+

Search Tips   |   Advanced Search

SAML single sign-on scenarios

  1. User accesses a front end web application, which redirects user to SAML 2.0 Identity Provider (IdP).

  2. User authenticates to IdP.

  3. IdP redirects user to Assertion Consumer Service (ACS) in SP by sending SAML response over HTTP POST inside a hidden form.

  4. SAML Service Provider (SP) processes SAML response and creates WebSphere security context.
  5. SP adds LTPA cookie to HTTP response and redirects request to web resource or business application.

  6. WAS intercepts request, and maps LTPA cookie to security context and authorizes user access to the requested web resource.

  7. WAS sends HTTP response back to user.

The following images shows the SAML SSO flow:

The WebSphere SAML service provider...

The WebSphere SAML trust association interceptor (TAI) allows auditing of key SAML assertions, including Issuer and NameID.

SAML SSO features:

WebSphere Application Server supports IdP initiated SAML web SSO only.

The following specifications or scenarios are out of scope:


Related information:
Step by step guide to implement SAML 2.0 for Portal 8.5
Profiles for the OASIS Security Assertion Markup Language (SAML) V2.0
Bindings for the OASIS Security Assertion Markup Language (SAML) V2.0
Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) V2.0