Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Support along with the Onboarding Team Members have the access to login as any MRAO in the system. The process is only used to support a MRAO who has questions regarding SCM or Support/Validation Related issues. In the process any of Sectigo staff needing to login as a MRAO they will notify the MRAO who asked for support or if we deem something is wrong they may just login as prior to responding.  

Q: How do I enable SAML?

To enable SAML for admin access to SCM:

To use SAML "self-enrollment" for server certificates (allows users outside of SCM admin to request server certificates):

  • Step 1: go to Settings>Organizations>select organization.
  • Edit the organization and select the SSL certficates tab.
  • Select "self enrollment using SAML". This will provide you with a unique url that can be shared with users.
  • The token string used in the url can be changed by administrators if issues occur.

To use SAML in order to allow users to order client certificates:

  • https://cert-manager.com/customer/[YOURNREN]/idp/clientgeant.
  • Configure your IdP correctly for Sectigo. See below.
  • Edit your organization in SCM (Settings>Organizations>select) and set "Academic code (SCHAC Home Organization)" to the same value as your IdP sends for schacHomeOrganization. It will typically be your main domain, but confirm this with your IdP admins.
  • Edit your organization object and set "Secondary Organization Name" to the name used in grid certificates (ASCII). Please check existing certificates. As grid certificate subjects are used as "usernames" in systems, it is vital that the whole subject string is kept as it was before for your users.

IdP must release the following information:

displayName

urn:oid:2.16.840.1.113730.3.1.241

Johnny DoeUSED for CN. See below
cn

urn:oid:2.5.4.3

John Doefallback for CN. See below
sn

urn:oid:2.5.4.4

Doefallback for CN. See below
givenName

urn:oid:2.5.4.42

Johnfallback for CN. See below
mail

urn:oid:0.9.2342.19200300.100.1.3

johndoe@example.eduyes

eduPersonPrincipalName

urn:oid:1.3.6.1.4.1.5923.1.1.1.6

jd@example.eduyes

eduPersonEntitlement

urn:oid:1.3.6.1.4.1.5923.1.1.1.7

urn:mace:terena.org:tcs:personal-user

yes (see authorization)

schacHomeOrganization

urn:oid:1.3.6.1.4.1.25178.1.2.9

example.eduyes

Q: What is needed to validate an organisation?

...