Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Guide That Contains This Content
[+] Expand All
[-] Collapse All

    Configuring a Secure Access SAML Server Instance (NSM Procedure)

    The Secure Access device accepts authentication assertions generated by an SAML authority using either an artifact profile or a POST profile. This feature allows a user to sign in to a source site or portal without going through the Secure Access device first, and then to access the Secure Access device with single sign-on (SSO) through the SAML consumer service.

    To configure a new SAML server instance:

    1. In the NSM navigation tree, select Device Manager > Devices.
    2. Click the Device Tree tab, and then double-click the Secure Access device for which you want to configure an SAML server instance.
    3. Click the Configuration tab and select Authentication > Auth Servers. The corresponding workspace appears.

      Note: If you want to update an existing server instance, click the appropriate link in the Auth Server Name box, and perform the Steps 5 through 8.

    4. Click the New button. The New dialog box appears.
    5. In the Auth Server Name list, specify a name to identify the server instance.
    6. Select SAML Server from the Auth Server Type list.
    7. Configure the server using the settings described in Table 1.
    8. Click one:
      • OK—Saves the changes.
      • Cancel—Cancels the modifications.

    Table 1: SAML Server Instance Configuration Details

    OptionFunctionYour Action
    SAML Settings > Basic Settings tab

    Source Site Inter-Site Transfer Service URL

    Specifies the source site inter-site transfer service URL.

    Enter the URL.

    Issuer Value for Source Site

    Specifies the issuer value for the source site.

    Enter the URL or hostname of the issuer of the assertion.

    User Name Template

    Specifies the user name template, which is a mapping string from the SAML assertion to a Secure Access user realm.

    Enter the string.

    Allow Clock Skew (minutes)

    Determines the maximum allowed difference in time between the Secure Access device clock and the source site clock.

    Enter the allowed clock skew value.

    SAML Settings > Artifact SSO tab

    Source ID

    Specifies the 20- byte identifier that the Secure Access device uses to recognize an assertion from a given source site.

    Enter the Source ID.

    Source SOAP Responder Service URL

    Specifies the source SOAP responder service URL.

    Enter a URL.

    Note: You should specify this URL in the form of an HTTPS: protocol.

    SOAP Client Authentication

    Specifies the SOAP client authentication.

    Select either HTTP Basic or SSL Client Certificate.


    Specifies the username for SOAP client authentication.

    Enter the username.


    Specifies password for SOAP client authentication.

    Enter the password.

    Device Certificate

    Specifies the device certificate.

    Select a device certificate the drop-down list.

    SAML Settings > POST SSO tab

    Response Signing Certificate

    Specifies the response signing cerificate for the SAML response signature verification.

    This is the PEM-formatted signing certificate, which is loaded for the SAML response signature verification. The certificate you select should be the same certificate used for signing the SAML response at the source site. The source site may send this certificate along with the SAML response, depending on the source site configuration. By default, the system performs signature verification of the SAML response first on the locally configured certificate. If a certificate is not configured locally in the SAML authentication server, then the system performs the signature verification on the certificate included in the SAML response from the source site.

    Enter the name or browse to locate the response signing certificate.

    Issued To

    Displays name and attributes of the entity to whom the certificate is issued.

    Issued To details is displayed.

    Issued By

    Displays name and attributes of the entity that issued the certificate.

    Issued By details is displayed.


    Displays the time range that the certificate is valid.

    Certificate valid time range is displayed.

    Enable Signing Certificate status checking

    Allows the Secure Access device to check the validity of the signing certificate configured in the SAML authentication server POST profile.

    Select SAML Settings > POST SSO > Enable Signing Certificate status checking to enable this feature.

    Server Catalog > Expressions tab


    Specifies a name for the user expression in the Certificate server user directory.

    Enter the name.


    Specifies a value for the user expression in the Certificate server user directory.

    Enter the value.

    Published: 2013-01-03