Verifyaccess Admin Federation
Verifyaccess Admin Federation
Version 10.0.1
December 2020
IBM
DRAFT - NOT FOR PUBLICATION
DRAFT - NOT FOR PUBLICATION
Contents
Tables................................................................................................................... v
Chapter 1. Managing federations........................................................................... 1
Creating and modifying a federation.......................................................................................................... 1
Exporting a federation.................................................................................................................................2
Deleting a federation................................................................................................................................... 2
Managing federation partners.....................................................................................................................3
Chapter 4. Point of Contact....................................................................................9
Creating a point of contact profile..............................................................................................................9
Updating or viewing a point of contact profile.........................................................................................10
Deleting a point of contact profile............................................................................................................10
Setting a current point of contact profile.................................................................................................11
Callback parameters and values.............................................................................................................. 11
Chapter 6. Server connections............................................................................. 25
Server connection properties................................................................................................................... 26
Index.................................................................................................................. 35
iii
DRAFT - NOT FOR PUBLICATION
iv
DRAFT - NOT FOR PUBLICATION
Tables
1. Example JavaScript.................................................................................................................................... 21
3. Tuning properties........................................................................................................................................27
v
DRAFT - NOT FOR PUBLICATION
vi
DRAFT - NOT FOR PUBLICATION
Procedure
1. Log in to the local management interface.
2. Select Federation > Manage > Federations.
All configured federations are displayed.
3. You can create a federation or modify any existing federations.
• To create a federation, click Add and then follow the wizard. The wizard pages differ depending on
the federation protocol you select.
Note: If you encounter a session timeout while you are creating a federation and then log back
in, you might not be able to see the federation that you created. You must click Refresh to get the
current data from the appliance.
• To modify a federation, select the federation and then click Edit. Follow the wizard and modify the
settings on each page as needed.
DRAFT - NOT FOR PUBLICATION
Exporting a federation
When you want to join a federation hosted by another business partner, you must supply your federation
configuration properties. You can export your SAML 2.0 federation properties to a file to share them with
your partner.
Procedure
1. Log in to the local management interface.
2. Click Federation > Manage > Federations.
3. Select a federation from the table.
4. Click Export. The browser shows a message window that prompts you to save the file containing the
exported data.
Note: Exporting a federation is applicable to SAML 2.0 federation only.
5. Click OK.
The browser download window prompts for a location to save the file.
6. Select a directory and metadata file.
Metadata file names have the following syntax:
federationname_metadata.xml
For example, for a federation named federation1, and a company named ABC, the metadata file
would be named:
federation1_ABC_metadata.xml
Note: Place the metadata file in an easily accessible location. You must provide the file to your
partner, when your partner wants to import configuration information for the federation.
7. Click Save.
Deleting a federation
Use the Federations management page to delete the federation that you no longer need.
Procedure
1. Log in to the local management interface.
2. Click Federation > Manage > Federations.
The Federation Management panel shows a list of configured federations.
3. Select a federation.
4. Click Delete to delete the federation.
A message box prompts you to confirm the deletion of the federation.
5. Click YES on the message box. The federation is deleted.
2 IBM Security Verify Access Version 10.0.1 December 2020: Federation Administration topics
DRAFT - NOT FOR PUBLICATION
Procedure
1. Log in to the local management interface.
2. Select Federation > Manage > Federations.
All existing federations are displayed in the list.
3. Select the federation to manage partners for.
4. Click Partners.
All existing partners for this federation are displayed.
5. You can create, modify, delete, enable, or disable your federation partners.
• To create a partner, click Add and follow the wizard. The wizard pages differ depending on the
federation protocols. When there are multiple partner templates to choose from, they are displayed
in a table. You can use the filter to locate a particular partner template and then select it from the
table.
Remember: For a SAML 2.0 federation, the partner create wizard is a two-stage process. The first
stage is to upload the metadata file for the partner. After this stage is complete, a new partner that
matches the details in the metadata file is created. The second stage is to complete the wizard to
update some properties in the new partner. Even if the wizard is canceled after the metadata upload,
the new partner is still created. The upload operation creates the partner. For information about
adding a partner to an existing federation, see Creating a SAML 2.0 partner.
Note: If you encounter a session timeout while creating a partner and then log back in, you might
not be able to see the partner you created. You must click Refresh to get the latest data from the
appliance.
• To modify a partner, select the partner and click Edit. Follow the wizard and modify the settings on
each page as needed.
• To delete a partner, select the partner and click Delete. Confirm the deletion by clicking Yes.
• To enable or disable a partner, select the partner and click Enable or Disable.
• To refresh the partners page, click Refresh.
4 IBM Security Verify Access Version 10.0.1 December 2020: Federation Administration topics
DRAFT - NOT FOR PUBLICATION
Procedure
1. Log in to the local management interface.
2. Select Federation > Global Settings > Partner Templates.
The version number of the current federation partner templates and the installation date are
displayed.
3. To update the templates, click Import.
4. Click Browse and then select the new templates package file.
5. Click Import to upload the selected templates package file to the appliance.
6. Deploy the changes.
DRAFT - NOT FOR PUBLICATION
6 IBM Security Verify Access Version 10.0.1 December 2020: Federation Administration topics
DRAFT - NOT FOR PUBLICATION
Procedure
1. Log in to the local management interface.
DRAFT - NOT FOR PUBLICATION
8 IBM Security Verify Access Version 10.0.1 December 2020: Federation Administration topics
DRAFT - NOT FOR PUBLICATION
Procedure
1. From the local management interface, select Federation or AAC. Then, Global Settings > Point of
Contact.
A list of point of contact server profiles displays. The list includes three preconfigured profiles and any
other custom profiles that you created.
2. Take one of the following actions:
• Click Create to create a custom point of contact profile.
• Select a profile from the list and click Create Like to start with values similar to an existing profile.
3. On the Profile Name page, enter the name of the profile. The first character of the profile name must be
alphanumeric. The maximum number of characters is 200.
4. Optional: Enter a description.
5. Specify the parameter information:
• Enter the information on each tabbed page, and click Next.
• In the Callback Parameters section on each page, click Create to open a window to add a set of
parameter name and value pairs. Click Save when complete.
• Add as many parameters as you need. The Value field might be empty for some parameters.
• To delete a parameter name from the list, select the parameter and click Delete.
6. At the Summary page, if everything is correct, click Finish.
7. Deploy the pending changes.
What to do next
• See “Callback parameters and values” on page 11 for more information.
DRAFT - NOT FOR PUBLICATION
• You might want to change the current point of contact profile. See “Setting a current point of contact
profile” on page 11.
Procedure
1. From the local management interface, select Federation or AAC. Then, Global Settings > Point of
Contact.
A list of point of contact server profiles displays.
2. Perform one of the following actions:
• Update
a. Select a profile from the list that is not a preconfigured profile and click Update to change the
configuration details.
b. Click Next to see each page and make updates if necessary.
c. On the Summary page, click Finish to save your changes.
d. Deploy the changes
• View
a. Select a profile from the list and click Properties to look at the configuration details without
making updates.
b. Click on each tab to see the information.
c. Click OK when finished.
What to do next
See “Callback parameters and values” on page 11 for more information about the properties.
Procedure
1. From the local management interface, select Federation > Global Settings > Point of Contact or AAC
> Global Settings > Point of Contact.
A list of point of contact server profiles displays.
2. Select a profile from the list, that is not a preconfigured profile, and click Delete.
The details of the selected profile display.
3. Review the profile to ensure that it is the one you want to delete.
10 IBM Security Verify Access Version 10.0.1 December 2020: Federation Administration topics
DRAFT - NOT FOR PUBLICATION
4. Click Finish.
5. Click OK to confirm.
6. Deploy the change.
Procedure
1. From the local management interface, select Federation > Global Settings > Point of Contact or
select AAC > Global Settings > Point of Contact.
A list of point of contact server profiles displays. The list includes three preconfigured profiles and any
other custom profiles that you created. The green dot indicates the current profile.
2. To change the current profile, select the profile you want to use as the current one and click Set As
Current.
The current profile indicator displays next to the profile you selected.
3. Deploy the changes.
Sign In callbacks
fim.user.request.header.name
The name of the header that contains the user name of the user.
Data type: String
Example: iv-user
fim.attributes.response.header.name
The name of the header that contains the attributes of the user.
Data type: String
Example: am-fim-eai-xattrs
fim.groups.response.header.name
The name of the header that contains the groups of the user.
Data type: String
Example: fim.groups
fim.server.response.header.name
The name of the header that contains the hostname that authenticates the user.
Data type: String
Example: fim.server
fim.target.response.header.name
The name of the header that contains the redirect URL.
Data type: String
Example: am-fim-eai-redir-url
fim.user.response.header.name
The name of the header that contains the user name of the user.
Local ID
fim.attributes.request.header.name
The name of the header that contains the attributes of the user.
Data type: String
Example: fim.attributes
fim.cred.request.header.name
The header that contains the IVCred of the user.
Data type: String
Example: iv-creds
fim.groups.request.header.name
The name of the header that contains the groups of the user.
Data type: String
Example: iv-groups
fim.user.request.header.name
The name of the header that contains the user name.
Data type: String
Example: iv-user
12 IBM Security Verify Access Version 10.0.1 December 2020: Federation Administration topics
DRAFT - NOT FOR PUBLICATION
Authenticate
fim.user.request.header.name
The name of the header that contains the user name.
Data type: String
Example: iv-user
authentication.macros
A list of macros that defines contextual information to pass to the web reverse proxy login page. The
macros you specify can customize an authentication login page for a specific service provider. For
more information, see Customizing the SAML 2.0 login form.
Data type: String
Example: If an identity provider wants to display the provider ID and target URL of a partner, specify
the following macros:
%PARTNERID%,%TARGET%
14 IBM Security Verify Access Version 10.0.1 December 2020: Federation Administration topics
DRAFT - NOT FOR PUBLICATION
You must provide a value for at least one of the following fields for the Traditional WS-Trust
Elements:
• Issuer address
• Applies To address
• Token Type selected, where value is not None
Or, if you do not specify one of the above options, then you must select the XPath option, plus a
specified XPath.
Note: If you supply values for all of the parameters, including the XPath, then the Issuer, Applies
To, and Token Type values take priority over XPath in the runtime.
Applies To
Defines the scope of the token.
Address
The address of the service that is being requested. For example:
http://sp.example.com:9080/TrustServer/SecurityTokenService
You can use the asterisk (*) wildcard character at the end of a string. For example, token*
matches all strings that start with token.
You can also use regular expressions in the format of REGEXP:
(regular_expression_here). For example, REGEXP:(.*/application.*)
matches any string that contains /application.
When you specify the scope for single sign-on protocols, this URI is sufficient information
for identifying the issuer.
Service Name
A qualified name (QName) that includes a namespace URI and a local part for the Web
service.
Note: A QName is a term that is defined in XML specifications. A QName consists of a
namespace URI plus a local part.
For example:
http://sp.example.com:SecurityTokenService
Note: The Service Name field provides a colon (:) to separate the namespace URI from
the local part.
This field is typically not used for single sign-on protocols, but can be used for Web
services security management.
Port Type
Web services operations are grouped by port type. Use this field when there are more than
one Web services port types to specify.
For example, a stock market data service might provide both a stock quoting service and a
stock price history service. Use this field to specify the needed Web service.
http://sp.example.com:RequestSecurityTokenPort
The port type is also a QName.
Note: The Port Type field provides a colon (:) to separate the namespace URI from the
local part.
This field is typically not used for single sign-on protocols, but can be used for Web
services security management.
16 IBM Security Verify Access Version 10.0.1 December 2020: Federation Administration topics
DRAFT - NOT FOR PUBLICATION
Issuer
Address
The URL for the company or enterprise that issued the token. For example:
example.com
You can use the asterisk (*) wildcard character at the end of a string. For example, token*
matches all strings that start with token.
You can also use regular expressions in the format of REGEXP:
(regular_expression_here). For example, REGEXP:(.*/application.*)
matches any string that contains /application.
When you specify the scope for single sign-on protocols, this provider ID is sufficient
information for identifying the issuer.
Service Name
A qualified name (QName) that includes a namespace URI and a local part for the Web
service.
Note: A QName is a term that is defined in XML specifications. A QName consists of a
namespace URI plus a local part.
For example:
http://idp.example.com:myWebService
Note: The Service Name field provides a colon (:) to separate the namespace URI from
the local part.
This field is typically not used for single sign-on protocols, but can be used for Web
services security management.
Port Type
Web services operations are grouped by port type. Use this field when there is more than
one Web service port type to specify.
For example, a stock market data service might provide both a stock quoting service and a
stock price history service. Use this field to specify the needed Web service.
http://idp.example.com:getQuotePortType
The port type is also a QName.
Note: The Port Type field provides a colon (:) to separate the namespace URI from the
local part.
This field is typically not used for single sign-on protocols, but can be used for Web
services security management.
Token Type
Defines the STS module type. Select a type to map a request message to an STS chain. Select a type
other than None for it to be part of the runtime flow.
URI
A Uniform Resource Indicator for each token type. This field is read-only except when you select
Other as the token type. For the Other type, enter the URI for your custom token type.
The following fields are available on the Security tab.
Validate Requests
Select to require a signature on the SOAP Body element that contains the RequestSecurityToken
messages. When you select this option, your Trust Service client must use their private key to sign the
body of the SOAP messages in accordance with the Web Services Security SOAP Message Security 1.1
specification.
Select the public key that was provided by the client to validate the signature on the message.
Certificate Database
Specify the database where the certificate is stored.
Certificate Label
Specify the name of the certificate to use for validation.
Send Validation Confirmation
Send signature validation confirmation. When you select this option, the Trust Server includes
a SignatureValidationConfirmation element in the Security header in accordance with the Web
Services Security SOAP Message Security 1.1 specification.
Sign Responses
Select to sign the Trust Server SOAP response messages. When you select this option, the Trust server
uses the private key you select to sign the body of the SOAP response messages in accordance with
the Web Services Security SOAP Message Security 1.1 specification.
Provide the corresponding public key to your client so that they can validate the signature on the
message.
Certificate Database
Specify the database where the certificate is stored.
Certificate Label
Specify the name of the certificate to use for validation.
Include
Determine which elements to include in the digital signature for a Trust Server SOAP response
message.
Public Key
Specify whether to include the public key with your signature.
Subject Key Identifier
Specify whether to include the X.509 subject key identifier with your signature.
Subject Name
Specify whether to include the subject name with your signature.
Certificate Data
Specify whether to include the BASE64 encoded certificate data with your signature.
Issuer Details
Specify whether to include the issuer name and the certificate serial number with your
signature.
The Properties tab contains the properties for all modules within the template. Properties for each
module can be viewed and updated by selecting the module on the Template Contents list.
Procedure
1. Log in to the local management interface.
2. Click Federation > Manage > Security Token Service.
By default, the Security Token Service Module Chains tab is open. All existing module chains are
listed.
18 IBM Security Verify Access Version 10.0.1 December 2020: Federation Administration topics
DRAFT - NOT FOR PUBLICATION
Managing templates
A template is an ordered list of modules and their modes.
Procedure
1. Log in to the local management interface.
2. Click Federation > Manage > Security Token Service.
3. Click Templates.
All existing templates are listed on the left pane.
Usage
You can customize template files or pages on the server. For example, you can customize an error
message that is displayed by the runtime server.
The template files menu is located under both the Federation and AAC menus.
To edit a Federation template file, go Federation > Template Files, select the specific template file, and
click Edit.
To edit an AAC template file, go to AAC > Template Files, select the specific template file, and click Edit.
The JavaScript engine supports the following syntax:
• Insert JavaScript code between <% and %>.
• Embed JavaScript expressions between <%= and %>.
Example tasks
• Access whitelisted Java classes. For example,
20 IBM Security Verify Access Version 10.0.1 December 2020: Federation Administration topics
DRAFT - NOT FOR PUBLICATION
• Access all the macro variables through templateContext. The standard object to access a Java object is
templateContext. For example,
templateContext.macros["@TIMESTAMP@"]
• Use the document.write function to write content to the output stream. For example,
templateContext.response.body.write("Hello")
Examples
2017-01-25
<%
var date = templateContext.macros["@TIMESTAMP@"].substring(0, 10);
templateContext.response.body.write(date);
%>
The following code example shows how to use repeatable macros. The following example shows an
OAuth consent page.
<%
var test = templateContext.macros["oauthTokenScopeNewApprovalRepeatable"];
n = test.length;
for (i=0; i<n; i++){
var scope = test[i]["@OAUTH_TOKEN_SCOPE_REPEAT@"];
if (scope == "contacts"){
label ="Do you grant permission to the client to access your phone book";
}
else if (scope == "photos"){
label ="Do you grant permission to the client to access your photos";
}
else if (scope == "messages"){
label ="Do you grant permission to the client to access your WhatsApp messages";
}
else{
label ="Do you grant permission to the client to access your "+scope;
}
%>
<%
templateContext.response.setHeader("Content-Type","application/json");
var myObj = { "name":"John", "age":31, "city":"New York" };
templateContext.response.body.write(JSON.stringify(myObj));
%>
templateContext.response.setHeader("Content-Type","text/html");
templateContext.response.setStatus(400);
For example, the following sample code prints the macros from a template page that ran a single sign-on
flow with a partner that does not exist.
"@PAGE_IDENTIFIER@": "/saml20/invalid_init_msg.html",
"@TARGET@": "https://www.mysp.ibm.com/isam/mobile-demo/diag",
"@PARTNER_ENTITY_ID@": "",
"@ERROR_MESSAGE@": "FBTSML002E The value https://saml.partner.com for attribute PartnerId is not
valid.",
"@FEDERATION_NAME@": "saml20idp",
"@FEDERATION_ENTITY_ID@": "https://www.myidp.ibm.com/isam/sps/saml20idp/saml20",
"@REQ_ADDR@": "/sps/saml20idp/saml20/logininitial",
"@ERROR_CODE@": "FBTSML002E",
"@EXCEPTION_STACK@": "",
22 IBM Security Verify Access Version 10.0.1 December 2020: Federation Administration topics
DRAFT - NOT FOR PUBLICATION
"@PARTNER_NAME@": "",
"@TIMESTAMP@": "2017-06-22T03:34:39Z",
"@SAMLSTATUS@": "<fim:FIMStatusCollection xmlns:fim=\"urn:ibm:names:ITFIM:saml\"
xmlns:samlp=\"urn:oasis:names:tc:SAML:2.0:protocol\"><fim:FIMStatusCollectionEntry>
<samlp:Status><samlp:StatusCode Value=\"urn:oasis:names:tc:SAML:2.0:status:Responder\"></
samlp:StatusCode>
<samlp:StatusDetail><fim:FIMStatusDetail MessageID=\"invalid_attribute_value\">
<fim:SubstitutionString>https://saml.salesforce.com</fim:SubstitutionString>
<fim:SubstitutionString>PartnerId</fim:SubstitutionString></fim:FIMStatusDetail>
</samlp:StatusDetail></samlp:Status></fim:FIMStatusCollectionEntry></fim:FIMStatusCollection>",
"@EXCEPTION_MSG@": ""
Limitations
• JavaScript validation is done only when a template file is edited (imported) or created. A template file
that is imported as a part of an Import compressed file is not validated.
• You must restart the runtime manually to activate changes to OpenID Connect template files. In the
administrative interface, click Federation -> Runtime Tuning -> Restart Runtime.
• When you access a variable, do not end the variable name with a semicolon. For example, in the
following JavaScript, do not end <%=example%> with a semicolon <%=example;%>.
The correct syntax is <%=example%>. Do not use the incorrect syntax <%=example;%>.
Managing modules
A module is a module class and set of initial parameters.
Procedure
1. Log in to the local management interface.
2. Click Federation > Manage > Security Token Service.
3. Click Modules.
All existing modules are displayed.
4. You can view the modules.
a) Select the module to view.
b) Click View.
c) Observe the module properties.
d) Click Close.
24 IBM Security Verify Access Version 10.0.1 December 2020: Federation Administration topics
DRAFT - NOT FOR PUBLICATION
Procedure
1. Log in to the local management interface.
2. Click Federation.
3. Under Global Settings, click Server Connections.
4. Take one of the following actions:
Filter server connections:
a. In the Quick Filter field, type one or more characters. For example, enter g to search for all
server connection names that contain g or G.
b. Press Enter.
Add a server connection:
a.
Click the drop-down button.
b. Select LDAP.
c. Complete the properties for the new server connection. See “Server connection properties” on
page 26. Look specifically for the LDAP properties.
Modify an existing server connection:
a. Select a server connection.
b.
Click the edit icon .
c. Complete the properties for the server connection. See “Server connection properties” on page
26.
Delete a server connection:
Note: Be careful about removing a server connection that is in use.
a. Select a server connection.
b.
Click the delete icon .
c. Click Delete to confirm the deletion.
DRAFT - NOT FOR PUBLICATION
What to do next
After you define a server connection to an LDAP data source, you can create an attribute source that looks
up information from the LDAP server.
26 IBM Security Verify Access Version 10.0.1 December 2020: Federation Administration topics
DRAFT - NOT FOR PUBLICATION
Bind Password (LDAP only) Specifies the password for the LDAP bind DN.
Note: If bind DN (bind-dn) is set to anonymous, you can use any
non-empty string as the value of bind password (bind-pwd).
Reap time (seconds) (Oracle, Specifies the amount of time, in seconds, between runs of the pool
DB2, PostgreSQL only) maintenance thread. Specify -1 to disable pool maintenance. The
default is 180 seconds.
Max pool size (Oracle, DB2, Specifies the maximum number of physical connections for a pool.
PostgreSQL only) Specify 0 for unlimited. The default is 50.
Max pool size (LDAP only) Specifies the maximum number of connections that are pooled.
Note: This is only applicable for performing Attribute Mapping from
an LDAP server.
Min pool size (Oracle, DB2, Specifies the minimum number of physical connections to maintain
PostgreSQL only) in a pool. The aged timeout can override the minimum.
Purge policy (Oracle, DB2, Specifies which connections to delete when a stale connection is
PostgreSQL only) detected in the pool. Select from the following options:
Entire pool
When a stale connection is detected, all connections in the pool
are marked stale, and when no longer in use, are closed. This is
the default option.
Failing connection only
When a stale connection is detected, only the connection that
was found to be bad is closed.
Validate all connections
When a stale connection is detected, connections are tested and
the ones that are found to be bad are closed.
Max connections per thread Specifies the limit of open connections on each thread.
(Oracle, DB2, PostgreSQL only)
Cache connections per thread Specifies the number of cache connections for each thread.
(Oracle, DB2, PostgreSQL only)
28 IBM Security Verify Access Version 10.0.1 December 2020: Federation Administration topics
DRAFT - NOT FOR PUBLICATION
Procedure
1. Log in to the local management interface.
2. Click Federation.
3. Under Global Keys, click LTPA Keys.
4. Perform any of the following actions:
Importing an LTPA key:
a. Click Manage > Import.
b. Click Browse.
c. Select the file that you want to import.
d. Click Import.
Exporting an LTPA key:
a. Click Browse.
b. Select the file that you want to export.
c. Click Manage > Export.
d. Confirm that you want to save the file to your local workstation.
Deleting an LTPA key:
a. Select the file that you want to delete.
b. Click Delete.
c. Click Yes when you are prompted to confirm the deletion.
5. Deploy the changes as described in Configuration changes commit process.
DRAFT - NOT FOR PUBLICATION
30 IBM Security Verify Access Version 10.0.1 December 2020: Federation Administration topics
DRAFT - NOT FOR PUBLICATION
Procedure
1. Click Federation.
2. Under Global Settings, click Mapping Rules.
All existing mapping rules are displayed.
3. You can create, edit, or delete a mapping rule.
• To create a mapping rule
a. Click Add.
b. In the Content field, enter the JavaScript mapping rule content.
c. In the Name field, enter a name for the rule.
d. In the Category field, select the type of the mapping rule from the list, or type a name to create
your own mapping rule type.
Note: Only the mapping rule types that apply to your current activated offering are displayed in
the list.
e. Click Save.
• To modify a mapping rule
a. Select the mapping rule to modify.
b. Click Edit.
c. Modify the mapping rule in the Content field as needed.
Note: The Name and Category fields are not editable.
d. Click Save.
• To delete a mapping rule
Note: Do not delete a mapping rule that is currently used by a SAML 2.0 or OpenID Connect
federation.
a. Select the mapping rule to delete.
b. Click Delete.
c. Confirm the delete operation.
Use the function importMappingRule() to specify a mapping rule to import. For example, you can
define a mapping rule that is called Utility.js that contains functions for obtaining an HTTP header
and an HTTP cookie.
function getHeader(name) {
// function for getting HTTP header
}
function getCookie(name) {
// function for getting HTTP cookie
}
If you have another mapping rule that is called Credential.js, which also needs to obtain HTTP
headers, use the following code to include the functions from the Utility.js mapping rule:
importMappingRule("Utility");
var host = getHeader("Host");
// do something with the host header
var sessionID = getHeader("PD-SESSION-ID");
// do something with the session ID
The function importMappingRule() accepts a list of mapping rule names and imports each of the
mapping rules. For example:
importMappingRule("Utility","Credential","UserIdentity");
Alternatively, you can also make multiple calls to importMappingRule() within one script. For
example:
importMappingRule("Utility");
importMappingRule("Credential");
importMappingRule("UserIdentity");
The JavaScript engine throws an error if you do not specify a mapping rule name, or if you specify the
name of a mapping rule that does not exist.
Use the Local Management Interface (LMI) to view existing mapping rules that are defined on your
system. Select Federation > Global Settings > Mapping Rules, or AAC > Global Settings > Mapping
Rules.
Note:
On the LMI menu, the icon Import is for importing mapping rules into IBM® Security Verify Access,
not for importing a mapping rule into an existing mapping rule. Use the Edit icon to add the
importMappingRule() function to an existing mapping rule.
32 IBM Security Verify Access Version 10.0.1 December 2020: Federation Administration topics
DRAFT - NOT FOR PUBLICATION
Accessibility features
Security Verify Access includes the following major accessibility features:
Accessibility features
Supports interfaces commonly used by screen readers. This feature applies to applications on Windows
operating systems only.
Supports customization of display attributes such as color, contrast, and font size.
Supports interfaces commonly used by screen magnifiers. This feature applies to applications on
Windows operating systems only.
Allows the user to access the interfaces without inducing seizures due to photosensitivity.
Security Verify Access uses the latest W3C Standard, WAI-ARIA 1.0 (http://www.w3.org/TR/wai-aria/),
to ensure compliance to US Section 508 (http://www.access-board.gov/guidelines-and-standards/
communications-and-it/about-the-section-508-standards/section-508-standards), and Web Content
Accessibility Guidelines (WCAG) 2.0 (http://www.w3.org/TR/WCAG20/). To take advantage of accessibility
features, use the latest release of your screen reader in combination with the latest web browser that is
supported by this product.
The Security Verify Access online product documentation in IBM Knowledge Center is enabled for
accessibility. The accessibility features of IBM Knowledge Center are described at https://www.ibm.com/
support/knowledgecenter/help?view=kc#accessibility.
Keyboard navigation
This product uses standard navigation keys.
Interface information
The Security Verify Access user interfaces do not have content that flashes 2 - 55 times per second.
The Security Verify Access web user interfaces and the IBM Knowledge Center rely on cascading style
sheets to render content properly and to provide a usable experience. The application provides an
equivalent way for low-vision users to use a user’s system display settings, including high-contrast mode.
You can control font size by using the device or web browser settings.
The Security Verify Access web user interface includes WAI-ARIA navigational landmarks that you can
use to quickly navigate to functional areas in the application.
DRAFT - NOT FOR PUBLICATION
34 IBM Security Verify Access Version 10.0.1 December 2020: Federation Administration topics
DRAFT - NOT FOR PUBLICATION
T
Index trust chain 15, 19
A
accessibility features for this product 33
Advanced Access Control
point of contact profile 9
attribute source 7
C
callback parameters
point of contact profile 11
chain mapping 15
F
federation
point of contact profile 9
federation partner 3
federations
deleting 2
exporting properties 2
LDAP data source 25
managing 1
modifying 1
properties 1
L
LDAP
server connection 25
M
module chain
template 19
module instance 23
P
point of contact profile
callback parameters 11
creating 9
current 11
deleting 10
updating 10
properties
exporting federation 2
federation 1
S
server connections
LDAP 25
Index 35
DRAFT - NOT FOR PUBLICATION
36 IBM Security Verify Access Version 10.0.1 December 2020: Federation Administration topics
DRAFT - NOT FOR PUBLICATION
IBM®