service provider must be signed. You must provide valid public key or certificate to the IdP so that it can identify signed requests.
Sign Logout Request (Optional) Select the check box to sign logout request
Sign Logout Response (Optional) If you select this check box, the IdP must sign the logout response before returning it to the service provider.
Sign Assertions (Optional) Select the check box to sign SAML assertions
Sign Metadata (Optional) Select the check box to sign SAML metadata
Encrypt Assertion (Optional) Select the check box to encrypt SAML assertion
Key Alias to Encrypt and Key Alias Password (Optional) Name of the key alias used for encryption and password for the alias
Key Alias to Sign and Key Alias Password (Optional) Name of the key alias used to sign and password for the alias
Default Key Alias and Key Alias Password (Required) Name of the default key alias and password for the alias