Configuring Oracle Access Manager for Federated Identity Using SAML 2.0
The procedures in this section have been described from the perspective of the service provider. Refer to your IdP documentation for instructions on configuring your IdP for federated identity. After your IdP has been enabled for identity federation, complete the tasks from the in the order that they appear:
- Oracle Access Manager Administration Console as an administrator.
- Enabling Identity Federation
- Creating an Identity Store for Account Linking
- (Optional) Enabling Automatic User Provisioning for the Local Identity Store used by Service Providers
- Creating an Identity Provider Partner
- Exporting SAML 2.0 Service Provider Metadata
- Creating a SAML Authentication Policy
- Assigning an Authentication Policy to Application Resources
Enabling Identity Federation
Prior to configuring Oracle Access Manager for Federated Identity using SAML, you need to enable Identity Federation and Security Token Service.
Enabling Security Token Services provides the following capabilities across security domains:
- Cross domain SSO for browser based Web SSO flows
- Cross domain Web Services Security (WSS) for SOAP clients and servers by means of the WS-Trust protocol
Enabling Identity Federation establishes trust between services by exchanging the following:
- X.509 certificates used for sign/verify and encrypt/decrypt the Federated messages
- Locations of the Federated services
- SAML 2.0 metadata
To enable identity federation:
- In the Launch Pad tab, under Configuration, select the Available Services.
- In the Available Services tab, click Enable for the following services:
- Identity Federation
- Security Token Service
Creating an Identity Store for Account Linking
When defining an identity provider partner record, the service provider requires local user accounts to be mapped for imposing its access control model. The process of mapping SAML user accounts from the IdP to the local user accounts at the service provider is known as account linking. In this case, external user accounts that are authenticated by the identity provider need to be mapped to generic local user accounts with permission to access resources.
To create an identity store for account linking:
- In the Launch Pad tab, under Configuration, click User Identity Stores.
- In the User Identity Stores tab, under OAM ID Stores, complete the following:
- In the User Identity Stores tab, under OAM ID Stores, click Create.
- In the Create: User Identity Store tab, complete the following:
- Enable automatic user provisioning for the local identity store used by service providers by completing the tasks in Enabling Automatic User Provisioning for the Local Identity Store used by Service Providers.
Enabling Automatic User Provisioning for the Local Identity Store used by Service Providers
When creating a local identity store mapping for SAML users, it is recommended that you ensure a corresponding user account for an identity provider user ahead of time. For example, if a user does not exist in the local store, the SAML assertion map to that user in the local identity store will fail. To handle an identity mapping failure, Oracle Access Manager Identity Federation features a plug-in that you can enable to automatically provision a missing identity to the local identity store during a federated SSO operation which enables the federated SSO to proceed.
Note:
This is an optional task. If you do not enable automatic user provisioning and a user does not exist in this generic LDAP server, then the authentication / SAML assertion can fail.To enable automatic user provisioning for the local identity store used by service providers:
Creating an Identity Provider Partner
An identity provider is responsible for managing, authenticating, and asserting a set of user identities for its service provider partners. In order for the Identity Federation service to perform SSO with external identity providers, they must be defined as trusted partners.
To create an Identity Provider Partner:
Exporting SAML 2.0 Service Provider Metadata
Establishing trust between federation partners is a prerequisite to perform any federation SSO operation between federation servers. Establishing trust involves exchanging certificate information. If a protocol relies on PKI X.509 certificates to secure message exchanges, as well as the locations and URLs of the services that implement the federation protocol, you can create a service provider SAML 2.0 metadata file in XML format for use by IdP containing information about profiles that the service provider supports. Sites acting as identity providers can import this metadata file to establish a relationship with the service provider.
To export SAML 2.0 service provider metadata:
- In the Launch Pad tab, under Configuration, click Federation Settings.
- In the Federation Settings tab, under General, click Export SAML 2.0 Metadata.
- For later use, record the location to which you export the SAML 2.0 metadata.
- Provide the metadata file to the IdP when establishing a service provider partner.
Creating a SAML Authentication Policy
When the IdP partner is created, an authentication module and scheme were also created to impose an access control model to protect Primavera application resources. The authentication scheme and module must then be mapped to an authentication policy in the application domain that is created to protect Primavera application resources.
To create an authentication policy and map the federated identity authentication scheme: