If the host machine name or domain is configured in an instance of Access Manager that acts as an identity provider or service provider in a federation environment, the following changes also need to be made, depending upon the federation protocol used.
You only need to change the hosted or remote entities that contain a host machine name or domain that has changed, For example, if the host name of machine A has changed, you need to change the metadata for all entities hosted on machine A. If the metadata for those entities hosted on machine A was imported to machine B, you also need to change the remote metadata (for A) on machine B.
By default, saml2meta, the command line utility used in this section, uses the top-level realm as input when the --realm option is not defined. If you are making changes to a sub-realm, use the --realm option with a value of /sub-realm-name.
If the host machine name or domain is configured in an instance of Access Manager that acts as an identity provider or service provider in a SAML v2 environment, use this procedure. As Access Manager has no console support for SAML v2, changes to the URLs configured in the metadata files need to be made on the command-line on both the identity provider and the service provider sides.
Run the following command to export the standard and extended metadata from the identity provider machine.
# /opt/SUNWam/saml2/bin/saml2meta export --runasdn amadmin --password passwd-for-amadmin --realm realm-name --entityid "IDP-OLD-FQDN" --metadata /tmp/metadata.xml --extended /tmp/ext_metadata.xml |
If you receive the following exception:
com.iplanet.sso.SSOException: Invalid sessionid formatjava.lang.IllegalArgumentException: Invalid server id in session id com.iplanet.services.naming. ServerEntryNotFoundException: Cannot find server. at com.iplanet.sso.providers.dpro.SSOProviderImpl. createSSOToken(SSOProviderImpl.java:177) at com.iplanet.sso.SSOTokenManager.createSSOToken(SSOTokenManager.java:305) at com.sun.identity.authentication.AuthContext.getSSOToken(AuthContext.java:1070)
append the following line to AMConfig.properties, restart Access Manager, and run the saml2meta export again.
com.iplanet.am.naming.ignoreNamingService=true
Run the following command to delete the standard and extended metadata just exported from the identity provider machine.
# /opt/SUNWam/saml2/bin/saml2meta delete --runasdn amadmin --password passwd-for-amadmin --realm realm-name --entityid "IDP-OLD-FQDN" Descriptor and config for entity "IDP-OLD-FQDN" was deleted successfully. |
Change all occurrences of "IDP-OLD-FQDN" to "IDP-NEW-FQDN" in the exported files, /tmp/metadata.xml and /tmp/ext_metadata.xml.
Run the following command to import the modified metadata files to the identity provider.
# /opt/SUNWam/saml2/bin/saml2meta import --runasdn amadmin --password passwd-for-amadmin --realm realm-name --entityid "IDP-OLD-FQDN" --metadata /tmp/metadata.xml --extended /tmp/ext_metadata.xml File "/tmp/metadata.xml" was imported successfully. File "/tmp/ext_metadata.xml" was imported successfully. |
Run the following command to export the standard and extended metadata from the service provider machine.
# /opt/SUNWam/saml2/bin/saml2meta -i /var/opt/SUNWam/fm/war_staging export --runasdn amadmin --password passwd-for-amadmin --entityid "IDP-OLD-FQDN" --metadata /tmp/metadata.xml --extended /tmp/ext_metadata.xml Entity descriptor was exported to file "/tmp/metadata.xml" successfully. Entity config was exported to file "/tmp/ext_metadata.xml" successfully. |
Run the following command to delete the standard and extended metadata from the service provider machine.
# /opt/SUNWam/saml2/bin/saml2meta -i /var/opt/SUNWam/fm/war_staging delete --runasdn amadmin --password passwd-for-amadmin --entityid "IDP-OLD-FQDN" Descriptor and config for entity "IDP-OLD-FQDN" was deleted successfully. |
Change all occurrences of "IDP-OLD-FQDN" to "IDP-NEW-FQDN" in the files exported from the service provider machine, /tmp/metadata.xml and /tmp/ext_metadata.xml.
Run the following command to import the modified metadata files to the service provider.
# /opt/SUNWam/saml2/bin/saml2meta -i /var/opt/SUNWam/fm/war_staging import --runasdn amadmin --password passwd-for-amadmin --metadata /tmp/metadata.xml --extended /tmp/ext_metadata.xml File "/tmp/metadata.xml" was imported successfully. File "/tmp/ext_metadata.xml" was imported successfully. |
If the host machine name or domain is configured in an instance of Access Manager that acts as an identity provider or service provider in a Liberty Alliance Project Identity Federation Framework (Liberty ID-FF) environment, use this procedure to make changes to the following:
Entity descriptors on the identity provider and service provider sides
Discovery Service
Liberty Personal Profile Service on the Access Manager system where the Discovery Service is hosted
Login to the Access Manager console as amadmin.
Change the entity descriptor files.
Make changes to the Discovery Service.
From the Access Manager console home page, click the Web Services tab.
Click Discovery Service.
Change the host name in the Provider ID URL.
Click the Provider ID under Classes for ResourceID Mapper Plug-in.
Change the host machine name in the Provider ID attribute and click Save.
Click the configured Service Type entry name under Resource Offerings for Bootstrapping.
Change the host machine name in the Provider ID attribute and click Save.
Click Edit for the entry under Service Description.
Change the host machine name in the value of the End Point URL attribute.
Click Save to save the changes.
Make changes to the Liberty Personal Profile Service.
Log out of the Access Manager console.
If the host machine name or domain is configured in an instance of Access Manager that acts as an identity provider or service provider in a SAML v1 environment, use this procedure to make the appropriate changes.
Login to the Access Manager console as amadmin.
Click the Federation tab.
Click the SAML tab.
Click the Instance ID of the relevant entry under Site Identifier.
Change the host machine name in the value of the Instance ID and Issuer Name attributes.
Click Save to save the changes.
Click Save on the SAML Profile page.
Click the Instance ID of the relevant entry under Trusted Partners, if applicable.
Change the host machine name in the URL endpoints of the relevant entries in the list of Trusted Partners.
Click Save to save the changes.
Click Save on the SAML Profile page.
Log out of the Access Manager console.