Step 2: Generate the SP Metadata

FlexNet Code Insight 6.14.1

The following procedure generates the SP metadata using the Spring Security SAML application.

To generate the SP metadata using Spring Security SAML:

1. Start the Spring Security SAML Extension web application by running the following command:

fnciInstallPath/tomcat/webapps/spring-security-saml2-sample 

2. Once the application is started, navigate to Metadata Administration | Login | Generate new service provider metadata.
3. In the Metadata Generate Filter section, provide the following values (or values appropriate to your site):

Field

Value

Store for the current session

Select No.

Entity ID

Provide the identifier for the Code Insight Core Server as an SP in the format <w>:<x>:<y>:<z>, as in the example:

palamida:cust:test:server1 

This ID must be unique among the other entity IDs. It is usually specified by the Identity Provider but is not mandated by SSO.

Entity base URL

Provide the HTTPS URL handling the SP user’s sign-in requests. This is usually the URL for the Core Server in HTTPS://myhost.mycompany.com:port format, where port is the default port for the Core Server. (For default Code Insight ports, see “Network and Firewall Considerations” in the FlexNet Code Insight Installation and System Administration Guide.)

Entity alias

Enter defaultAlias.

Signing key

Provide the path and name of the keystore you created for SSO. (This value should reflect the value entered for myKeystore in the keyManager bean definition described in Step 1: Download and Configure the Spring Security SAML Extension.)

Encryption key

Provide the path and name of the keystore you created for SSO. (See the previous entry.)

Signature security profile

Select MetalOP.

SSL/TLS security profile

Select PKIX.

SSL/TLS hostname verification

Select Standard hostname verifier.

SSL/TLS client authentication

Select None.

Sign metadata

Select Yes.

Signing algorithm

Enter http://www.w3.org/2001/04/xmldsig-more#rsa-sha256.

Sign sent AuthNRequests

Select Yes.

Require signed authentication Assertion

Select No.

Require signed LogoutRequest

Select No.

Require signed LogoutResponse

Select No.

Require signed ArtifactResolve

Select No.

Single sign-on bindings

Select SSO HTTP-POST as the default. (Uncheck SSO Artifact.)

Supported NameIDs

Select Transient, E-Mail, and X509 Subject.

Enable IPD Discovery profile

Select No.

4. Generate the metadata.
5. Save the contents of the Metadata text box to SPMetadata.xml, and copy this file to fnciInstallPath/config/core/security in the Code Insight Core Server installation.
6. Save the contents of the Configuration text box to Extended.xml in a temporary location of your choice for later reference. (You will need this file when updating the core.sso.properties in Step 3: Configure the SSO Common Properties File.)
7. (Optional) If you want signing but not encryption in SSO communications, open the file SPMetadata.xml file, locate the encryption tag (usually the second tag), and remove everything between the tag and </md:KeyDescriptor>, including the encryption tag and </md:KeyDescriptor>.