This section contains the instructions to configure OpenSSO Enterprise for attribute mapping. Use the following as a checklist to complete the configurations.
Map the appropriate LDAP attributes in the user data store to the attributes passed using SAML v2 using the OpenSSO Enterprise console on the identity provider side. When attributes on one OpenSSO Enterprise instance on the identity provider side are mapped, the mapping is made available to the second OpenSSO Enterprise instance on the identity provider side through the previous configuration of the two instances as a site in 5.4 Configuring the OpenSSO Enterprise Platform Service
Access https://lb2.idp-example.com:1081/opensso/console from a web browser.
Log in to the OpenSSO Enterprise console as the administrator.
amadmin
ossoadmin
The Common Tasks tab is displayed.
Click the Federation tab.
Under Entity Providers, click https://lb2.idp-example.com:1081/opensso.
The IDP profile page is displayed.
Click the Assertion Processing tab.
Under Attribute Mapping, enter the following values and click Add.
EmailAddress=EmailAddress Telephone=Telephone |
Click Save.
The profile is updated.
Log out of the OpenSSO Enterprise console.
Enable the Anonymous authentication module and confirm the creation of the anonymous user account on the service provider side.
This procedure assumes you have completed To Create a Test User for Attribute Mapping.
Access https://lb4.sp-example.com:1081/opensso/console from a web browser.
Log in to the OpenSSO Enterprise console as the administrator.
amadmin
ossoadmin
The Common Tasks tab is displayed.
Click the Access Control tab.
Click the / (Top Level Realm) realm.
Click the Authentication tab.
Click the Modules Instances link.
Under Modules Instances, click New.
The New Module Instance page is displayed.
Enter the following values and click Save.
Anonymous
Select Anonymous
The profile is updated.
Under Modules Instances, click Anonymous.
The Anonymous module instance profile is displayed.
Confirm the default values for the following attributes.
If the values in your instance are different, change them and save the profile.
anonymous
0
Log out of the OpenSSO Enterprise console.
A transient name identifier is a temporary user identifier. In this use case, there is no user account on the service provider side so single sign-on is accomplished using a transient name identifier. All users passed from the identity provider to the service provider will be mapped to the anonymous user created in To Enable Anonymous Authentication. In this procedure, we modify the agent profile to use the transient name identifier format.
Access https://lb4.sp-example.com:1081/opensso/console from a web browser.
Log in to the OpenSSO Enterprise console as the administrator.
amadmin
ossoadmin
The Common Tasks tab is displayed.
Click the Access Control tab.
Click the / (Top Level Realm) realm.
Click the Agents tab.
Click the Web tab.
The Web profile page is displayed.
Click webagent-1 in the Agent table.
The webagent-1 profile page is displayed.
Click the OpenSSO Services tab.
Select https://lb4.sp-example.com:1081/opensso/spssoinit?metaAlias=/sp&idpEntityID=https://lb2.idp-example.com:1081/opensso in the OpenSSO Login URL property box and click Delete.
Enter https://lb4.sp-example.com:1081/opensso/spssoinit?metaAlias=/sp&idpEntityID=https://lb2.idp-example.com:1081/opensso&NameIDFormat=transient in the OpenSSO Login URL text box and click Add.
Click Save.
The profile is updated.
Log out of the OpenSSO Enterprise console.
Map the attributes being sent from the identity provider to the attributes configured for the anonymous user on the service provider side.
Access https://lb4.sp-example.com:1081/opensso/console from a web browser.
Log in to the OpenSSO Enterprise console as the administrator.
amadmin
ossoadmin
The Common Tasks tab is displayed.
Click the Access Control tab.
Click the / (Top Level Realm) realm.
Click the Agents tab.
Click the Web tab.
The Web profile page is displayed.
Click webagent-1 in the Agent table.
The webagent-1 profile page is displayed.
Click the Application tab.
Click the Session Attribute Processing link.
Select HTTP_HEADER as the value for the Session Attribute Fetch Mode property.
Enter the following new values in the Session Attribute Map property text box and click Add.
Telephone
Telephone
Enter the following new values in the Session Attribute Map property text box and click Add.
EmailAddress
EmailAddress
Click Save.
The profile is updated.
Log out of the OpenSSO Enterprise console.