Configuring contract fulfillment for token creation
Map values to the attributes defined for the contract. These are the values that are included in the SAML security tokens sent to the service provider (SP).
Steps
-
In the Token Creation \| IdP Token Processor Mapping window, on the Attribute Contract Fulfillment tab, for each attribute, select a source from the Source list and then choose or enter a value. You must map all target attributes.
Token
When selected, the Value list is populated with attributes from the token processor instance. Select the desired attribute from the list. At runtime, the attribute value from the token processor instance is mapped to the value of the attribute in the SAML security token.
For example, to map the value of the Username Token Processor’s
username
attribute as the value of theTOKEN_SUBJECT
attribute on the contract, select Token from the Source list and username from the Value list.Context
When selected, the Value list is populated with the available context of the transaction. Select the desired context from the list. At runtime, the context value is mapped to the value of the attribute in the SAML security token.
The HTTP Request and STS SSL Client Certificate Chain context values are retrieved as Java objects rather than text. For this reason, OGNL expressions are more appropriate to evaluate and return values, such as Expression.
When using the STS Basic Authentication Username, STS SSL Client Certificate’s Subject DN, or STS SSL Client Certificate Chain contexts, ensure the associated authentication is enabled and configured on the System → Server → Protocol Settings → WS-Trust STS Settings tab.
Request
When selected, the Value list populates with parameter values from the token request received from the web service client. This selection is available only if a request contract was selected earlier on the Request Contract tab. Select the desired context from the list. At runtime, the context value is mapped to the value of the attribute in the SAML security token.
LDAP, JDBC, or Other
When selected, the Value list populates with attributes that you have selected in the Attribute Source & User Lookup window configuration. Select the desired attribute from the list. At runtime, the attribute value from the attribute source is mapped to the value of the attribute in the SAML security token.
Expression
When enabled, this option provides more complex mapping capabilities, such as transforming incoming values into different formats. Select Expression from the Source list, click Edit under Actions, and compose your OGNL expressions. All variables available for text entries are also available for expressions. For more information, see Text.
Expressions are not enabled by default. For more information about enabling and editing OGNL expressions, see Attribute mapping expressions.
No Mapping
Select this option to ignore the Value field.
Text
When selected, the text you enter is mapped to the value of the attribute in the single sign-on tokens at runtime. You can mix text with references to any of the values from the authentication source using the
${attribute}
syntax.You can also enter values from your data store, when applicable, using the following syntax.
[.codeph]``${ds.[.varname]__attr-source-id.attribute__}``
where
attr-source-id
is the attribute source ID value andattribute
is any of the selected attributes in the attribute source configuration.You can reference attribute values in the form of
${attributeName:-defaultValue}
. The default value is optional. When specified, it is used at runtime if the attribute value is not available. Do not use${
and}
in the default value.If you are editing a currently mapped token processor instance, you can update the mapping configuration, which might require additional configuration changes in subsequent tasks.