search cancel



Article ID: 130878


Updated On:


CA Single Sign On Secure Proxy Server (SiteMinder) CA Single Sign On SOA Security Manager (SiteMinder) CA Single Sign-On SITEMINDER


When running Web Agent one might like to know under which conditions
the SM_USERGROUPS header gets populated ?



User attributes SM_USERGROUPS and SM_USERNESTEDGROUPS are generated
when the user is authenticated and is stored in Policy Server user
cache. This data is fetched again only if one of the below mentioned
scenario's happen (1).

  1. User log off and login again
  2. When the session expires

Following two registry defines the LDAP query for SM_USERGROUPS (2):


You can make SM_USERGROUPS available for the browser by setting a
response (3)(4).

You won't see the SM_USERGROUPS in the browser, it is sent only to the
accessed page. In order to see them, you have to put a test page in
which you'll run code to read all the headers and display them in the
html page. Here's a sample in php :


  foreach (getallheaders() as $name => $value) {
    echo "$name: $value\n"; 
    echo "<br />"; 



The Directory Mapping is used at authorization time. The SM_USERGROUPS
is set at authentication time, and as such it won't be used.


Additional Information



   How can I get the User Groups by using the Java SDK (12SP3) ?


   How is the LDAP search query for the SM_USERGROUPS formed ?


   Tech Tip - CA Single Sign-On:Policy Server:: How to check if user is a member of a group



     This attribute holds the groups to which the user belongs. If the user 
     belongs to a nested group, this attribute contains the group furthest 
     down in the hierarchy. For all nested groups to which the user 
     belongs, use SM_USERNESTEDGROUPS. 


     If a user belongs to the group Accounts Payable and Accounts Payable 
     is contained in the group Accounting, SM_USERGROUPS contains Accounts 
     Payable. If you want both Accounting and Accounts Payable, use 


     Generated User Attributes