Solved

OpenAM Installing Service Provider Certificate

Posted on 2013-02-06
3
275 Views
Last Modified: 2014-10-18
I'm currently trying to implement SSO assertion through SAML 2.0 certificate assertion on OpenAM 10.0, and the Service Provider only supplied their certificate, PartnerMyCompany.cer.

1. How do i register the partner as a Service Provider using SMAL 2.0 XML schema with the certificate key in the XML?

2. How do I install the partners' certificate in OpenAM so that I can create a circle of trust with the partners' certificate key?

I need to be authenticated with my partner's certificate to get access to services. I need to create the XML with the partners' certificate key. How do i do this?
<EntityDescriptor entityID="https://www.partner.com/" xmlns="urn:oasis:names:tc:SAML:2.0:metadata">
	<SPSSODescriptor AuthnRequestsSigned="false" WantAssertionsSigned="false" protocolSupportEnumeration="urn:oasis:names:tc:SAML:2.0:protocol">
		<NameIDFormat>
			urn:oasis:names:tc:SAML:2.0:nameid-format:transient
		</NameIDFormat> 
		<AssertionConsumerService index="1" Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST" Location="https://www.partner.com/Login/MyCompany/SSO.svc/invoke"/>
	</SPSSODescriptor>
</EntityDescriptor>

Open in new window

0
Comment
Question by:digitsung
3 Comments
 
LVL 12

Accepted Solution

by:
mwochnick earned 500 total points
ID: 38868495
Assuming the XML above is a modified sample from your partner
After you login to openAM as the administrator
Click on Register Remote Service Provider
Once in there
Select that you want to upload the meta data from a file
pick your file
upload it

On this screen you also need to pick an existing COT or create a new one

finally you will need to map the the fields you will receive from you partner to the fields in your Idp
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Protect jar file - windows app 2 38
base64 decode encode 12 119
Java Jpanels and Jframe 8 28
reverse digits of a number using for loop 5 36
The Confluence of Individual Knowledge and the Collective Intelligence At this writing (summer 2013) the term API (http://dictionary.reference.com/browse/API?s=t) has made its way into the popular lexicon of the English language.  A few years ago, …
Java functions are among the best things for programmers to work with as Java sites can be very easy to read and prepare. Java especially simplifies many processes in the coding industry as it helps integrate many forms of technology and different d…
This tutorial covers a step-by-step guide to install VisualVM launcher in eclipse.
This theoretical tutorial explains exceptions, reasons for exceptions, different categories of exception and exception hierarchy.

932 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now