44.4 Managing Partner Keys for WS-Trust Communications

The following topics describe how to manage Partner Keys for WS-Trust communications:

44.4.1 About Partner Certificates

During the processing of the WS-Trust messages, Security Token Service might need to use a partner's certificate.During the processing of the WS-Trust messages, Security Token Service might need to use a partner's certificate.

Table 44-3 lists the certificate that is needed contingent upon the situation.

Table 44-3 Partner Keys for WS-Trust Communications

If Security Token Service Must ... The OAM Server ...

Issue a SAML Assertion encrypted for the Relying Party

Uses the Relying Party's encryption certificate to encrypt the outgoing token

Issue a SAML Assertion with the Subject Confirmation being of type Holder of Key / Asymmetric

Uses the Requester Partner's signing certificate as the proof key to be included in the Assertion

Note: if the WS-Trust RST contains a UseKey element referencing an X.509 Binary Security Token in the SOAP header that was used in a signature, then Security Token Service will be able to use this certificate as the proof key.

Issue a SAML Assertion with the Subject Confirmation being of type Holder of Key / Symmetric

Uses the Relying Party's encryption certificate to encrypt the secret proof key to be included in the Assertion.

Issue a SAML Assertion with the Subject Confirmation being of type Holder of Key / Symmetric

Can encrypt in the RSTR for the Requester, the secret or the server entropy.

In this case, the server:

  • uses the Requester's encryption certificate to encrypt the secret (if the secret was generated using only server entropy)

  • or uses the server entropy to encrypt the secret in the RSTR (if the secret was derived from client and server entropy).

Note: if the WS-Trust RST contains a ProofEncryption element referencing an X.509 Binary Security Token in the SOAP header that was used in a signature, then Security Token Service will be able to use this certificate to encrypt the secret or entropy returned to the client.

Validate an incoming SAML Assertion

Uses the Issuing Authority's signing certificate to verify the XML digital signature present on the Assertion.

44.4.2 About Downloading the Relying Party's Certificate at Run Time

At runtime, Security Token Service is capable of downloading the Relying Party WSS Policy of the service listed in the AppliesTo field of the RST.

If Security Token Service is configured to download the Relying Party's WS-Sec policy, then ensure that the Proxy settings are correctly entered, if needed, so that Security Token Service can connect to the Relying Party. If the Relying Party Partner Profile is configured to do so, it instructs Security Token Service to download the WS-Sec Policy from the service. Security Token Service then extracts the certificate located in the policy and uses it for cryptographic operations, if necessary. Also:

  • If Security Token Service issues a SAML Assertion encrypted for the Relying Party, the server uses the certificate downloaded from the Relying Party's WS-Sec Policy to encrypt the outgoing token.

  • If Security Token Service issues a SAML Assertion with the Subject Confirmation of type Holder of Key / Symmetric, Security Token Service uses the certificate downloaded from the Relying Party's WS-Sec Policy to encrypt the secret proof key to be included in the Assertion.

You can configure the Relying Party Partner Profile so it downloads the certificate at run time.

See Setting the Partner's Signing or Encryption Certificate.

44.4.3 Setting the Partner's Signing or Encryption Certificate

You can set the signing or encryption certificate of a partner using the Federation console.

Alternatively: Use the WLST Partner commands to set the signing or encryption certificate of a specific partner.

See Table 44-3for the prerequisites of Setting the Partner's Signing or Encryption Certificate.

To set the certificate of a partner:

  1. In the Oracle Access Management Console, click Federation at the top of the window.
  2. In the Federation console, select Partners from the View drop-down menu in the Security Token Service section.
  3. Select the desired tab (Requesters, Relying Parties or Issuing Authorities

    See Table 44-3.

  4. Search for and open (or Create) the Partner for which the certificate must be set.
  5. Edit Partner settings as needed.

    See Managing Token Service Partners and click Save.

  6. Encryption Certificate: Click the Browse button to locate and choose the Encryption certificate.
  7. Signing Certificate: Click the Browse button to locate and choose the Signing certificate.
  8. Save the information and close the page.
  9. Proceed with "Managing Certificate Validation".