Configuring ICF Services for SAML Authentication

Use

By default, all Internet Communication Framework (ICF) services that are to be accessed using HTTP have the SAML authentication mechanism enabled. You can use this procedure to configure SAML authentication at service level.

Prerequisites

Procedure

Using SAML 2.0 in the ICF Logon Procedure

You specify the ICF logon procedure by using the Procedure option in the Logon Data tab of the selected service. You can use SAML 2.0 authentication in one of the two options:

  • Standard logon procedure

    By default, each ICF service is configured with a standard logon procedure consisting of eight authentication mechanisms. SAML authentication is at seventh place, sorted from top priority down. If an HTTP request delivers credentials for one of the six mechanisms before SAML, they will be processed by the corresponding mechanism, and SAML will not be triggered.

  • Alternative logon procedure

    If you choose the Alternative Logon Procedure option, you can remove some of these mechanisms from the list but you cannot change their priorities.

Unlike the rest of the authentication mechanisms in the list, SAML 2.0 does not rely on credentials contained in the HTTP request. ICF will trigger SAML 2.0 authentication if the HTTP request does not contain credentials for any of the six mechanisms, and the prerequisites for SAML authentication are met.

Changing the SAML Configuration of an ICF Service

  1. Double click the service node.

  2. In the Logon Data tab, choose Change.

    The data becomes editable.

  3. Choose the SAML Configuration pushbutton.

  4. Deselect the Use Configuration Data from Superordinate Node option.

    By default, this option is selected. It means the node will inherit the configuration of the superordinate node.

  5. If necessary, specify the SAML 2.0 logon policy as required.

Specifying SAML 2.0 Logon Policies

Policies apply specific authentication logic when a protected resource is requested.

  • To force an identity provider to always re-authenticate the user, even if the user already has an active session, choose a policy configured to require forced re-authentication. Use this option to protect particularly sensitive applications, by ensuring the user is who he or she claims to be.

  • To require the identity provider to only use authentication methods that do not require user interaction, such as certificate logon, enter passive authentication. Use this option if the process of logging on would disorient or worry the user.

You create SAML 2.0 logon policies in the SAML configuration user interface. For more information, see Protecting Web Applications with SAML.

There are two ways to specify a logon policy:

  • At an ICF service level

    You can set a logon policy at ICF service level only from the default client (000).

  • At an external alias level

    You can set a logon policy at external alias level from any client.

Disabling SAML 2.0 Authentication

There are three alternative ways to disable SAML 2.0 authentication:

  • By disabling the SAML local provider

    For more information, see Disabling the SAML Service Provider.

  • By disabling the SAML trusted providers

    If there is no active trusted provider configured, SAML authentication cannot function.

  • By calling the protected resource with URL parameter "saml2" set to "disabled"