Skip to content

Commit 88c1dae

Browse files
authored
Merge pull request #898 from ritza-co/1061-saml
1061: clarify Azure config; saml-2-0-configuration.mdx
2 parents 7093678 + 2d389de commit 88c1dae

File tree

3 files changed

+103
-101
lines changed

3 files changed

+103
-101
lines changed

docs/administration/saml-2-0-configuration.mdx

Lines changed: 103 additions & 101 deletions
Original file line numberDiff line numberDiff line change
@@ -5,224 +5,226 @@ sidebar_position: 13
55

66
Device42 integrates with SAML 2.0 in conjunction with AD or LDAP user synchronizations to provide Single Sign On (SSO) support in Device42. Once users are added to Device42 via Active Directory or LDAP, they will automatically be logged into Device42 when they load the site.
77

8-
_Note_ Since authorization is handled by Device42, the user needs to exist within Device42 before they can log in for single sign on functionality to work.
8+
:::note
9+
Since authorization is handled by Device42, the SSO functionality only works if the user account already exists within Device42 before the user logs in.
10+
:::
911

10-
SAML configuration varies between providers, but we'll provide the steps for configuration with Microsoft ADFS, Okta and Onelogin below as examples. Device42 SSO should also work with **any** SAML2.0 compatible Identity Provider, and has been confirmired working with IDaaS providers Centrify and PingIdentity's PingOne and PingFederate as well.
12+
SAML configuration varies between providers, but we'll provide the steps for configuration with Microsoft ADFS, Okta, and Onelogin below as examples. Device42 SSO should also work with **any** SAML 2.0 compatible Identity Provider and has been confirmed to work with IDaaS providers, Centrify, and PingIdentity's PingOne and PingFederate.
1113

1214
Should you need further assistance, please contact [Support](mailto:[email protected]).
1315

14-
### Microsoft ADFS Configuration
16+
## Microsoft ADFS Configuration
1517

16-
Add new relying party trust.
18+
Add a new relying party trust.
1719

1820
![ADFS Party Trust](/assets/images/adfs-001.png)
1921

20-
Next screen : Add data manually.
22+
Next screen: Add data manually.
2123

2224
![ADFS Party Trust](/assets/images/adfs-002.png)
2325

24-
Next screen : Specify your app display name.
26+
Next screen: Specify your app display name.
2527

26-
Next screen : Choose AD FS profile.
28+
Next screen: Choose **AD FS** profile.
2729

28-
Next screen : Choose SAML 2.0 SSO and set proper D42 ACS url – https://\_\_\_device42\_\_\_url/saml2\_auth/acs/.
30+
Next screen: Choose **SAML 2.0 SSO** and set proper D42 ACS URL: `https://___device42___url/saml2_auth/acs/`.
2931

3032
![](/assets/images/SAML-admin_adfs-003.png)
3133

32-
Next screen : Set identifiers accesshttps://\_\_\_device42\_\_\_url/saml2\_auth/acs/.
34+
Next screen: Set identifiers access: `https://___device42___url/saml2_auth/acs/`.
3335

3436
![](/assets/images/SAML-admin_adfs-004.png)
3537

36-
Next screen : Permit all users
38+
Next screen: Permit all users.
3739

38-
Next screen : In claims section ( click “edit claims on relying party / automatic go to this section after initial setup ), add the following claims
40+
Next screen: In the claims section (click **Edit claims** on the relying party / automatically go to this section after initial setup), add the following claims:
3941

40-
username claim
42+
- The `username` claim
4143

42-
![ADFS Party Trust](/assets/images/adfs-005.png)
44+
![ADFS Party Trust](/assets/images/adfs-005.png)
4345

44-
nameid claim
46+
- The `nameid` claim
4547

46-
![ADFS Party Trust](/assets/images/adfs-006.png)
48+
![ADFS Party Trust](/assets/images/adfs-006.png)
4749

48-
Copy metadata url from endpoints
50+
Then, copy the metadata URL from the endpoints.
4951

5052
![ADFS Party Trust](/assets/images/adfs-007.png)
5153

52-
\*\* if you receive time synchronization error please write this command in powershell : Set-ADFSRelyingPartyTrust -TargetIdentifier "" -NotBeforeSkew 5
54+
If you receive a time synchronization error, please write this command in PowerShell:
5355

54-
### Azure AD Configuration
56+
```bash
57+
Set-ADFSRelyingPartyTrust -TargetIdentifier "" -NotBeforeSkew 5
58+
```
5559

56-
1\. Navigate to Azure AD in the Azure portal _\> Enterprise Applications > New Application > Create your own application_. Give your app a name (the app shown in the screenshots is _Device42SAML_) and select the third option _Integrate any other application..._, then click _Create_.
60+
## Azure AD Configuration
5761

58-
![](/assets/images/image-5.png)
62+
1. Navigate to Azure AD in the Azure portal via **Enterprise Applications > New Application > Create your own application**. Give your app a name (the app shown in the screenshots is `Device42SAML`) and select the third option **Integrate any other application...**, then click **Create**.
5963

60-
2\. Open your newly created enterprise app _\> Option 2- Set up Single sign on_, or select _Single sign-on_ under Manage in left-hand toolbar.
64+
![](/assets/images/image-5.png)
6165

62-
![](/assets/images/image2.png)
66+
2. Open your newly created enterprise app. Then, under the **Getting Started** section, select the second option, **Set up Single sign on**. Alternatively, select **Single sign-on** under **Manage** in the left-hand toolbar.
6367

64-
3\. Enter `https://<D42-FQDN-or-IP>/saml2_auth/acs/` in Identifier (Entity ID) and Reply URL (Assertion Consumer Service URL) in Section 1 Basic SAML Config.
68+
![](/assets/images/image2.png)
6569

66-
![](/assets/images/image3.png)
70+
3. In the first section, **Basic SAML Configuration**, enter `https://<D42-FQDN-or-IP>/saml2_auth/acs/` in the **Identifier (Entity ID)** and **Reply URL (Assertion Consumer Service URL)** fields.
6771

68-
4\. Navigate to the Device42 Appliance Manager > Global Settings > SAML 2.0 Settings. Copy the App Federation Metadata URL in the SAML Signing Certificate section from the enterprise app you created in Azure AD and paste into Metadata auto conf url in the D42 Appliance Manager.
72+
![](/assets/images/image3.png)
6973

70-
![](/assets/images/image4.png)
74+
4. Navigate to the Device42 Appliance Manager and go to **Global Settings > SAML/SSO Settings**. Copy the **App Federation Metadata URL** in the **SAML Signing Certificate** section for the enterprise app you created in Azure AD, and paste the URL into the **Metadata auto conf url** field in the Device42 Appliance Manager.
7175

72-
5\. While still in the SAML 2.0 settings of the Appliance Manager, enter `username` or other appropriate SAML attribute.
76+
![](/assets/images/image4.png)
7377

74-
Save and restart the appliance from the VM console menu with option 4. You may wish to complete steps 6 and 7 before saving/restarting so that you can still login to D42 and create users with the local admin account you've used so far. The SAML attributes tested successfully are listed below:
78+
5. While still in the **SAML 2.0 Settings** of the Appliance Manager, enter `username` or another appropriate SAML attribute in the **Username field**. Unless you have signed responses configured on your Azure AD provider side, keep the **Require signed response** box unchecked; otherwise, you'll get an unavailable page message.
7579

76-
- **emailaddress** - Email address associated with user account in Azure AD
77-
- **name** - User Principal Name (UPN) associated with user account in Azure AD
80+
Azure's built-in claims like `emailaddress` may not work with Device42, even though they appear in the Azure interface, because the built-in claim uses a namespace URI format. The solution is to create a new claim for `emailaddress` in your Azure AD enterprise app, map the claim to the user attribute, and use the custom claim name in the Device42 SAML **Username field**.
7881

79-
![Enter SAML username](/assets/images/saml-username.png)
82+
Save and restart the appliance from the VM console menu. You may wish to complete steps 6 and 7 before saving or restarting, so that you can still log in to Device42 and create users with the local admin account you've used so far.
8083

81-
6\. Assign users/groups to the SAML enterprise app you created in Azure AD. These should be users/groups that you want to allow authentication into Device42 via this SAML integration.
84+
![Enter SAML username](/assets/images/enable-saml-2.0.png)
8285

83-
7\. For any users associated with the enterprise app in Azure AD, create the user in Device42 using the appropriate Azure AD value with a dummy password. The integration does not pull and create users directly from Azure AD, so the users must be created within Device42 prior to any attempt to authenticate via Azure AD.
86+
6. Assign users or groups to the SAML enterprise app you created in Azure AD. These should be users or groups that you want to allow authentication into Device42 via this SAML integration.
8487

85-
8\. Once the above has been completed, you should be able to login to your D42 instance with your Azure AD credentials.
88+
7. For any users associated with the enterprise app in Azure AD, create the user in Device42 using the appropriate Azure AD value with a dummy password. The integration does not pull and create users directly from Azure AD, so the users must be created within Device42 prior to any attempt to authenticate via Azure AD.
8689

87-
### Okta Configuration
90+
8. Once the above has been completed, you should be able to log in to your Device42 instance with your Azure AD credentials.
8891

89-
In Okta, click the "Admin" button:
92+
## Okta Configuration
93+
94+
In Okta, click the **Admin** button:
9095

9196
![Okta Admin Link](/assets/images/saml-001.png)
9297

93-
Click Applications button
98+
Click the **Applications** button.
9499

95100
![Okta Applications Link](/assets/images/saml-002.png)
96101

97-
In the Applications page find “Add application” button and click it.
102+
On the Applications page, find and click the **Add Application** button.
98103

99104
![Okta Admin Link](/assets/images/saml-003.png)
100105

101-
Choose Create new app”
106+
Choose **Create New App**.
102107

103108
![Okta Admin Link](/assets/images/saml-004.png)
104109

105-
Select platform as Web and sign on method as SAML 2.0.
110+
Select **Web** as the **Platform** and select **SAML 2.0** as the **Sign on method**.
106111

107112
![Okta Admin Link](/assets/images/saml-005.png)
108113

109-
Set application preferences and click next
114+
Set your application preferences and click **Next**.
110115

111116
![Okta Admin Link](/assets/images/saml-006.png)
112117

113-
On the next page setup ACS url and field mapping. The Single Sign On URL & Audience URI should be `https://yourdevice42address/saml2_auth/acs/`. The Attribute value should be the same AD or LDAP attribute that your users will log into Device42 with. Note the "Name" given to it as this will be needed in the Device42 Appliance Manager configurations.
118+
On the next page, set up the ACS URL and field mapping. Enter `https://yourdevice42address/saml2_auth/acs/` for both the **Single sign on URL** and the **Audience URI (SP Entity ID)** fields. In the **Attribute Statements** section, the **Value** should be the same AD or LDAP attribute that your users will use to log in to Device42. Note the attribute statement **Name**, as it is needed in the Device42 Appliance Manager configurations.
114119

115120
![Okta Admin Link](/assets/images/saml-007.png)
116121

117-
Click Next and finish setup. Open your application settings, go to the Sign On tab and copy url from “Identity provider metadata link. This will be used as the "Metadata URL" in Device42's Appliance Manager.
122+
Click **Next** and finish the setup. Open your application settings, go to the **Sign On** tab, and copy the URL of the **Identity Provider metadata** link. You will use this URL as the **Metadata auto conf url** in Device42's Appliance Manager.
118123

119124
![Okta Admin Link](/assets/images/saml-008.png)
120125

121-
### OneLogin Configuration
122-
123-
To configure SAML2 integration between OneLogin and Device42, you have to create a `SAML2 connector app` in OneLogin. Then, you will need to add users to the `SAML2 connector app` so they can login via a OneLogin account.
126+
## OneLogin Configuration
124127

125-
**Creating SAML2 Connector App**
128+
To configure SAML 2.0 integration between OneLogin and Device42, you have to create a `SAML2 connector app` in OneLogin. Then, you need to add users to the `SAML2 connector app` so they can log in via a OneLogin account.
126129

127-
1\. Create and login into your OneLogin account.
130+
### Creating the SAML2 Connector App
128131

129-
2\. Create an app connector in OneLogin.
132+
1. Create and log in to your OneLogin account.
130133

131-
- Go to Applications > Applications.
134+
2. Create an app connector in OneLogin:
132135

133-
![](/assets/images/D42-26961_saml_config_1.jpg)
136+
- Go to **Applications > Applications**.
134137

135-
- Click Add App.
138+
![](/assets/images/D42-26961_saml_config_1.jpg)
136139

137-
![](/assets/images/D42-26961_saml_config_2.jpg)
140+
- Click **Add App**.
138141

139-
3\. Search for `SAML custom connector` and select `SAML Custom Connector (Advanced)`
142+
![](/assets/images/D42-26961_saml_config_2.jpg)
140143

141-
![](/assets/images/D42-26961_saml_config_3.jpg)
144+
3. Search for **SAML custom connector** and select **SAML Custom Connector (Advanced)**.
142145

143-
4\. Type a display name and Save.
146+
![](/assets/images/D42-26961_saml_config_3.jpg)
144147

145-
5\. Go to the `Configuration` tab
148+
4. Type a display name and **Save**.
146149

147-
- Put the value `https://<<fqdn>>/saml2_auth/acs/` in `Audience (EntityID)``Recipient` and `ACS (Consumer)URL`
148-
- Put `.*` in `ACS(Consumer) URL Validator`
149-
- Save
150+
5. Go to the **Configuration** tab:
150151

151-
![](/assets/images/D42-26961_saml_config_4.jpg)
152+
- Put the value, `https://<<fqdn>>/saml2_auth/acs/`, in the **Audience (EntityID)****Recipient** and **ACS (Consumer) URL** fields.
153+
- Put `.*` in the **ACS(Consumer) URL Validator** field.
154+
- Save.
152155

153-
6\. Go to the `Parameters` tab and add a new field (by clicking on the `+` icon)
156+
![](/assets/images/D42-26961_saml_config_4.jpg)
154157

155-
![](/assets/images/D42-26961_saml_config_5.jpg)
158+
6. Go to the **Parameters** tab and add a new field by clicking on the **plus icon**.
156159

157-
- Type the `username` as `Field name`.
158-
- Check `Include in SAML assertion`.
160+
![](/assets/images/D42-26961_saml_config_5.jpg)
159161

160-
![](/assets/images/D42-26961_saml_config_6.jpg)
162+
- Type `username` as the **Field name**.
163+
- Select the **Include in SAML assertion** checkbox.
161164

162-
- Save
163-
- Choose the `Username` from the drop down as the value.
165+
![](/assets/images/D42-26961_saml_config_6.jpg)
164166

165-
![](/assets/images/D42-26961_saml_config_7.jpg)
167+
- Click **Save**.
168+
- Choose the **Username** from the dropdown as the **Value**.
166169

167-
- Save
170+
![](/assets/images/D42-26961_saml_config_7.jpg)
168171

169-
7\. In the `SSO` tab:
172+
- Click **Save**.
170173

171-
- Copy the “Issuer URL”. This will be entered in the “Metadata URL” field in Device42.
174+
7. In the **SSO** tab:
172175

173-
![](/assets/images/D42-26961_saml_config_8.jpg)
176+
- Copy the **Issuer URL**. You will enter this in the **Metadata auto conf url** field in Device42.
174177

175-
- After this, the SAML2 app is created and ready to be integrated with Device42.
178+
![](/assets/images/D42-26961_saml_config_8.jpg)
176179

177-
**In Device42 Appliance Manager Configuration**
180+
After this, the SAML2 app is created and ready to be integrated with Device42.
178181

179-
Login to Device42 Appliance Manager`https://yourdevice42address:4343`, and go to the SAML 2.0 settings on the left, then set the Metadata url you obtained above.
182+
### Configuring the Device42 Appliance Manager
180183

181-
![](/assets/images/D42-26961_saml_config_10.jpg)
184+
- Log in to the Device42 Appliance Manager, `https://yourdevice42address:4343`, go to **SAML/SSO settings** on the left, and set the **Metadata auto conf url** you obtained above.
182185

183-
After this has been saved, SAML integration should be complete.
186+
![](/assets/images/onelogin-enable-saml.png)
184187

185-
_Now that SAML integration is complete you need to add users to the_ `SAML Connector App` _so they can login into Device42 via OneLogin account._
188+
After this has been saved, the SAML integration should be complete. You now need to add users to the `SAML Connector App` so they can log in to Device42 via their OneLogin accounts.
186189

187-
**Create a User in OneLogin**
190+
### Creating a User in OneLogin
188191

189-
- Go to Users > Users.
190-
- Click New User.
192+
- Go to **Users > Users**.
193+
- Click **New User**.
191194

192-
![](/assets/images/D42-26961_onelogin_user_1.jpg)
195+
![](/assets/images/D42-26961_onelogin_user_1.jpg)
193196

194-
- Fill the form. **Username should match the username in device42 app**.
197+
- Fill in the form. **The username should match the username in the Device42 app**.
195198

196-
![](/assets/images/D42-26961_onelogin_user_2.jpg)
199+
![](/assets/images/D42-26961_onelogin_user_2.jpg)
197200

198-
- Save.
201+
- Click **Save**.
199202

200-
**Add User to Application**
203+
### Adding a User to the Application
201204

202-
1. Click on the user name.
205+
1. Click on the username.
203206

204-
2. Go to the `Applications` tab and add `Application` by clicking on the `+` icon.
207+
2. Go to the **Applications** tab and add an **Application** by clicking on the **plus icon**.
205208

209+
![](/assets/images/D42-26961_user_configuration_1.jpg)
206210

207-
![](/assets/images/D42-26961_user_configuration_1.jpg)
208-
209-
- Select the SAML Custom Application created above.
211+
- Select the SAML Custom Application created above.
210212

211-
![](/assets/images/D42-26961_user_configuration_2.jpg)
213+
![](/assets/images/D42-26961_user_configuration_2.jpg)
212214

213-
- Continue
214-
- Make sure `Allow the user to sign in` is checked
215+
- Click **Continue**.
216+
- Make sure the **Allow the user to sign in** checkbox is selected.
215217

216-
![](/assets/images/D42-26961_user_configuration_3.jpg)
218+
![](/assets/images/D42-26961_user_configuration_3.jpg)
217219

218-
- Save.
220+
- Click **Save**.
219221

220-
Now you can log into Device42 using the OneLogin account.
222+
Now you can log in to Device42 using the OneLogin account.
221223

222-
### Device42 Appliance Manager Configuration
224+
## Device42 Appliance Manager Configuration
223225

224-
Login to Device42 Appliance Manager, `https://yourdevice42address:4343`, and go to the SAML 2.0 settings on the left, then set the Metadata url you obtained above. Set the "username" field to match the value you saved in the SAML configuration.
226+
Log in to Device42 Appliance Manager, `https://yourdevice42address:4343`, go to the **SAML 2.0 Settings** on the left, and set the **Metadata auto conf url** you obtained above. Set the **Username field** to match the value you saved in the SAML configuration.
225227

226-
![](/assets/images/D42-26961_saml_config_10.jpg)
228+
![](/assets/images/onelogin-enable-saml.png)
227229

228230
After this has been saved, SAML integration should be complete!
352 KB
Loading
358 KB
Loading

0 commit comments

Comments
 (0)