Configuring SAML Authentication
To use a trusted SAML identity provider, such as Okta, you must configure methods, chains, and events in Advanced Authentication. The metadata document for a trusted SAML identity provider, with which an SSO defined provider interacts, must be obtained in a provider-specific manner. While not all providers do so, many supply their metadata documents via URL.
Checklist for Configuring SAML Authentication
To configure an external SAML Identify Provider and proceed to integrate with it, you must complete the following steps in the given order:
| Task | See | |
|---|---|---|
|
|
Configuring an External SAML Provider |
|
|
Integrating with an External SAML Provider |
Configuring an External SAML Identity Provider
You can configure an external SAML identity provider to use the metadata URL of Advanced Authentication SSO to derive the specific single sign-on and single logout URLs. These URLs include the following:
-
Advanced Authentication single sign-on URL: https://aa.cyberresprod.com/osp/a/<tenant name>/auth/saml2/spassertion_consumer
-
Advanced Authentication Entity ID, Issuer or Audience URL: https://aa.cyberresprod.com/osp/a/<tenant name>/auth/saml2/metadata
-
Advanced Authentication single logout: https://aa.cyberresprod.com/osp/a/<tenant name>/auth/saml2/spslo
You can configure any external identity service provider. In the following section, Okta is used as an example of an external identity service provider. To configure Okta as an external service provider, complete the following steps:
For more information on Okta configurations, see Okta SAML App Integrations.
To Configure Single Sign-On with Okta:
-
Log in to Okta and go to SAML Settings.
-
Enter https://aa.cyberresprod.com/osp/a/<tenant name>/auth/saml2/spassertion_consumer as the Single Sign-On URL.
You must use this for both Recipient and Destination URLs -
Enter https://aa.cyberresprod.com/osp/a/<tenant name>/auth/saml2/metadata as the Audience URL.
-
For attribute statements, specify, as username and as user.email.
-
Use default values for all other fields and follow on screen instructions to complete the configuration.
To Configure Single Logout with Okta:
-
Log in to Advanced Authentication and go to in the left-hand menu.
-
Click to launch a pop-up window.
-
Copy content from“-----BEGIN CERTIFICATE-----" to”-----END CERTIFICATE-----” from the text on the pop-up window.
-
Paste the copied content into a new text file and save. For example, you can save the file as aa_certificate.cert.
-
Log in to Okta, go to and then click
-
Under , select the check box.
When this check box is selected, if you log out of the application, the system logs you out of Okta and applications that use Okta SSO. -
Enter https://aa.cyberresprod.com/osp/a/<tenant name>/auth/saml2/spslo as the Single Logout URL.
-
Enter https://aa.cyberresprod.com/osp/a/<tenant name>/auth/saml2/metadata as the SP Issuer.
-
Browse to select the saved aa_certificate.cert as the Signature Certificate and upload.
-
Follow on screen instructions to complete the configuration.
-
To create and update the latest, follow the instructions in step 2 of Integrating with an External SAML Identity Provider.
Any changes to Okta or configurations might require the associated Okta metadata file to be re-uploaded to the method in Advanced Authentication.
Integrating with an External SAML Identity Provider
To integrate an external SAML identity provider:
-
Log in to the Advanced Authentication service.
-
To create the method for SAML authentication, complete the following steps:
-
In the left menu, select .
-
Select .
-
Click .
-
For , select .
-
Click the save icon on the right.
-
Enter a name for the .
-
Enter username as the .
Your assertion attribute must match in Advanced Authentication and your trusted SAML provider to complete the configuration successfully. -
Browse to select the .
-
Click the save icon on the right.
-
Select .
-
-
To create a chain of authentication, complete the following steps:
-
From the left menu, select .
-
Select .
-
For authentication , select .
-
To specify the repo that uses this authentication method, select secops_localusers.
You must start typing the repo name before you can select it. -
Select .
-
-
To update the authentication event, complete the following steps:
-
From the left menu, select .
-
Select the <tenant>-FUML event to update.
-
Deselect current in use.
-
Select the new chain that you created in Step 3.
-
Select Save.
-
-
To update the , complete the following steps:
-
From the left menu, select .
-
Select .
-
Select the as https://aa.cyberresprod.com.
-
Select .
-