
8-35
UserGuide for Cisco Digital Media Manager5.4.x
OL-15762-05
Chapter8      Authentication and Fe derated Identity
  Procedures
Step2
Install Enhanced 
Client or Proxy 
(ECP), a SAML 
profile plugin, if 
you will make 
API system calls 
to OpenAM
1
.
a.
Log in to your Cisco.com user account.
b.
Go to http://cisco.com/cisco/software/release.html?mdfid=280171249&softwareid=
282100271&release=5.3&rellifecycle=&relind=AVAILABLE&reltype=all, navigate to the 
download page for our implementation of ECP
2
, and then download it.
c.
Use Maven or another method to download release 1.2.14 of the open source logging 
framework called log4j. 
d.
Copy your downloaded ECP and log4j files to 
/$OPENSSO_HOME/WEB-INF/lib
, .
e.
Restartyour servlet container— for example, tomcat.
f.
In OpenAM Web, click Federation, and then click your IdP server instance—for 
example, dmsIdp.
g.
Click Advanced.
h.
In the ECP Configuration area, set the IDP Session Mapper value to 
com.cisco.dms.core.security.aaa.sso.saml2.ecp.idp.plugin.DmsIDPECPSessionMapper.
i.
Click Save.
Step3
Export SP 
metadata from 
CiscoDMS.
Export metadata from each SP that will participate in your OpenAM CoT. 
Tip
For Cisco DMS, see the “Export SP Metadata from DMM” topic.
Step4
Import SP 
metadata from 
CiscoDMS.
a.
Go to the console page and click Register Remote  Service Provider.
b.
Check the File check box.
c.
Click Upload, and then navigate to the SP metadata that you exported from DMS-Admin and 
saved as dms_sp_config.xml.
d.
Click Configure, and then click Federation.
e.
Make sure that dmsServiceProvider (SAMLv2 SP Remote) has a defined value.
Step5
Make sure that 
OpenAM is 
configured to 
issue the 
Principal 
attribute.
a.
In OpenAM Web, click Federation, and then click your IdP server instance—for 
example, dmsIdp.
b.
Click Assertion Processing.
c.
In the Attribute Mapper area, set the Attribute Map value to UID=uid.
d.
Click Back.
e.
Click the SP entity instance for your DMM appliance.
The Assertion Content tab is selected automatically.
f.
In the Request/Response Signing area, check both of these check boxes:
•
Authentication Requests Signed
•
Assertions Signed
g.
Choose Access Control> / ( TopLevel Realm) > Authentication.
h.
Click All Core Settings.
i.
Make sure that the User Profile value is set to Required.
This will cause OpenAM to pass the user IDs of logged-in users to DMM and your other SPs.
j.
Click Save, and then click Back to Authentication.
k.
Log out of OpenAMWeb.