Before performing this procedure, you must have completed the steps in To Configure a Provider Entity.
Some of the attributes below will only be visible after you have saved the initial provider configuration.
Choose Identity Provider from the View menu.
Select the type of provider that you are configuring:
New Hosted Provider
A hosted provider is installed on the same server as Access Manager.
New Remote Provider
A remote provider is not installed on the same server as Access Manager.
Provide information for the Common Attributes.
Common Attributes contain values that generally define the identity provider.
The static value of this attribute is the type of provider being configured: hosted or remote.
The value of this attribute is a description of the identity provider.
Choose the Liberty ID-FF release that is supported by this provider.
urn:liberty:iff:2003-08 refers to the Liberty Identity Federation Framework Version 1.2.
urn:liberty:iff:2002-12 refers to the Liberty Identity Federation Framework Version 1.1.
Name identifier mapping allows a service provider to obtain a name identifier for a principal that has federated in the namespace of a different service provider. Implementing this protocol allows the requesting service provider to communicate with the second service provider without an identity federation having been enabled. Type a URI that identifies the communication specifications in New Value and click Add.
Currently, the Name Identifier Mapping profile only supports SOAP. If this attribute is used, its value must be http://projectliberty.org/profiles/nim-sp-http.
Type the key alias that is used to sign requests and responses.
Type the security certificate alias. Certificates are stored in a Java keystore file. Each specific certificate is mapped to an alias that is used to fetch the certificate.
Type the length for keys that are used by the web service consumer when interacting with another entity.
If the encryption method is DESede, the key size must be 192. If the encryption method is AES, the key size must be 128, 192 or 256.
Choose the method of encryption:
None
AES
DESede
Select the check box to enable encryption of the name identifier.
Provide information for the Communication URLs.
Communication URLs attributes contain locations for redirects and sending requests.
Type a URI to the identity provider’s SOAP message receiver. This value communicates the location of the SOAP receiver in non browser communications.
Type a URL to which service providers can send single sign-on and federation requests.
Type a URL to which service providers can send logout requests. Single logout synchronizes the logout functionality across all sessions authenticated by the identity provider.
Type a URL to which the identity provider will redirect the principal after completing a logout.
Type a URL to which a service provider will send federation termination requests.
Type a URL to which the identity provider will redirect the principal after completing federation termination.
Type a URL to which a service provider will send requests to specify a new name identifier to be used when communicating with the identity provider about a principal. This service can only be used after a federation session is established.
Type a URL to which the identity provider will redirect the principal after HTTP name registration has been completed.
Provide information for the Communication Profiles.
Communication Profiles attributes define the transmission methods used by the identity provider.
Select a profile to notify other providers of a principal’s federation termination:
HTTP Redirect
SOAP
Select a profile to notify other providers of a principal’s logout:
HTTP Redirect
HTTP Get
SOAP
Select a profile to notify other providers of a principal’s name registration:
HTTP Redirect
SOAP
Select a profile for sending authentication requests:
Browser Post (specifies a browser-based HTTP POST protocol)
Browser Artifact (specifies a non-browser SOAP-based protocol)
LECP (specifies a Liberty-enabled Client Proxy)
Access Manager can handle requests that come from a Liberty-enabled client proxy profile, but it requires additional configuration that is beyond the scope of this manual.
Select any of the available authentication domains to assign to the provider.
A provider can belong to one or more authentication domains. However, a provider without a specified authentication domain can not participate in Liberty-based communications. If no authentication domains have been created, you can define this attribute later.
If configuring a remote identity provider, skip to step 11. If configuring a hosted identity provider, continue with step 7.
(Hosted Identity Provider Only) Provide mappings for the Authentication Context classes.
This attribute maps the Liberty-defined authentication context classes to authentication methods available from the identity provider.
Select the check box next to the authentication context class if the identity provider supports it.
The Liberty-defined authentication context classes are:
Mobile Contract
Mobile Digital ID
MobileUnregistered
Password
Password-ProtectedTransport
Previous-Session
Smartcard
Smartcard-PKI
Software-PKI
Time-Sync-Token
Choose the Access Manager authentication type to which the context is mapped.
See Authentication Types in Sun Java System Access Manager 7.1 Administration Guide for more information.
Type the Access Manager authentication option.
Choose a priority level for cases where there are multiple contexts.
(Hosted Identity Provider Only) Select any of the available provider entities to assign as a Trusted Provider and click Add.
This attribute tallies providers that the identity provider trusts.
(Hosted Identity Provider Only) Provide information for the Access Manager Configuration attributes.
Access Manager Configuration attributes define general information regarding the instance of Access Manager being used as an identity provider.
Type an alias name for the local identity provider.
Select the provider that should be used for authentication requests from a provider hosted locally:
Remote specifies that the provider hosted locally would contact a remote identity provider upon receiving an authentication request.
Local specifies that the provider hosted locally should contact a local identity provider upon receiving an authentication request (essentially, itself).
Select the authentication context class (method of authentication) to use if the identity provider does not receive this information as part of a service provider request. This value also specifies the authentication context used by the service provider when an unknown user tries to access a protected resource. The options are:
Password
Mobile Digital ID
Smartcard
Smartcard-PKI
MobileUnregistered
Software-PKI
Previous-Session
Mobile Contract
Time-Sync-Token
Password-ProtectedTransport
Type a value that points to the realm in which this provider is configured. For example, /sp.
Type the URI of the version of the Liberty Alliance Project specification being used. The default value is http://projectliberty.org/specs/v1.
This field defines the class used by a service provider to participate in name registration. Name registration is a profile by which service providers specify a principal’s name identifier that an identity provider will use when communicating with the service provider. The value is com.sun.identity.federation.services.util.FSNameIdentifierImpl.
Type the URL of the home page of the identity provider.
Type the URL to which a principal will be redirected if single sign-on has failed.
Type the name of the host that issues the assertion. This value might be the load balancer's host name if Access Manager is behind one.
Select the check box if you want a Discovery Service Resource Offering to be generated during the Liberty-based single sign-on process for bootstrapping purposes.
Select the check box to enable auto-federation.
When creating an Auto Federation Attribute Statement, the value of this attribute will be used. The statement will contain the AutoFedAttribute element and this common attribute as its value.
Specify a pluggable class used for adding attribute statements to an assertion that is generated during the Liberty-based single sign-on process.
Specify values to define the mappings used by the default attribute mapper plug-in. Mappings should be configured in the format:
SAML-attribute=local-attribute
For example, EmailAddress=mail or Address=postaladdress. Type the mapping as a New Value and click Add.
(Hosted Identity Provider Only) Provide information for the SAML Attributes.
SAML Attributes define general information regarding SAML assertions that are sent by the identity provider.
Type the interval of time (in seconds) that an assertion issued by the identity provider will remain valid. A principal will remain authenticated until the assertion interval expires.
Type the interval of time (in seconds) before assertions stored in the identity provider will be cleared.
Type the interval of time (in seconds) to specify the timeout for assertion artifacts.
Type a number to define how many assertions an identity provider can issue, or how many assertions that can be stored.
To continue configuring a hosted identity provider, skip to step 12.
(Remote Identity Provider Only) Provide information for the Proxy Authentication Configuration attributes.
Proxy Authentication Configuration attributes define values for dynamic identity provider proxying.
Select the check box to enable proxy authentication for a service provider.
Type an identifier for an identity provider(s) that can be used for proxy authentication in New Value and click Add. The value is a URI defined as the provider's identifier.
Enter the maximum number of identity providers that can be used for proxy authentication.
Select the check box if you want introductions to be used to find the proxying identity provider.
(Optional) Provide information for the Organization Profiles.
The Organization Profiles attributes contain values that define the organizational name of the entity.
Type the complete legal name of the organization in New Value and click Add. Use the format locale|organization-name, for example, en|organization-name.com.
If the Names attribute contains a value, it is required to add values to the Display Names and URL attributes also.
Type a name that is suitable for display to a principal in New Value and click Add. The value is defined in the format locale|organization-display-name, for example, en|organization-display-name.com.
Type a URL that can be used to direct a principal to additional information on the entity in New Value and click Add. Use the format locale|organization-URL, for example, en|http://www.organization-name.com.
Click New Contact Person to create a contact person for the provider.
The Contact Person attributes contain information regarding a human contact for the identity provider.
Type the given name of the identity provider’s contact person.
Type the surname of the identity provider's contact person.
Choose the contact's role from the drop-down menu:
Administrative
Billing
Technical
Other
Type the name of the company that employs the contact person.
Type the name identifier that points to an online instance of the contact person’s personal information profile.
Type one or more email addresses for the contact person in New Value and click Add.
Type one or more telephone numbers for the contact person in New Value and click Add.
Click Create to create the contact person.
Click Save to complete the configuration, or define values for General or Service Provider attributes by choosing from the View menu:
To define values for General attributes, see To Configure General Attributes for a Provider Entity.
To define values for Service Provider attributes, see To Configure Hosted or Remote Service Provider Attributes for a Provider Entity.