Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Info

This article is valid for Smart ID 20.11 and later.

...

Element

Attribute

Description

EntityDescriptor 

The common root element for definitions of IDP and SP.

entityID 

By convention, a symbolic URL can be used both for an IDP and a SP but any identifier is allowed. The number of characters is limited to 1024.

xmlns:md 

Namespace definition of SAML V2.0 metadata.

KeyDescriptor 

Provides information about the cryptographic key(s) an entity uses for signing and encryption. The contents, including the certificate, follow the XML Signature standard.

use 

Allowed values are "signing" and "encryption". This attribute is optional. If it is not used the assumption is that the same certificate is used for both signing and encryption.

NameIDFormat 

Elements indicate what SAML name identifier formats the service supports.

SPSSODescriptor:

Element for the definition of a SP.

protocolSupportEnumeration 

Support for the SAML V2.0 protocol namespace.

AuthnRequestsSigned 

Indicates if the SAML request sent by the SP must be signed. This attribute is optional. Defaults to "false" if not set.

WantAssertionsSigned 

Indicates if the Assertion elements in the SAML response must be signed. This attribute is optional. Defaults to "false" if not set.

Note

The signature check is a fundamental security mechanism of the SAML protocol. Therefore, it is strongly recommended to set AuthnRequestSigned AuthnRequestsSigned and WantAssertionSigned WantAssertionsSigned to true.

AssertionConsumerService

The service the SP defines to process the SAML response.

Binding 

Mapping of the SAML protocol message onto a standard communication protocol. Value "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST" required.

Location 

The URI under which the endpoint is reachable. Must include the path /saml/SSO/alias/<alias>.

index 

A unique integer of the endpoint for reference in a protocol message.

...

  1. Go to Manage Resource Access > SAML Federation.

  2. Click Add SAML Federation....

  3. Enter a Display Name, for example IDENTITYMANAGER.

  4. Check Acting as Identity Provider.

  5. Uncheck Import metadata automatically.

  6. Go to the Export tab.

  7. Give a unique Entity ID: for example https://hag.local/idp.

  8. Select the Signing Certificate, for example SAML IdP Signing.

  9. Go to the Role Identity Provider tab and click Add service provider...

  10. Verify that SAML 2.0 is checked.

  11. Upload SAML 2.0 metadata, click Choose file and select the file that was created before (for example IdM_saml_metadata.xml). Click Next.

  12. Confirm the message about the signer certificate by clicking Yes.

  13. Click Finish Wizard.

  14. Click on the created service provider, to open it.
    The Display Name and Entity ID is now updated according to the metadata file.

    Note

    Entity ID must be unique within the federation, for example https://<idmhost>/sp

    Service Provider URL is where the IdP will redirect the user after successful authentication, so this must be an exact match with the SP domain, in this case https://<idmhost>/saml/SSO 

    Example: https://<idmhost>/saml/SSO  

    <idmhost> must be the same as the url that was called initially. To be sure that the SAML request and response belong together, the communication must go to the same url and protocol (http or https), and both IdP and SP must be synchronized in terms of time.

    To set up NTP in Digital Access, see Deploy Digital Access component.

     

  15. Disable Require signed authentication request 

  16. Go to the Assertion Settings tab.

  17. In Subject > Select source of subject: select E-mail. This is the unique identifier Identity Manager uses in standard cases, and will be used when Digital Access sends a SAML ticket to Identity Manager.

  18. Go to the tab Manage Access Rules.

  19. Select any suitable access rule or leave it as Any Authentication.  

  20. Click Finish Wizard and then Add

  21. Repeat the same steps to add Smart ID Self-Service as an additional service provider.  

...