Test SP Engine Results

3-32 Oracle Fusion Middleware Administrators Guide for Oracle Identity Federation ■ Authentication Instant: the instant at which the identity provider authenticated the user. ■ Session Expiration Instant: the instant at which the user session will become invalid. ■ Authentication Mechanism: the local mechanism used to authenticate the user. ■ SSO Primary Status Code: The primary status code in the assertion received from the identity provider. ■ SSO Secondary Status Code: The secondary status code in the assertion received from the identity provider. ■ SSO Status Message: The status message in the assertion received from the identity provider. ■ IdP Provider ID: The Provider ID of the identity provider that authenticated the user. ■ A list of the attributes from the assertion received from the identity provider, including: – orafed-providerid: The Provider ID of the identity provider that authenticated the user. – orafed-nameid-format: The format of the Name ID of the user federation. – orafed-nameid-value: The Name ID of the user federation. – orafed-assertionid: The ID of the assertion received from the identity provider. – Any user attributes included in the assertion received from the identity provider.

3.3 Post-Upgrade Administration

This section describes actions that the administrator must take following an upgrade of Oracle Identity Federation.

3.3.1 11g Server Signing Certificate

During an upgrade from release 10g to 11g, the upgrade assistant migrates the Oracle Identity Federation 10g LibertySAML2.0 signing keycertificate as the signing certificate of the Oracle Identity Federation 11g instance for use in SAML2.0SAML1.xWS-Fed operations. If you used the Oracle Identity Federation 10g server to sign SAML 1.xWS-Fed messages, you have two options: ■ Keep the SAML1.xWS-Fed keycertificate as the Oracle Identity Federation 11g signing keycertificate for all protocols SAML2.0SAML1.xWS-Fed. To implement this, upload the 10g keystore as the 11g signing keystore. The 10g keystore can be found in the Oracle Identity Federation Administration Console by navigating to SAML1xWSFed, then Signer; the 11g keystore is located in Fusion Middleware Control by navigating to the Oracle Identity Federation instance, in the Security and Trust section. You must redistribute the SAML2.0 metadata to the remote partners after the change, so that the partners have the new signing certificate. Deploying Oracle Identity Federation 3-33 ■ Keep the SAML 2.0 signing keycertificate as the signing keycertificate of the Oracle Identity Federation 11g server. To implement this, you will need to provide the new signing certificate to all SAML 1.xWS-Fed partners.