SECURING
Procedure
1. Edit the Domino server NOTES.INI file and enter the following required settings:
Where the values are:
1 - for SAML 1.1
2 - for SAML 2.0
SAMLUrl=https://your_SAML_service_provider_hostname
For example, https://domino1.us.renovations.com
Note: If your Domino server will not be enabled for SSL (required with an ADFS IdP, but not with a TFIM IdP), then this URL must start with http instead of https, for example, http://domino1.us.renovations.com
SAMLSloUrl=https://iti-ws2.renovations.com/sps/samlTAM20/saml20
If your federation is IBM® Tivoli® Federated Identity Manager, this setting specifies the log-out URL.
Note: If you do not specify a company, then the default SAML Signing is used.
Tip: If you do not have a note of the hash key – for example, you are not the administrator who performed the previous steps, or if you want to use a different existing certificate – you can use the CERTMGMT SHOW ALL command to display the key.
The text you enter for your_organization_name must match the company name as supplied in step 2 when you created the certification (certmgmt create saml). Alternatively your_organization_name can match the Subject Name that displays when you issued the CERTMGMT SHOW ALL command. If no company name was supplied in step 2, then use SAML Signing for the value of SAMLCompanyName, for example:
SAMLCompanyName=SAML Signing
What to do next
For more information, search the Notes® and Domino wiki for articles on configuring the TFIM and ADFS federations for SAML with Domino. IBM technote #1614543 in the related topics will eventually provide links to all such articles.
Parent topic: Configuring SAML in Domino Previous topic: Enabling the Domino Web server to provide SAML authentication Next topic: Configuring SAML from the Internet Site (Web Site) document
Related information IBM technote #1614543: Supplementary information on Security Assertion Markup Language (SAML) configuration combinations of IBM Domino and other products