Configuring SAML Security Profiles
Overview
The high-level steps to set up a TD security configuration for a SAML IdP are:
- (Titania Administrator) Export the Titania Delivery SAML Service Provider metadata as an XML file. This is the "SP metadata".
- (SAML Administrator) Register Titania Delivery with the chosen SAML IdP, using the information in the SP metadata, and additional requirements as specified in SAML Identity Provider SSO Configuration.
- (SAML Administrator) Export the "federated metadata" from the IdP, or provide the
URL for the
federated metadata.
Note: Alternatively, the required information can be entered manually in the TD security configuration form. See Manual SAML Security Configuration.
- (Titania Administrator) Set up the SAML security profile in Titania Delivery, either manually, or by importing the federated metadata.
- (Titania Administrator) As needed, associate the SAML security configuration with portal(s) that will use this IdP for authentication. See Portal Security
SP Metadata and certificates
The SAML 2.0 Identity Providers heading:
admin page provides persistent links to the following SAML resources, under the
- Service Provider Metadata
- The Entity Descriptor (SP metadata) XML for Titania Delivery, for use in configuring IdPs to accept authentication requests from Titania Delivery. The URL for this metadata is persistent for the Titania Delivery platform, and can be registered with IdP services that support automatic metadata refresh.
- SP Signing Certificate
- The certificate corresponding to the key that will be used by Titania Delivery when signing authentication requests.
- SP Encryption Certificate
- The certificate that must be used by Identity Providers when encrypting authentication responses being sent to Titania Delivery.
Entity ID and IdP-Initiated SSO
If you plan to use IdP-initiated SSO (as described in SAML V2.0 Technical Overview, Section 5.1.1), you should configure your SAML identity provider to send SAML SSO <Response> messages with a form control or URL query parameter named RelayState whose value is the fully-qualified URL of the requested portal. Otherwise, if there are multiple SAML IdP Configurations with the same Entity ID on the TD platform (across all organizations), Titania Delivery may fail to fulfill the request. If the RelayState parameter is not provided, then Titania Delivery will not display a portal page.
If you create SAML IdP Configurations with duplicate Entity IDs, and do not use IdP-initiated SSO, this will not be a problem. Duplicate Entity IDs will typically be created automatically when importing IdP federated metadata from the same provider.
Additional SAML user assertions
SAML IdPs may be configured to include additional assertions (properties) about the user with a successful authentication response. These properties are stored with the portal user object, and are available for use in portal themes and for dynamic content filtering.
SAML user assertions do not need to be registered with Titania Delivery in advance.
All such
assertions in an authentication response are put into a map
object, using the
SAML technical name as the key. This map is available as the user.properties
property.
Microsoft ADFS IdP requirements
From TD version 4.5.0 and on, Microsoft ADFS SAML IdP Relying Party Trusts property must be set as described below.
An ADFS administrator must use a PowerShell command to modify the
SamlResponseSignature
property of any relevant Relying Party Trusts.
Use the following PowerShell command to view the property:
Get-AdfsRelyingPartyTrust -Name [Relying Party Trust Name]where [Relying Party Trust Name] is the Display Name of the trust. Search for the value of the
SamlResponseSignature
property. The required value is
MessageAndAssertion
.
Use the following PowerShell command to set the property:
Set-AdfsRelyingPartyTrust -Name [Relying Party Trust Name] -SamlResponseSignature MessageAndAssertionwhere [Relying Party Trust Name] is the Display Name of the trust.