Introduction
...
How to configure the SAML authentication adapter
Make sure the server can authenticate against the metadata URL (it should have internet access, or at least access to the microsoft URL)
SAML authentication adapter is configured in CXO-Cockpit Configurator tool.
...
- Identity Provider Metadata URL (required)
URL to the metadata of Identity Provider. - Identity Provider EntityId (required)
The EntityId parameter is the unique identifier of the identity provider. EntityId can be obtained from metadata file of the Identity Provider (entityID attribute) - Username claim (optional)
Claim name which will be used for mapping users authenticated by Identity Provider and CXO users. By default nameidentifier claim (http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier) will be used. If you decide to use different claim, make sure that the claim is unique within your Identity Provider.
Note: nameidentifier claim should be always sent by Identity Provider even if "username claim" parameter is set to different value. - Signing Certificate Location Type (required)
Signing certificate is used for signing logout requests to the Identity Provider. The certificate can be loaded from either a file or from a certificate store.
It is recommended to use certificate store in production environment. The private key from the certificate will be used for signing messages send by Service Provider (CXO-Cockpit). The public key will be exposed in the metadata file of the Service Provider (CXO-COCKPIT) and should be used by Identity Provider to verify that messages were sent by Service Provider (CXO-Cockpit).
Signing certificate has to be a x509 certificate with a private key. If you are using x509 certificate for SSL, you can use the same certificate for signing SAML requests. Please contact your Identity Provider, in order to check requirements about signing certificate.
The Identity Provider should trust the Certificate Authority which issued signing certificate used by Service Provider (CXO-Cockpit). - Signing Certificate Path (required if Signing Certificate Location Type set to "File")
File Path to the signing certificate. The certificate should not be password protected - Signing Certificate Store Name (required if Signing Certificate Location Type set to "CertificateStore")
Specifies the X.509 store name to search for the certificate. For example, My includes personal certificates. - Signing Certificate Store Location
Specifies the location of the store to search for the certificate. - Signing Certificate x509FindType
Specifies the field that will be search for a match to the value in "Signing Certificate Find Value".
It is recommended to use "FindBySerialNumber" option.
Note: If you use "FindBySerialNumber" option make sure that copied serial number does not have spaces.
Make sure that there is no hidden character before the first hex digit (When copying a serial number from the certificate info it might happen that a hidden character will be added before the first hex digit) - Signing Certificate Find Value
Specifies a search term to use to find the certificate. The value will be searched for in the field specified by the "Signing Certificate x509FindType" attribute.
Important! Service account should have read access to the private key of the singing certificate. In order to check that:- Find the singing certificate in the certificate store.
- Right click → All tasks → Manage Private Keys
- Add the user to the list. make sure that Read Permission is checked.
- Outbound Signing Algorithm
- Specifies signing algorithm for outbound messages. The same value must be set on IDP side.
- Specifies signing algorithm for outbound messages. The same value must be set on IDP side.
- AuthnContext ClassRef
- Specifies URI reference identifying authentication context class.
- Can contain full URN (e.g. urn:oasis:names:tc:SAML:2.0:ac:classes:WindowsProtectedTransport) or only class name (e.g. WindowsProtectedTransport).
- Note: If not set, RequestedAuthnContext element will not be sent to IDP.
- AuthnContext Comparison
- Specifies the comparison method used to evaluate the requested context class. If not set, ‘Exact’ value is used.
- Note: This setting is used only if AuthnContext ClassRef is not empty.
- Use HTTP-POST binding for Authn request
- Enforces HTTP-POST authentication request binding for SAML.
- If this option is enabled the metadata will no longer be automatically (every hour) reloaded from IDP. In order to reload metadata (e.g. due to signing credentials change) CXO web application must be restarted.
- Note: this option should not be enabled unless HTTP-Redirect binding is not preferred on the client side (e.g. due to MS 208427 - maximum-url-length-is-2-083-characters-in-internet-explorer)
Please make sure that "CXO-Cockpit Dashboard Url" setting has correct value. CXO-Cockpit Dashboard Url setting is used for generating Service Provider (CXO-Cockpit) metadata file.
...