Troubleshooting the Identity Server and Authentication
353
n
ov
do
cx (e
n)
16
Ap
ril 20
10
3
Verify that the subject name of the certificate matches the DNS name of the Identity Server.
If the names match, a certificate name mismatch is not causing your problem.
If the names do not match, you need to either create a certificate that matches or import
one that matches. For information on how to create a certificate for the Identity Server, see
“
Configuring Secure Communication on the Identity Server
” in the
Novell Access
Manager 3.1 SP2 Setup Guide
.
To verify the certificate name of the Access Gateway certificate:
1
In the Administration Console, click
Devices
>
Access Gateways
>
Edit
>
[Name of Reverse
Proxy]
.
2
Read the alias name of the server certificate, then click the
Server Certificate
icon.
3
Verify that the Subject name of the server certificate matches the published DNS name of the
proxy service of the Access Gateway.
If the names match, a certificate name mismatch is not causing your problem.
If the names do not match, you need to either create a certificate that matches or import
one that matches. For information on how to create an Access Gateways certificate, see
“
Configuring the Access Gateway for SSL and Other Security Features
” in the
Novell
Access Manager 3.1 SP2 Access Gateway Guide
.
To view sample log entries that are logged to the
catalina.out
file when the certificate has an
invalid name, see
“The Server Certificate Has an Invalid Subject Name” on page 356
.
15.2.4 Certificates in the Required Trust Stores
Make sure that the issuers of the Identity Server and Embedded Service Provider certificates are
added to the appropriate trusted root containers.
When the server certificates are sent from the identity provider to the service provider client, and
from the service provider to the identity provider client, the client needs to be able to validate the
certificates. Part of the validation process is to confirm that the server certificate has been signed by
a trusted source. To do this, the issuers of the server certificate (intermediate and trusted roots) must
be imported into the correct trusted root stores:
The intermediate and trusted roots of the Embedded Service Provider certificate must be
imported into the NIDP Trust Store.
The intermediate and trusted roots of the Identity Server certificate must be imported into the
ESP Trust Store.
If you use certificates generated by the Administration Console CA, the trusted root certificate is the
same for the Identity Server and the Embedded Service Provider. If you are using external
certificates, the trusted root certificate might not be the same, and there might be intermediate
certificates that need to be imported.
To verify the trusted root certificates:
1
In the Administration Console, click
Security
>
Certificates
.
2
Determine the issuer of the Identity Server certificate and the Embedded Service Provider
certificate:
2a
Click the name of the Identity Server certificate, note the name of the Issuer, then click
Close
.
Summary of Contents for ACCESS MANAGER 3.1 SP2 - README 2010
Page 4: ...4 Novell Access Manager 3 1 SP2 Identity Server Guide novdocx en 16 April 2010...
Page 12: ...12 Novell Access Manager 3 1 SP2 Identity Server Guide novdocx en 16 April 2010...
Page 158: ...158 Novell Access Manager 3 1 SP2 Identity Server Guide novdocx en 16 April 2010...
Page 172: ...172 Novell Access Manager 3 1 SP2 Identity Server Guide novdocx en 16 April 2010...
Page 182: ...182 Novell Access Manager 3 1 SP2 Identity Server Guide novdocx en 16 April 2010...
Page 290: ...290 Novell Access Manager 3 1 SP2 Identity Server Guide novdocx en 16 April 2010...
Page 362: ...362 Novell Access Manager 3 1 SP2 Identity Server Guide novdocx en 16 April 2010...
Page 374: ...374 Novell Access Manager 3 1 SP2 Identity Server Guide novdocx en 16 April 2010...