Authenticating Jazz Authorization Server by using SAML as an identity provider
If you choose to use Security Assertion Markup Language (SAML) as an identity provider for Jazz® Authorization Server (JAS) authentication, complete the following procedure. SAML is an OASIS open standard for representing and exchanging user identity, authentication, and attribute information. A SAML assertion is an XML-formatted token that is used to transfer user identity and attribute information from the identity provider of a user to a trusted service provider as part of the completion of a single sign-on request. JAS supports SAML web browser single sign-on in the IBM® WebSphere® Liberty, which enables the web applications to delegate user authentication to a SAML identity provider instead of a configured user registry.
Before you begin
- Configure the Lightweight Directory Access Protocol (LDAP) user registry by using your SAML identity provider information. For more information, see Authenticating Jazz Authorization Server by using the LDAP user registry.
- Obtain the idpMetadata.xml file from the SAML administrator and save it on
your computer. For more information, see the product documentation of the SAML identity provider
that you use.Note: The idpMetadata.xml file consists of an IdP certificate, entity ID, redirect URL, and logout URL.
To create a secret for SAML auth provider, use one of following methods
Red Hat OpenShift Container Platform web console method
Procedure
Red Hat OpenShift CLI method
Procedure
oc create --filename=<folder-path>/<saml-file-name>
oc create --filename=/usr/example/elm-saml-idp-metadata.yaml
Kubernetes CLI method
Procedure
kubectl create --filename=<folder-path>/<saml-file-name>
kubectl create --filename=/usr/example/elm-saml-idp-metadata.yaml