Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Published by Scroll Versions from space IDS and version 8.2.0

...

The identity is generated in a file named identity.properties. This file is located in a subfolder of the Service Provider configuration directory.

Code Block
languagetext
themeRDark
titleListing 1. Creating the Service Provider identity
Windows Server 2003:

cd /d "%ALLUSERSPROFILE%\Application Data\Ubisecure\Ubisecure.SAML2.ServiceProvider"
mkdir sp
"%ProgramFiles%\Ubisecure\Ubisecure.SAML2.ServiceProvider\bin\saml2.exe" Generate ^
	https://sp.example.com/webapp/spsso.ashx -o sp

Windows Server 2008:

cd /d "C:\ProgramData\Ubisecure\Ubisecure.SAML2.ServiceProvider"
mkdir sp
"C:\Program Files\Ubisecure\Ubisecure.SAML2.ServiceProvider\bin\saml2.exe" Generate ^
	https://sp.example.com/webapp/spsso.ashx -o sp

...

  1. First, create the SP metadata file using the saml2.exe command in Listing 2.

    Code Block
    languagetextthemeRDark
    titleListing 2. Write the SAML metadata of the Service Provider to the c:\temp\sp.xml file
    Windows Server 2003:
    
    cd /d "%ALLUSERSPROFILE%\Application Data\Ubisecure\Ubisecure.SAML2.ServiceProvider" 
    "%ProgramFiles%\Ubisecure\Ubisecure.SAML2.ServiceProvider\bin\saml2.exe" Metadata ^
    	sp -f c:\temp\sp.xml
    
    Windows Server 2008:
    
    cd /d "C:\ProgramData\Ubisecure\Ubisecure.SAML2.ServiceProvider"
    "C:\Program Files\Ubisecure\Ubisecure.SAML2.ServiceProvider\bin\saml2.exe" Metadata ^
    	sp -f c:\temp\sp.xml


  2. Use Ubisecure Management to create the web application.
    1. Create a web application
    2. Select Type SAML Service Provider (Figure 1)
    3. Press Activate
    4. Select the file that was created in Listing 2 (c:\temp\sp.xml) to be uploaded or paste the sp.xml file contents in the text window provided (Figure 2)
    5. Click OK
    6. The SAML Service Provider ID is now shown. (Figure 3) Click Update
    7. Copy the SAML Service Provider ID (entity ID) text shown in Figure 3. It will be used later when configuring the web.config file.
    8. Ensure the application has appropriate methods enabled and access to the application is configured in the Allowed To tab. An appropriate Authorization Policy is required to define which additional attributes will be available to the ASP.NET application. For more information on Web Application and Authorization Policy configuration, please refer to the SSO Management.

...

Download the Ubisecure IDP metadata from the SAML 2.0 link on the Ubisecure Management home page. Save this file using the name idp.xml in the folder below according to the operating system used:

Code Block
languagetextthemeRDark
Windows 2003:

%ALLUSERSPROFILE%\Application Data\Ubisecure\Ubisecure.SAML2.ServiceProvider\sp\metadata

Windows 2008:

C:\ProgramData\Ubisecure\Ubisecure.SAML2.ServiceProvider\sp\metadata

...

Copy the attribute authority (AA) metadata to the file listed below according to the operating system used:

Code Block
languagetextthemeRDark
Windows 2003:

%ALLUSERSPROFILE%\Application Data\Ubisecure\Ubisecure.SAML2.ServiceProvider\sp\metadata\aa.xml

Windows 2008:

C:\ProgramData\Ubisecure\Ubisecure.SAML2.ServiceProvider\sp\metadata\aa.xml

...