Configuring SAML at the System Level

Configuring SAML at the System Level

Before allowing any portal instances to enable SAML authentication, you should configure it at the system level so those instances have a foundation from which to work. For example, you wouldn’t want to have portal instances configuring SAML and then find you must move the key store from the file system into the document library. This creates a configuration headache for everybody. It’s better to configure your system level options first.

Choose Your Key Store Manager Target

  1. Log into Liferay DXP with administrator credentials and go to Control PanelSystem SettingsSecuritySSOSAML KeyStoreManager Implementation Configuration.

  2. Choose either File System (the default) or Document Library.

  3. Click Update.

Select either File System or Document Library.

Be sure to have backups configured for either location.

Configure SAML

Verify the default configuration is appropriate for your system:

  1. Go to Control PanelSystem SettingsSecuritySSOSAML Configuration.

  2. Set your key store path. By default, it’s in your Liferay Home directory. If you chose the Document Library as the location for your key store, its path is hard-coded to /saml/keystore.jks for the current portal instance, and entering something here has no effect.

  3. Set the password for accessing the key store.

  4. Review the other options (see below), modify them accordingly, and click Save.

There are various options you can set:

Key Store Type: Set the key store type. The default is jks, or Java Key Store. You can choose any option supported by Java.

SSO Session Check Interval: The IdP should check for expired sessions for every minute you enter here.

Runtime Metadata Refresh Interval: Refresh peer SAML entities for every second you enter here.

Replay Cache Duration: Expire IdP message cache entries when the number of milliseconds entered here expires. Caching messages protects against message replay attacks.

Authentication Request Check Interval: The SP removes expired Authn requests when they reach this age in minutes.

Authn Request Maximum Age: Enter the time in milliseconds that Authn requests should be valid.

Message Check Interval: The SP should remove expired entries from the IdP messages cache when they’re older than this number of minutes.

Enable Identity Provider Role To Be Configured: If you check this box, you allow portal instances on this Liferay DXP installation have the IdP role.