Authenticate with SiteMinder R12 Protected Resource Assertion
The Authenticate with SiteMinder R12 Protected Resource Assertion instructs the gateway to delegate the authentication and authorization tasks required to gain access to a protected Web service to the CA Single Sign-On Policy Server version 12.0, running in FIPS-only mode.
gateway92
This assertion is deprecated.
CA Technologies recommends using the Authenticate Against CA Single Sign-On Assertion, which does not require separate installation.The
Authenticate with SiteMinder R12 Protected Resource Assertion
instructs the CA API Gateway
to delegate the authentication and authorization tasks required to gain access to a protected Web service to the CA Single Sign-On Policy Server version 12.0, running in FIPS-only mode.For instructions on how to install this assertion, see Install the SiteMinder R12 Protected Resource Assertion. Once installed, this assertion is available from both the Access Control and Custom Assertions palettes.
Note the following when using this assertion:
- You may receive an HTTP Basic authentication warning when the CA Single Sign-On R12 Protected Resource assertion is used with these assertions: Require XPath Credentials, Require FTP Credentials, or Require WS-Security UsernameToken Profile Credentials. You may ignore this policy validation warning.
- When used in a policy that includes the Require HTTP Basic Credentials and Require HTTP Cookie assertions, ensure that the "HTTP Basic" assertion comesafterthe "HTTP Cookies" assertion.
- When running this assertion in the browser client, a triangular warning icon (
) may appear next to the dialog box when the assertion properties is displayed. You may ignore this icon.
Contents:
Context Variables Created by This Assertion
Usage Rules
Note the following rules when using the Authenticate with SiteMinder R12 Protected Resource assertion:
- This assertion cannot be used with:
- Authentication assertions that encrypt passwords, such as the Require SSL or TLS Transport Assertion (with client authentication)
- This assertion can be used with:
- Require SSL or TLS Transport Assertion (without client authentication enabled)
- Any other assertion not mentioned in the above exclusion list.
- A policy should contain only a single Authenticate with SiteMinder R12 Protected Resource assertion per authentication scheme. However, multiple occurrences of this assertion is possible in complex policies that contain multiple authentication schemes.You may receive a warning when the assertion is used multiple times on one policy path ("Warning: You already have an access control Custom Assertion in this path.") You may ignore this policy validation warning
Using the assertion
- Do one of the following:
- To add the assertion to the policy development window, drag and drop the assertion from the palette.
- To change the configuration of an existing assertion, proceed to step 2 below.
- Right-clickAuthenticate with SiteMinder R12 Protected Resourcein the policy window and chooseAuthenticate with SiteMinder R12 Protected Resourceor double-click the assertion in the policy window. The assertion properties are displayed.
- Configure the dialog as follows:SettingDescriptionAgent IDEnter the name of the CA Single Sign-On Agent to use. The name may be omitted when only one agent is configured.Protected ResourceEnter the name of the resource being protected by the CA Single Sign-On Policy Server.ActionEnter the action (such as “POST” or “GET”) for the protected resource. The default action isPOST.Authorize via CA Single Sign-On CookieSpecify how authorization should occur:
- Select this check box to have the assertion attempt to gather a valid CA Single Sign-On cookie and place it in the HTTP Response.
- Clear this check box to not add a CA Single Sign-On cookie to the HTTP Response.
If authorizing via CA Single Sign-On Cookie, specify how to obtain the cookie:- Use cookie from request:Choose this option to have the assertion attempt to gather the CA Single Sign-On cookie from the HTTP Request and add it to the HTTP Response with the name specified in the adjacent field.
Default CA Single Sign-On cookie name:SMSESSION- Use cookie from variable:Choose this option to have the assertion attempt to gather a valid CA Single Sign-On cookie from the context variable specified in the adjacent field (in the format "${cookieName}".
The Gateway will log audit code 8001 if a valid cookie could not be found.The action and resource values are determined by the settings in the realm that is used by the Gateway custom agent in the CA Single Sign-On Policy Server. Consult your Administrator for information about the action and resource properties. - Click [OK] when done.
Troubleshooting
If configuration errors exist in the CA Single Sign-On Policy Server or the Gateway, then one of the following error messages will appear in the Gateway Audit Events window when the SiteMinder R12 Protected Resource assertion is used in a policy.
Contact your Administrator if you encounter authentication errors.
Error Message | Description |
SEVERE: Unable to connect to the CA Single Sign-On Policy Server | This error message appears when:
An error message indicating a CA Single Sign-On Agent initialization failure is also displayed. Verify the CA API Gateway and CA Single Sign-On Policy Server connection settings. |
SEVERE: The CA Single Sign-On Agent name and/or the secret is incorrect | This error message appears when the agent name and/or the secret is not configured correctly. |
WARNING: Authorization (access control) failed | This error message appears when the Gateway connection credentials are not authenticated or authorized by the CA Single Sign-On Policy Server. You will be prompted to re-enter your user name and/or password. Ensure that the user name and password entered in the CA API Gateway - XML VPN Client match those configured in the user database used by the CA Single Sign-On Policy Server to authenticate and authorize users. |
The following error messages relate to port numbers defined in the siteminder12.agent.configuration cluster property. For detailed information about this cluster property, see Install the SiteMinder R12 Protected Resource Assertion. | |
SEVERE: Siteminder configuration error: authentication port not defined | This error message appears when the authentication port is not defined properly. |
SEVERE: Siteminder configuration error: authorization port not defined | This error message appears when the authorization port is not defined properly |
SEVERE: Siteminder configuration error: accounting port not defined | This error message appears when the accounting port is not defined properly |