Deployment Example: SAML v2 Using Sun OpenSSO Enterprise 8.0

12.1 Using the OpenSSO Enterprise Common Tasks Wizard

This automated test uses the Test Federation Connectivity work flow option under the Common Tasks tab of the OpenSSO Enterprise console.

ProcedureTo Test SAML v2 Using the Common Tasks Wizard

  1. Access https://lb2.idp-example.com:1081/opensso/console from a web browser.

  2. Log in to the OpenSSO Enterprise console as the administrator.

    Username

    amadmin

    Password

    ossoadmin

    The Common Tasks tab is displayed.

  3. Under the Common Tasks tab, click Test Federation Connectivity.

    The Validate Federation Setup page is displayed.

  4. Select the radio button next to idpcot, the circle of trust that contains the providers you are testing.

    The providers in idpcot are displayed.

  5. Click Start Test.

    A pop up is displayed.

  6. Click OK on the pop up.

    Your administrator session is terminated and the test is run.

  7. When displayed, log in to the OpenSSO Enterprise console on the identity provider side with the following information.

    Username

    idpuser

    Password

    idpuser

    With successful authentication, the OpenSSO Enterprise console on the service provider side is displayed.

  8. Log in to the OpenSSO Enterprise console on the service provider side with the following information.

    Username

    spuser

    Password

    spuser

    With successful authentication, the two accounts are linked. Single logout follows the successful federation.

  9. When displayed to test single sign on, log in to the OpenSSO Enterprise console on the identity provider side with the following information.

    Username

    idpuser

    Password

    idpuser

    Following successful authentication on the identity provider side, the user is logged in to the service provider through a back channel, demonstrating single sign on. Finally, the user profile federation is terminated. Thus, the following has occurred:

    • A user is successfully authenticated with two different providers and the user's separate profiles are federated.

    • The user is logged out of both providers verifying single logout.

    • The user is logged back in to both providers by providing credentials to only one of them verifying single sign on.

    • The federation between the two user profiles is terminated.

  10. Click Cancel to return to the OpenSSO Enterprise console login page.