About this task
You can use the wsadmin
command-line utility
to display the Security Assertion Markup Language (SAML) trust association
interceptor (TAI) identity provider (IdP) partner configuration in
the security configuration for WebSphere Application Server.
Procedure
- Start the WebSphere Application Server.
- Start the
wsadmin
command utility from
the app_server_root/bin directory by entering
the command: wsadmin -lang jython
.
- At the
wsadmin
prompt, enter the following
command: AdminTask.showSAMLIdpPartner('-ssoId 1')
You
can use the following parameters with this command:
Table 1. showSAMLIdpPartner
parameters
Parameter |
Description |
-ssoId |
This parameter is optional if you have only
one SSO service provider partner. If you have more than one SSO service
provider partner, this parameter is required. It is the identifier
for the group of custom properties that are associated with the SSO
service provider partner. This parameter is specified as an integer. |
-idpId |
This parameter specifies the identifier of the
IdP whose properties you want to display. If a value for this parameter
is not specified, the command shows all IdP partners for the specified
SSO service provider partner. This parameter is specified as an integer. |
-securityDomainName |
This parameter specifies the name of the security
domain of interest. If a value for this parameter is not specified,
the command uses the global security configuration. This parameter
is specified as a String. |
Results
The custom properties for the specified SAML web SSO IdP partner
are displayed.
Example
The following example displays the SAML Idp partner 1 of
the SSO service provider partner 1 from the global security SAML TAI
configuration:AdminTask.showSAMLIdpPartner('-ssoId 1 -idpId 1')
The following example displays the SAML IdP partner 2
of the SSO service provider partner 1 from the security domain
myDomain1
:
AdminTask.showSAMLIdpPartner('-ssoId 1 -idpId 2 -securityDomainName myDomain1')