logback.xml
file:
spring-security.xml
in the filter chain:
http://your-app-server/saml/metadata/
.
This should generate the SP metadata XML file describing the applications configuration which can then be imported to almost any compliant IdP in the administration console/configuration.
java.security.InvalidKeyException
or similar stating ‘Illegal Key Size’. This is because a key has been used with a size larger than that which the JVM accepts by default. This is a known Java issue to do with cryptography restrictions shipped with a standard JVM. The solution is to install the ‘unrestricted JCE policy files’ in the JVM on which the application is running. You can obtain this from Oracle and it is usually installed in the JRE directory in lib/security
. Make sure you install the files for the correct version of Java.
<saml:Issuer>
in the SAML payload.<saml:Audience>
in the SAML payload.Configure Fusion for SAML
https://www.my-idp.com/<my-app-path>/sso/saml
http://www.my-idp.com/exk686w2xi5KTuSXz0h7
.
<saml:Issuer>
in the SAML payload.audienceRestriction
in the SAML assertion and must match <saml:Audience>
in the SAML payload.
api/saml
, such as https://www.my-fusion-app.com:8764/api/saml
. If the Fusion application is running behind a load-balancer, then this URL is the load-balancer URL plus path api/saml
.
Note that the load-balancer should be session-sticky in order for the sequence of messages that comprise the SAML protocol to run to completion successfully.Some authorities may require additional information. In particular, the SAML 2.0 “AudienceRestriction” tag may be part of the SAML message. This tag specifies the domain for which the SAML trust conditions are valid, which is usually the domain in which the Fusion app is running, such as https://www.my-fusion-app
.api/realm-configs
returns a JSON list of all the configuration objects for all realms. After configuring a SAML realm named "saml-test"
using the okta.com developer preview tool, the configuration object for this realm is: