Configuring SAML Authentication
This section provides the steps to integrate SSO with an external SAML 2.0 IDP solution, such as NetIQ Advanced Authentication
- Describing Information Regarding the Trusted Provider Metadata
- Configuring an External SAML Provider
- Integrating with an External SAML Provider
Describing Information Regarding the Trusted Provider Metadata
The metadata document for a trusted SAML provider with which a SSO defined provider interacts must be obtained in a provider-specific manner. While not all providers do so, many supply their metadata documents via URL.
After the trusted provider's metadata document (or the URL-accessible location of the document) is obtained, you must configure the SSO provider that will interact with the trusted provider's metadata.
In the document, modify the <Metadata> element within the <AccessSettings> element under either the <TrustedIDP> element or the <TrustedSP> element.
For example:
com.microfocus.sso.default.login.saml2.mapping-attr = email
The email attribute refers to the email attribute name from the SAML 2.0 IDP.
Configuring an External SAML Provider
Use the metadata URL of Fusion SSO to derive the specific single sign-on and single log-out URLs to configure an external SAML 2.0 IDP. These URLs include the following:
-
Fusion metadata URL: https://<FQDN of ArcSight Platform Virtual IP for HA or single master node>/osp/a/default/auth/saml2/spmetadata
-
Fusion Entity ID or Issuer: https://<FQDN of ArcSight Platform Virtual IP for HA or single master node>/osp/a/default/auth/saml2/metadata
-
Fusion single sign-on: https://<FQDN of ArcSight Platform Virtual IP for HA or single master node>/osp/a/default/auth/saml2/spassertion_consumer
-
Fusion single log-out: https://<FQDN of ArcSight Platform Virtual IP for HA or single master node>/osp/a/default/auth/saml2/spslo
Integrating with an External SAML Provider
-
On the NFS server, open the sso-configuration.properties file, located by default in the
<arcsight_nfs_vol_path>/sso/defaultdirectory.<arcsight_nfs_vol_path>is the nfs volume used for CDF installation.For Example:
/opt/NFS_volume/arcsight-volume/sso/default - Open the sso-configuration.properties file and add the following properties:
com.microfocus.sso.default.login.method = saml2com.microfocus.sso.default.saml2.enabled = true -
To specify the address where the IDP supplies its metadata document, complete one of the following actions:
- Add the following property to the file:
com.microfocus.sso.default.login.saml2.metadata-url = <IDP SAML metadata URL> - An example of an Okta server URL could be:
- An example of a Keycloak server URL could be:
https://<youraccount>.okta.com/app/<appid>/sso/saml/metadata
https://<KeycloakServer>/auth/realms/<YourRealm>/protocol/saml/descriptor
- Alternatively, you can convert the metadata xml file to base64 string and set the following variable:
-
Save the changes to the
sso-configuration.propertiesfile. -
(Conditional) If you specified the metadata URL in Step 3, complete the following steps to import the IDP certificate to the SSO keystore:
- Copy the IDP certificate to the following location.
- Get the pod information.
- Open a terminal in the currently running pod:
- Import the IDP certificate:
cd /usr/local/tomcat/conf/default/keytool -importcert -storepass $KEYSTORE_PASSWORD -destkeystore \
sso.bcfks -alias AliasName -file CertificateFileName -storetype \
BCFKS -providerclass \
org.bouncycastle.jcajce.provider.BouncyCastleFipsProvider \
-providerpath /usr/local/openjdk-8/jre/lib/ext/bc-fips-1.0.2.jarCertificateFileNamerepresents the name of the certificate file that you copied to <arcsight_nfs_vol_path>/sso/default/, which automatically displays in your current directory:AliasNamerepresents the new alias name that you want to assign to the certificate in the SSO keystore.
arcsight_nfs_vol_path/sso/defaultkubectl get pods --all-namespaces | grep single-sign-onkubectl exec -it fusion-single-sign-on-xxxxxxxxxx-xxxxx -n arcsight-installer-xxxxx -c fusion-single-sign-on bash/usr/local/tomcat/conf/default/
com.microfocus.sso.default.login.saml2.metadata = <base64 encoded metadata xml>
- Restart the pod:
- Get the pod information.
- Delete the current running pod.
- Retrieve the Fusion SSO SAML service provider metadata from the server.
kubectl get pods --all-namespaces | grep fusion-single-sign-on
kubectl delete pod fusion-single-sign-on-xxxxxxxxxx-xxxxx -n arcsight-installer-xxxxx
https://<FQDN of ArcSight Platform Virtual IP for HA or single master node>/osp/a/default/auth/saml2/spmetadata
- Use the SSO SAML service provider metadata to configure your IDP. For detailed instructions, see the IDP software documentation.
- To establish a trust relationship between Fusion SSO and your IDP software, create certificates for your IDP software. For detailed instructions on how to create and import certificates in your IDP software, see the IDP software documentation.