Before you begin
You can use the Federation Services > SAML 2.0 General page to configure general SAML 2.0 services for this server. If you are configuring SAML 2.0 web single sign-on services with your federated partners, the site information you configure is published in a metadata file that you send to your federated partners.
To configure the general SAML 2.0 properties of this server:
This option is required if you are configuring SAML 2.0 services in two or more WebLogic Server instances in your domain. For example, if you are configuring SAML 2.0 services in a cluster, you must enable this option in each Managed Server instance individually.
Note: If you are configuring SAML 2.0 services in two more more WebLogic Server instances in your domain, you must configure the RDBMS security store. The embedded LDAP server is not supported in these configurations.
/saml2
, which will be automatically
combined with constant suffixes to create full endpoint
URLs.
If you do not specify a Transport Layer Security key alias and passphrase, the server’s configured SSL private key alias and passphrase from the server's SSL configuration is used for the TLS alias by default.
If you do not specify a single sign-on signing key alias and passphrase, the server’s configured SSL private key alias and passphrase from the server's SSL configuration is used by default.
For more information, see Configuring Single Sign-On with Web Browsers and HTTP Clients.
After you finish
After you have configured this server's general SAML 2.0 services, click SAML 2.0 Identity Provider or SAML 2.0 Service Provider to configure this server as an Identity Provider or Service Provider, respectively. For more information, see Configure SAML 2.0 Identity Provider services and Configure SAML 2.0 Service Provider services.
See also Configuring Single Sign-On with Web Browsers and HTTP Clients, Configuring Identity and Trust, and Using Security Assertion Markup Language (SAML) Tokens For Identity.