Deployment Example 2: Federation Using SAML v2

8.3 Configuring the Access Manager Servers to Use SAMLv2 User Schema

The final task in configuring the Access Manager servers is to configure them to use SAMLv2 user schema.

ProcedureTo Reconfigure the LDAPv3 Plug-In on the Access Manager User Instances

  1. Log in to the Access Manager console:

    User Name:

    amadmin

    Password:

    4m4dmin1

  2. On the Realms page, click the users realm name.

  3. Click the Data Stores tab.

    On the Data Stores tab, click the usersLDAP Data Store name.

  4. On the “LDAPv3 Repository Plugin” page, make the following changes:

    1. Add a new LDAP User Object Class.

      In the Add box for LDAP User Object Class, enter the following and then click Add:


      sunFMSAML2NameIdentifier
    2. Add a new LDAP User Attribute.

      In the Add box for LDAP User Attributes, enter the following and then click Add:


      sun-fm-saml2-nameid-infokey
    3. Add a second new LDAP User Attribute.

      In the Add box for LDAP User Attributes, enter the following and then click Add:


      sun-fm-saml2-nameid-info
  5. Click Save.