Follow Up Questions:
Hello Mohib, thank you for your reply. I have read the documentation regarding the different options for configuring SAML / SSO and I am still not clear as to which option would work for our environment. We are currently using the Gluu server in our lab environment and possibly in production if we can get it working. Below is our use case, can please provide guidance on the best possible way to configure the Gluu server SAML / SSO options given our use case and the Service Provider (SP) application configuration requirements?
We are hosting a service provider (SP) application (Data Archive) that now, with its latest release supports SAML / SSO. The instructions from the SP application for using SAML / SSO are:
To use Data Archive's single sign-on feature, you must also use an identity provider (the Gluu server) that supports the SAML.
**Step 1. **Create the KeyStore and Encryption Certificate (_this key is to be loaded into the Gluu server_)
1. Run the KeyStore command.> keytool -genkeypair -alias testkey01… - cert file
**Step 2.** Configure the Identity Provider for Data Archive (_this step would be config of the Gluu server_)
Configure the chosen identity provider to host Data Archive. Refer to the documentation for the identity provider to configure the general settings for Data Archive.
1. In the identity provider's application settings for Data Archive, enter the following details:
- a. Single sign-on URL: http://<ilmhost:port>/sso.htm
- b. Entity ID: http://<ilmhost:port>/sso.htm
- c. Assertion encryption: Encrypted
2. Upload the encryption certificate (.cert) created in Step 1.
3. Download the identity provider metadata file and copy it to the machine where Data Archive is installed. _**(is this the shibboleth xml file?)
**_The metadata file is typically available for download in the application settings.
4. Add users from an LDAP directory, integrate the LDAP directory with the identity provider.
**Step 3.** Configure Data Archive for Single Sign-On
To configure Data Archive for single sign-on, update the conf.properties file.
1. Provide the path of the identity provider metadata file, which you copied to the Data Archive machine from the identity provider in Step 2. Example: informia.idp.metedata.file = c:\\metadata