Questions concerning FIM encryption algorithms
1. Can FIM be configured so that a particular SSO connection can use one encryption algorithm versus another? For example, if we are acting as an IDP and one client requires TRIPLE DES encryption and another client requires AES 256, can FIM be configured to support this scenario?
RSA Response:
This is a system wide setting. Whenever FIM on your side encrypts data to send it will be of the one algorithm chosen. All partners/receivers will know what algorithm was used as it is marked in the xml of the assertion or name identifier. All receivers must be able to accept any of the three algorithms chosen. Encrypted data and what algorithm is used is dependent upon the xml statements used in an assertion, metadata etc.
For example
<EncryptionMethod Algorithm='http://www.w3.org/2001/04/xmlenc#tripledes-cbc'/>
<EncryptionMethod Algorithm='http://www.w3.org/2001/04/xmlenc#aes128-cbc'/>
2. Does FIM support additional encryption algorithms other than the TRIPLE DES, AES128, and AES 256? If so, how do we accomplish this?
RSA Response:
No, only the three specified. We will accept any encrypted data from partners if it is done with any of the three algorithms regardless of the system setting. The system setting is for what we send. We will accept any of the three.
General Info:
The federation protocols that Federated Identity Manager supports require encryption algorithms that are not available in the default weblogic application server environment. To implement these encryption algorithms, you must install and configure either the Crypto-J 4.0 FIPS security provider or the BouncyCastle security provider.
? Crypto-J 4.0 FIPS: jsafeJCEFIPS.jar
? BouncyCastle: bcprov-jdk14-134.jar
Federated Identity Manager uses the encryption algorithm to encrypt assertions and name identifiers. Federated Identity Manager only supports AES 128, AES 256, and triple DES. If you want to use AES-256 for encryption, you must download the JCE Unlimited Strength Jurisdiction Policy files provided with the Sun JDK 1.4.2.
Related Articles
Oracle AFX connector message "DH Parameters without subprime Q are not FIPS 140 approved" in RSA Governance & Lifecycle 113Number of Views RSA Announces the Availability of RSA Identity Governance and Lifecycle 2016 Q4 Appliance Updater Release 3Number of Views RSA Announces the Availability of RSA Identity Governance and Lifecycle Appliance Updater - Q2 2016 4Number of Views RSA Announces the Availability of 2017 Q1 RSA Identity Governance and Lifecycle Appliance Updater Release 4Number of Views RSA Identity Governance and Lifecycle Q4 2016 Appliance Updater reports a failure installing Oracle patch 24315824 63Number of Views
Trending Articles
How to recover the Application and AFX after an unexpected database failure in RSA Identity Governance & Lifecycle Troubleshooting AFX Connector issues in RSA Identity Governance & Lifecycle RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Release Notes for RSA Authentication Manager 8.8 RSA Authentication Manager 8.9 Release Notes (January 2026)