+

Search Tips   |   Advanced Search

Configure WebSphere Application Server as a SAML service provider for an identity provider

  1. Enable the SAML Web SSO feature.
  2. Import SAML Idp metadata into WAS SAML service provider as a partner
  3. Add IdP realms to the list of inbound trusted realms
  4. Add the WAS SAML service provider to the identity providers
  5. Configure the WAS security context


Import SAML Idp metadata into WAS SAML service provider as a partner

Add an identity provider, such as ISIM or ForgeRock, to the WAS SAML service provider as a partner...

Add IdP realms to the list of inbound trusted realms

For each Identity provider used with our WAS service provider, grant inbound trust to all realms used by the identity provider.


Add the WAS SAML service provider to the identity providers

Each identity provider used with our WAS service provider needs to be configured to add the service provider as an SSO partner. The procedure for adding the service provider partner to an identity provider depends on the specific identity provider.

We can either export the WAS service provider metadata, and import it to the identity provider, or manually configure the identity provider to add the service provider.

To add the service provider as a federation partner to an identity provider, provide the URL of the Assertion Consumer Service (ACS) of the service provider, which is the -acsUrl parameter used when enabling the SAML trust association interceptor (TAI).

If an identity provider can use a metadata file to add the service provider as a federation partner, we can export the service provider metadata:

This command creates the /tmp/spdata.xml metadata file.

If the SAML token is encrypted, provide the public key certificate that we want the identity provider to use for encrypting the SAML token, and the certificate must exist in the WAS default KeyStore before performing an export.


Configure the WAS security context using the attributes

The WAS service provider intercepts a SAML protocol message from the identity provider and creates the security context by mapping the assertion.

SAML assertion mapping options...

When doing ID assertion to create a security context, a custom security realm is chosen. We must explicitly add the custom realm as a trusted realm. In a default ID assertion implementation, the SAML issuer name is used as the security realm. We must explicitly add the issuer name to the list of inbound trusted authentication realms in current user registry. After adding the custom realm to the inbound trusted realms, we are ready to do role mapping with this custom realm.


See also

  1. Use the SAML web single sign-on (SSO) feature
  2. SAML web single sign-on (SSO) TAI custom properties