Configuration settings for SAML authenticated connections | HCL Digital Experience
To enable a connection policy for SAML-based authentication, the following settings must be defined in the metadata section of the policy, the policy mapping, or the default mapping.
- SSO_SAML20_IDP
- The unique name of the Identity Provider, for example,
IdpName
. This metadata enables the policy for SAML-based authentication and is used to locate the Identity Provider settings. This metadata is required to support SAML-based authentication. Refer to the following example:<meta-data> <name>SSO_SAML20_IDP</name> <value>IdpName</value> </meta-data>
Important: For the remaining settings,IdpName
refers to the name of the Identity Provider that you specified in the SSO_SAML20_IDP setting. - IdpName.IDP_HOST
- The host name or IP address of the identity provider. This setting is required. Refer to the
following example:
<meta-data> <name>IdpName.IDP_HOST</name> <value>www.mytfim.org</value> </meta-data>
- IdpName.IDP_PROTOCOL
- This setting defines how the Identity Provider is connected and has two possible values, either
http
orhttps
. Refer to the following example:<meta-data> <name>IdpName.IDP_PROTOCOL</name> <value>https</value> </meta-data>
- IdpName.IDP_PORT
- This setting defines the TCP port that is used for the Identity Provider connection. The default
value is 80. Refer to the following
example:
<meta-data> <name>IdpName.IDP_PORT</name> <value>9443</value> </meta-data>
- IdpName.IDP_URI
- The URI of the Identity Provider service to which the SAML authentication is submitted. If this
metadata setting is not defined, the connection uses the default URI
/SAML2/SSO/POST. Refer to the following
example:
<meta-data> <name>IdpName.IDP_URI</name> <value>/idp/saml20/post</value> </meta-data>
- IdpName.IDP_TIMEOUT
- The timeout value of the connection to the Identity Provider. If this metadata setting is not
defined, the connection timeout is 60 seconds. Refer to the following example:
<meta-data> <name>IdpName.IDP_TIMEOUT</name> <value>120</value> <!-- wait 2 minutes --> </meta-data>
- IdpName.IDP_AUTH_TOKEN_SOURCE
- Optional parameter that determines from where the authentication
tokens for the IDP are taken. The default value is
ltpa
. The SAML authentication protocol begins with a request to the Identity provider. This request contains an authentication token, used to identify the caller at the Identity provider. The IdpName.IDP_AUTH_TOKEN_SOURCE parameter determines where this authentication token is taken from. Currently, two values are enabled:ltpa
- If the value
ltpa
is defined, then the Ajax proxy creates an LTPA token from the user subject of the Ajax proxy connection. This LTPA token is submitted to the Identity provider to authenticate the IDP request. For most authentication scenarios that are based on Tivoli Federated Identity Manager, theltpa
setting is the preferred one. cookies
- If the value
cookies
is defined, then the Ajax proxy uses authentication cookies from the local connection to authenticate the IDP request. The authentication cookie names are defined in the IdpName.IDP_AUTH_TOKEN.n metadata settings.
<meta-data> <name>IdpName.IDP_AUTH_TOKEN_SOURCE</name> <value>cookies</value> <! -- take cookie list from IDP_AUTH_TOKEN_COOKIE.n as authentication tokens --> </meta-data>
- IdpName.PARAM_NAME.n and IdpName.PARAM_VALUE.n
- IdpName.PARAM_NAME.n is the name of a URL query parameter to
the Identity Provider. Use this setting with IdpName.PARAM_VALUE.n, which defines the value of a URL query
parameter to the Identity Provider. For both settings, n is a
counter beginning with 1. Refer to the following example:
<meta-data> <name>IdpName.PARAM_NAME.1</name> <value>RequestBinding</value> </meta-data> <meta-data> <name>IdpName.PARAM_VALUE.1</name> <value>HTTPPost</value> </meta-data>
- IdpName.IDP_AUTH_COOKIE.n
- The name of the authentication cookie, where n is a counter beginning with 1.
If this metadata setting is not defined, the default authentication cookie is
SAML20
. Refer to the following example:<meta-data> <name>IdpName.IDP_AUTH_COOKIE.1</name> <value>SAML20</value> </meta-data> <meta-data> <name>IdpName.IDP_AUTH_COOKIE.2</name> <value>another_cookie</value> </meta-data>
- IdpName.IDP_AUTH_TOKEN_COOKIE.n
- The name of the authentication cookie that is used to
authenticate against the Identity Provider to start the SAML authentication
protocol. This metadata is only effective if the metadata IdpName.IDP_AUTH_TOKEN_SOURCE is set to
cookies
. Otherwise, the settings are ignored. The following example defines the authentication cookiesMSISAuthenticated
,MSISAuth
, andMSISAuth1
.<meta-data> <name>IdpName.IDP_AUTH_TOKEN_COOKIE.1</name> <value>MSISAuthenticated</value> </meta-data> <meta-data> <name>IdpName.IDP_AUTH_TOKEN_COOKIE.2</name> <value>MSISAuth</value> </meta-data> <meta-data> <name>IdpName.IDP_AUTH_TOKEN_COOKIE.3</name> <value>MSISAuth1</value> </meta-data>