If you are using OSP with OpenText Identity Governance and you have OpenText Access Manager installed and configured to provide SAML authentications to other applications, you can allow the SAML authentications from OpenText Access Manager to provide single sign-on through OSP to OpenText Identity Governance.
Obtain the SAML 2.0 metadata from the OpenText Access Manager server by accessing the following default URL:
https://identity-server-dns-name:port/nidp/saml2/metadataConfigure the SAML 2.0 settings on the OSP server.
Ensure that Apache Tomcat is running on the OSP server.
Launch the OpenText Identity Governance Configuration Update utility from the OSP server. For more information, see Section 15.1.5, Using the OpenText Identity Governance Configuration Update Utility.
Click the Authentication tab.
Click Show Advanced Options.
Under Authentication Method > Method select SAML 2.0.
Use the following information to configure OSP to use SAML 2.0:
Specify the attribute listed is the one you want to use to map the user accounts to OpenText Access Manager. The default value is mail.
Select where the landing page for your users is internal, external, or if there is not one. The default value is None.
Select URL to use the OpenText Access Manager metadata.
Specify the OpenText Access Manager metadata URL in this field.
https://identity-server-dns-name:port/nidp/saml2/metadataSelect this option to load the metadata.
Select this option to automatically configure OpenText Access Manager when you exit the OpenText Identity Governance Configuration Update utility.
Under the OpenText Identity Governance Bootstrap Administrator heading, ensure that you are using an LDAP-based bootstrap administrator account. For more information, see Section 4.1.1, Using the Bootstrap Administrator.
Click OK to save the changes.
Click Yes to accept the certificate.
When the OpenText Access Manager Auto-Configuration appears, restart Apache Tomcat on the OSP server. For more information, see Section 3.5.3, Starting and Stopping Apache Tomcat.
Automatically configure the SAML 2.0 settings in OpenText Access Manager for OSP.
Access the Administration Console for OpenText Access Manager using the full DNS name. For example:
https://mybusiness.com:8443
In OpenText Access Manager Administrator Credentials, specify the user name and password of the OpenText Access Manager administrator in LDAP format. For example, cn=admin,o=mybusiness.
Ensure that the Unique Display Name is automatically created as IDM-NAM Trust.
In Authentication Server Administrator Credentials, specify the user name and password of the OpenText Identity Governance configuration administrator.
Click OK to save the configuration information.
In the pop-up window, click Yes to update the OpenText Access Manager configuration.
Read the OpenText Access Manager SAML 2 configuration summary when it appears, then click OK.
Restart Apache Tomcat on the OSP server. For more information, see Section 3.5.3, Starting and Stopping Apache Tomcat.
(Conditional) If you configured OSP to utilize multiple keypairs, you might have to import the OSP encryption certificate into the NIPD Trust Store in OpenText Access Manager.
Obtain a copy of the OSP encryption certificate from:
https://osp-server:port/osp/s/idm/encryptionCertificate
Add the encryption certificate to the NIDP Trust Store in OpenText Access Manager. For more information, see Managing Trusted Roots and Trust Stores
in the NetIQ Access Manager 5.0 Administration Guide.