- Contents
SSO Identity Providers Technical Reference
Gather identity provider information
After you have selected an identity provider to use with your CIC Single Sign-On implementation, you must gather information from the identity provider.You will need the following information when you configure the CIC server as the service provider:
|
Item |
Description |
||
|
SAML 2.0 metadata XML file |
Starting with CIC 2015 R4, you can use an Interaction Administrator feature to import an XML file that contains the necessary information for SAML SSO communications with the third-party identity provider. |
||
|
List of supported SAML 2.0 profiles and binding implementations |
This list can be useful if, in the future, you decide to change or add another profile and binding implementation in your CIC Single Sign-On environment. |
||
|
Identity Provider signing requirement |
Does the identity provider require that <AuthnRequest> SAML messages be signed (embedded signature and X.509 certificate)? |
||
|
Additional <AuthnRequest> Identity Provider requirements |
Determine
if the identity provider requires any of the following SAML attributes:
If your identity provider requires SAML attributes, enter them through the SAML Attributes tab of the Configuration dialog box for a SAML profile and binding for the identity provider.Step 11 of the Manually configure identity provider settings procedure addresses this aspect. |
||
| Identity Provider URL address |
Depending on which identity provider method you selected, acquire the URL address to which the CIC client application (user agent) will send all SAML response messages:
|
||
| Identity Provider validation certificate |
The certificate that the CIC server will use to validate all SAML response messages from the identity provider. Contact your identity provider or consult the documentation for your identity provider for information on how to obtain the validation certificate. |
||
| Identity Provider claims |
Claims are assertion attributes that identity providers include in SAML response messages.These claims represent identifying or conditional information associate with an authentication request, such as the Windows account name of the requesting user, an e-mail address, user role, expiration time periods, computer network environment information, and many others. For example, the identity provider could include the following assertion attribute in their SAML response messages: <AttributeStatement> <Attribute
Name="http://schemas.microsoft.com/ws/2008/06/identity/claims/ <AttributeValue>EXAMPLEDOMAIN\DomainAdmin</AttributeValue> </Attribute> </AttributeStatement> For the CIC server acting as the Single Sign-On service provider, the CIC server must be able to equate the http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname SAML attribute with a CIC user ID with a matching CIC user attribute. |

