Configure Tivoli® Federated Identity Manager (TFIM) V6.1 to map the incoming security token and, if required, to authenticate and authorize it.
Before you start:
Before you can configure a message flow to perform identity mapping, you need to check that an appropriate security profile exists, or create a new security profile. For information about security profiles, see Creating a security profile.
To configure TFIM V6.1 to map the incoming security token, you need to create a custom module chain in TFIM, which performs the security operations. The TFIM configuration controls the token type that is returned from the mapping.
The security manager invokes the security provider only once, even if it is set for additional security operations (such as authentication or authorization). As a result, when you are using TFIM V6.1, you must configure a single module chain to perform all the required authentication, mapping, and authorization operations.
For information on how to configure TFIM, see the IBM Tivoli Federated Identity Manager product documentation.
Follow these steps to enable an existing message flow to perform identity mapping.