30.3 Configuring Identity Vault for the User Application

The User Application must be able to interact with the objects in your Identity Vault. In some cases, you might need to configure the authentication methods and indexes in eDirectory to enable the Identity Vault and User Application to communicate effectively.

30.3.1 Creating Indexes in eDirectory

To improve User Application performance, the eDirectory Administrator should create indexes for the manager, ismanager and srvprvUUID attributes. Without indexes on these attributes, User Application users can experience impeded performance, particularly in a clustered environment.

You can create these indexes automatically during installation by selecting Create eDirectory Indexes on the Advanced tab of the User Application Configuration Panel. For more information about using Index Manager to create indexes, see the Novell eDirectory Administration Guide.

30.3.2 Installing and Configurating SAML Authentication Method

This configuration is only required if you want to use the SAML authentication method and are not also using Access Manager. If you are using Access Manager, your eDirectory tree will already include the method. The procedure includes the following activities:

Installing the SAML method in your eDirectory tree

  1. Locate and then unzip the nmassaml.zip file.

  2. To install the SAML method in your eDirectory tree, complete the following steps:

    1. Extend the schema stored in the authsaml.sch

      For example, on Linux, enter the following command:

      ndssch -h edir_ip edir_admin authsaml.sch
      
    2. Install the SAML method.

      For example, on Linux, enter the following command:

      nmasinst   -addmethod edir_admin tree ./config.txt 
      

Editing eDirectory Attributes

  1. Open iManager.

  2. Expand Roles and Tasks > Directory Administration > Create Object.

  3. Select Show all object classes.

  4. Create a new object of class authsamlAffiliate.

  5. Select authsamlAffiliate, then click OK.

    You can give this object any valid name.

  6. To specify the Context, select the SAML Assertion.Authorized Login Methods.Security container object in the tree, then click OK.

  7. To add attributes to the class object authsamlAffiliate, complete the following steps:

    1. Click the iManager View Objects > Browse tab.

    2. Locate your new affiliate object in the SAML Assertion.Authorized Login Methods.Security container.

    3. Select the new affiliate object, then select Modify Object.

    4. Add an authsamlProviderID attribute to the new affiliate object.

      This attribute is used to match an assertion with its affiliate. The contents of this attribute must be an exact match with the Issuer attribute sent by the SAML assertion.

    5. Click OK.

    6. Add authsamlValidBefore and authsamlValidAfter attributes to the affiliate object.

      These attributes define the amount of time, in seconds, around the IssueInstant in an assertion when the assertion is considered valid. A typical default is 180 seconds.

    7. Click OK.

  8. Select the Security container.

  9. Select Create Object to create a Trusted Root Container in your Security Container.

  10. To create a Trusted Root objects in the Trusted Root Container, complete the following steps:

    1. Go to Roles and Tasks > Directory Administration, then select Create Object.

    2. Select Show all object classes.

    3. To create a Trusted Root object for the certificate that your affiliate will use to sign assertions. You must have a der encoded copy of the certificate to do this.

    4. Create new trusted root objects for each certificate in the signing certificate's chain up to the root CA certificate.

    5. Set the Context to the Trusted Root Container created earlier, then click OK.

  11. Return to the Object Viewer.

  12. Add an authsamlTrustedCertDN attribute to your affiliate object, then click OK.

    This attribute should point to the "Trusted Root Object" for the signing certificate that you created in the previous step. (All assertions for the affiliate must be signed by certificates pointed to by this attribute, or they will be rejected.)

  13. Add an authsamlCertContainerDN attribute to your affiliate object, then click OK.

    This attribute should point to the "Trusted Root Container" that you created before. (This attribute is used to verify the certificate chain of the signing certificate.)