+

Search Tips   |   Advanced Search

SAML single sign-on summary

Business flow

The WebSphere SAML service provider supports identity provider initiated SSO by leveraging a SAML2 Trust Association Interceptor (TAI).

  1. User accesses a front end web application, which redirects user to an IdP such as IBM Security Identity Manager or ForgeRock.

  2. User authenticates to the identity provider.

  3. The identity provider redirects user to the Assertion Consumer Service (ACS) in the WebSphere service provider by sending SAML response over HTTP POST inside a hidden form.

  4. Service provider processes SAML response and creates a WebSphere security context.

  5. Service provider adds LTPA cookie to HTTP response and redirects request to web resource or business application.

  6. WAS intercepts request, and maps LTPA cookie to security context and authorizes user access to the requested web resource.

  7. WAS sends HTTP response back to user which redirects user to the front end web application.

Flow...


WebSphere SAML service provider


Assertion Consumer Services

The Assertion Consumer Service (ACS) servlet is deployed to an application security domain, accepting SAML protocol messages (SAMLResponse) for a TAI. Upon successful validation a security context is established and the request is redirected to the target business application.

The ACS URL has a predefined ContextRoot of /samlsps...


Multiple security domain support

An ACS is deployed in an application security domain, and it is expected that the ACS reside in the same security domain as the business application. If the ACS and target business application (RelayState) are in different security domains, the following are some recommended options:


Multiple single sign-on partners

The WebSphere SAML TAI supports multiple ACS and IdP single sign-on (SingleSignOnService) partners. One SSO partner is defined as one ACS URL, and can have multiple SingleSignOnService objects. With the existence of multiple SSO partners, each SSO partnership is uniquely identified by an ACS URL. Each SSO partner can have its own validation rules, mapping rule from assertion to subject, or a rule to start the SSO with its own IdP. For example, one SSO partner can handle ID assertion, which consists of generating a WebSphere platform subject without calling into the user registry. Another SSO partner can perform a local user registry lookup. Another example is that one SSO partner handles SSO with one IdP, and another SSO partner handles SSO with a different IdP.


Bookmark style SSO and TAI filter

  1. User access a business application.

  2. The WebSphere SAML TAI initiates single sign-on to an SSO partner

  3. The SSO partner hosts an IdP login application with a routing filter

  4. Routing filter selection rules match against the HTTP request...

    • HTTP request header
    • referrer data
    • target application name

  5. The WebSphere SAML TAI runtime environment checks the user request against all filter rules to uniquely identify the SSO partner, and redirects the request to the selected IdP login application.

    The TAI filter allows an IdP-initiated SSO to provide similar functionality as the combination of an SP-initiated SSO and an IdP discovery service.


Identity mapping and security context management

The WebSphere SAML TAI provides:

WAS supports IdP initiated SAML web SSO only.

The following specifications or scenarios are out of scope:


See also

  • Profiles for the OASIS SAML V2.0
  • Bindings for the OASIS SAML V2.0
  • Assertions and Protocols for the OASIS SAML V2.0