AuthnMethodComposite
Composite authentication method configuration.
Assurance level
A numeric weight to be assigned to this authentication method. You can create authorization conditions based on these assurance level weights.
Communication URLs holder
The holder for common URL configurations of an authentication method.
Prefix for URL definitions
The prefix for URL definitions. The base URL, specified as an absolute or relative path, to which users will be directed when events occur during the authentication workflow when using this authentication method. DirX Access redirects the authenticating user to the pages specified in the following fields.
Pre-login
The URL of the page to load before the login page, relative to 'Prefix for URL definitions'.
Login
The URL of the login page where users provide credentials for form-based authentication methods, relative to 'Prefix for URL definitions'.
Login success
The URL of the page to load when authentication succeeds, relative to 'Prefix for URL definitions'.
Login failed
The URL of the page to load when authentication fails, relative to 'Prefix for URL definitions'.
Error
The URL of the page to load when an error is encountered, relative to 'Prefix for URL definitions'.
Account expired
The URL of the page to load when the user’s account has expired, relative to the 'Prefix for URL definitions'.
Do correlate user accounts
Whether or not the authentication service correlates user accounts in the 'User Repository' upon successful validation of provided credentials. SAML assertion based authentication at SPs should consider unchecking depending on the underlying scenario.
-
For traditional initial authentication, the correlation is made based on the login name and the LDAP attribute 'Login name attribute' that can be configured in the
SubjectTemplateconfiguration. -
For X.509 certificate-based authentication, the correlation details can be configured on the basis of dedicated configuration fields in
AuthnMethodX509configuration. -
For Kerberos or NTLM-based Windows authentication, the correlation is made based on the RFC 822 login name and the 'Mail attribute' that can be configured in the
SubjectTemplateconfiguration. -
For federated authentication based on SAML assertions, the correlation details can be configured in specific SAML assertion interpretation templates.
Do honor validity metadata
Whether or not the authentication service considers validity metadata for example, account lifetime or locking state.
Do use attribute finder
Whether or not the authentication service invokes the server-global subject attribute finder plug-in for this authentication method. This plug-in allows you to look up supplementary information about an authenticated user that is not part of the user account against which authentication was performed and is used when information about a single user is distributed across various repositories.
SAML authentication context class reference
A value to be imprinted as SAML authentication context class reference when issuing SAML assertions for subjects that have been authenticated with this method. If the value is undefined, a default mapping to SAML-defined values is used.
Do autogenerate domain identifier and format
Whether or not to generate the authentication-method-specific domain
name in the format:
authentication_id@authentication_method_id.
Domain identifier
The domain identifier used for the names retrieved by this authentication method during the domain name resolution.
Domain name format
The domain name format used for the names retrieved by this authentication method during domain name resolution. The format may contain placeholders: #1 (replaced by the authentication identifier), and #2 (replaced by the domain identifier).
Do hash authentication id
Whether or not the authentication identifier is hashed before it is included into the domain name.
User Correlation Policy
To what extent is the user correlation with an existing user record in
user repository for this authentication method forced. This element has
priority over the Do correlate user accounts element.
-
MANDATORY: The authentication method will fail if the user correlation cannot be made.
-
OPTIONAL: The server will try to correlate the user with a user record, but if the correlation fails the method will still pass if possible.
-
NONE: No user correlation will be done.
-
Allowed Values:
-
MANDATORY -
OPTIONAL -
NONE
-
Shared credentials authentication method identifier
Reference to authentication method of the same type to share the credentials and credential-specific configuration with. If null, this method works with its own configuration and set of credentials for each user. For every authentication method the domain name configuration is being resolved which is then used during unique name resolution. Specifics for some methods are:
-
AuthnMethodPassword - number of login failures, password from the user record with its respective configuration and max number of consecutive login failures from the authentication method configuration.
-
AuthnMethodOtpRfc4226 - number of login failures, shared secret and counter from the user record and number of digits, throttling value, shared secret encoding and look ahead from the authentication method configuration.
-
AuthnMethodOtpRfc6238 - number of login failures, shared secret and time drift from the user record and number of digits, throttling value, shared secret encoding, time step seconds and time drift limit from the authentication method configuration.
Just-in-time provisioning of user record to AppRepo
Indicates whether Just-in-Time (JIT) provisioning of user records to the application repository is enabled. If enabled, a user record is automatically created in the application repository after successful authentication if it does not already exist. If disabled, authentication will not trigger the creation of a new user record if one does not exist.
Generate initial step for client on server
Whether or not to generate the initial list of authentication methods for the first step on the DirX Access Services server. If unchecked, the client must have knowledge of this value or generate it itself from configuration.
User account correlation
The user account LDAP attribute that will be compared to resolved authentication identifier to correlate the subject to the user account. By default and if null, the correlation is done via the value of the login name attribute specified in Subject Template.
Composite session cache timeout
The maximum elapsed time in seconds since the last authentication method interaction after which the system closes the composite authentication session.
Authentication identifier resolution
The authentication identifier resolution strategy used by the composite authentication method. Possible values are:
-
AUTHN_ID_OF_SUCCESSFUL_SUB_METHOD: Authentication identifier is resolved as authnId of last successful sub method. Default option. -
UNIQUE_NAME: Authentication identifier is a uniqueName property (unique identifier of application repository user record) resolved from combination of successful sub methods. -
Allowed Values:
-
AUTHN_ID_OF_SUCCESSFUL_SUB_METHOD -
UNIQUE_NAME
-
Composite authentication steps
The most important configuration element for 'Composite' authentication method types is the 'Composite authentication steps options' collection. The collection usually consists of several authentication steps that must all succeed for the entire authentication method to succeed.
Step number
The order in which the authentication method is requested. For example, the 'OTP password' authentication method can be defined as a 'Composite' authentication method type where step 1 'Form Authentication' is performed first and then step 2 'Callback Authentication' is performed only if step 1 succeeds.
Success step
The step to be applied when the requested authentication method in this step is successful.
Failure step
The step to be applied when the requested authentication method in this step is unsuccessful.
Success action
The behavior to be applied when the requested authentication method in this step is successful.
-
Allowed Values:
-
Pass -
Continue -
Fail
-