196
Novell Access Manager 3.1 SP2 Identity Server Guide
n
ov
do
cx (e
n)
16
Ap
ril 20
10
Authentication Card:
See
Section 7.10, “Managing the Authentication Card of an Identity
Provider,” on page 216
.
You can modify the following features of a service provider:
Communication Security:
See
Section 7.5, “Configuring Communication Security,” on
page 196
.
Attributes to Send in the Response:
See
Section 7.6.2, “Configuring the Attributes Sent with
Authentication,” on page 201
.
Intersite Transfer Service:
See
“Configuring an Intersite Transfer Service Target for a
Service Provider” on page 221
.
Metadata:
See
Section 7.7, “Managing Metadata,” on page 203
.
Authentication Response:
See
Section 7.9, “Configuring an Authentication Response for a
Service Provider,” on page 212
.
7.5 Configuring Communication Security
The communication security settings control the direct communication between the Identity Server
and a trusted provider across the SOAP back channel. You can secure this channel with one of three
methods:
Message Signing:
This is the default method, and the Identity Server comes with a test signing
certificate that is used to sign the back-channel messages. We recommend replacing this test signing
certificate with a certificate from a well-known certificate authority. This method is secure, but it is
CPU intensive. For information on replacing the default certificate, see
Section 1.3.3, “Managing
the Keys, Certificates, and Trust Stores,” on page 29
.
Mutual SSL:
This method is probably the fastest method, and if you are fine-tuning your system for
performance, you should select this method. However, it requires the exchange of trusted root
certificates between the Identity Server and the trusted provider. This exchange of certificates is a
requirement for setting up the trust relationship between the two providers. To verify that you have
exchanged certificates, see
Section 1.3.3, “Managing the Keys, Certificates, and Trust Stores,” on
page 29
.
Basic Authentication:
This method is as fast as mutual SSL and the least expensive because it
doesn’t require any certificates. However, it does require the exchange of usernames and passwords
with the administrator of the trusted provider, which might or might not compromise the security of
the trusted relationship.
If your trusted provider is another Identity Server, you can use any of these methods, as long as your
Identity Server and the trusted Identity Server use the same method. If you are setting up a trusted
relationship with a third-party provider, you need to select a method supported by that provider.
For configuration information, see the following sections:
Section 7.5.1, “Configuring Communication Security for Liberty and SAML 1.1,” on page 197
Section 7.5.2, “Configuring Communication Security for a SAML 2.0 Identity Provider,” on
page 197
Section 7.5.3, “Configuring Communication Security for a SAML 2.0 Service Provider,” on
page 199
Summary of Contents for ACCESS MANAGER 3.1 SP2 - README 2010
Page 4: ...4 Novell Access Manager 3 1 SP2 Identity Server Guide novdocx en 16 April 2010...
Page 12: ...12 Novell Access Manager 3 1 SP2 Identity Server Guide novdocx en 16 April 2010...
Page 158: ...158 Novell Access Manager 3 1 SP2 Identity Server Guide novdocx en 16 April 2010...
Page 172: ...172 Novell Access Manager 3 1 SP2 Identity Server Guide novdocx en 16 April 2010...
Page 182: ...182 Novell Access Manager 3 1 SP2 Identity Server Guide novdocx en 16 April 2010...
Page 290: ...290 Novell Access Manager 3 1 SP2 Identity Server Guide novdocx en 16 April 2010...
Page 362: ...362 Novell Access Manager 3 1 SP2 Identity Server Guide novdocx en 16 April 2010...
Page 374: ...374 Novell Access Manager 3 1 SP2 Identity Server Guide novdocx en 16 April 2010...