Symantec IGA

 View Only

BETA invitation for the new Symantec IGA Native Federation SSO protocols support

By Itamar Budin posted Apr 15, 2020 09:57 AM



As part of our continued effort to support industry standards, We are please to invite you to our newest BETA program where you will be able to configure Symantec Identity Manager and Identity Portal to support native federation SSO protocols without the need to use Symantec SiteMinder.

Customers will be able to configure our solution to support federation protocols like SAML 2.0 and OpenID Connect as the SSO solution using their own IDP solution.

At this time, we offer only support for SAML 2.0 for Identity Manager and Identity Portal but we are going to add OpenID Connect support as-well-as Identity Governance support very soon.

How to join?

Please click on the following URL to automatic register to our validation site:

More on SAML 2.0:

More on OpenID Connect:

  • OpenID Connect is a simple identity layer on top of the OAuth 2.0 protocol, which allows computing clients to verify the identity of an end-user based on the authentication performed by an authorization server, as well as to obtain basic profile information about the end-user in an interoperable and REST-like manner. In technical terms, OpenID Connect specifies a RESTful HTTP API, using JSON as a data format.
  • OpenID Connect allows a range of clients, including Web-based, mobile, and JavaScript clients, to request and receive information about authenticated sessions and end-users. The specification suite is extensible, supporting optional features such as encryption of identity data, discovery of OpenID Providers, and session management.

Notes and disclaimers:

  1. This BETA program is intended for validation of this new feature.
  2. Customers should be aware that this is NOT a production ready solution and should NOT use this code in any environment other than a non-production one.
  3. Customer should not open a support ticket with Broadcom support regarding this feature. Any but report should be posted using the following link. When submitting a new Bug Report, please provide as much information as you can like:
    1. Application Server, DB, OS, JDK version and types
    2. Type of IDP being used (SiteMinder, OKTA etc.)
    3. Log files from the solution.
  4. Note that any new Bug Reports will being directed to our engineering teams.


Customer should make sure they are running Identity Manager 14.2 CP5, Identity Portal 14.2 CP2, or 14.3 CP1 on their non-production environment.


Itamar Budin

Product Management Lead  - Identity Governance & Administration | Symantec Software Division

Symantec, A Broadcom Company

1 comment