When configuring SAML 2.0 authentication, it is necessary to specify certain claims for the certificate provided by the identity provider. This is a step-by-step procedure on how to configure your Orchestrator instance to use a private key SAML certificate. The procedure begins with importing the certificate into the Windows Local Machine certificate store using Microsoft Management Console, and continues with the actual configuration steps required in Orchestrator.
- Go to Control Panel > Manage Computer Certificates. The console is displayed.
- In the Console Root window's left pane, expand the Personal folder and then click Certificates.
- Right-click Certificates and then select All Tasks > Import. The Certificate Import Wizard is displayed.
- Make sure that Local Machine is selected in the Store Location section. Click Next.
- Click Browse and select the certificate to upload.
- Once the upload is complete, the certificate should be displayed in the console.
- Double-click it. The Certificate dialog box is displayed.
- On the Details tab, scroll through the list of fields and click Thumbprint.
- Copy the hexadecimal characters from the box.
- Remove the spaces between the characters. For example, the thumbprint "a9 09 50 2d d8 2a e4 14 33 e6 f8 38 86 b0 0d 42 77 a3 2a 7b" should be specified as "a909502dd82ae41433e6f83886b00d4277a32a7b" in
When copied from the box on the Certificate window, the thumbprint contains several special characters that are only visible in ANSI encoding. Make sure to delete those using a suitable application such as Notepad++.
See bellow an example of getting a thumbprint ready for the
web.config, set the
findValueattribute of the
signingCertificateparameter to the thumbprint, as in the example below:
<signingCertificate storeName="My" storeLocation="LocalMachine" x509FindType="FindByThumbprint" findValue="30c4de7f241904544ca663689146769c914c5dd2"/>
Updated 3 years ago