SAML Authentication Quick Start Guide

Size: px
Start display at page:

Download "SAML Authentication Quick Start Guide"

Transcription

1 SAML Authentication Quick Start Guide Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY

2 Copyright 2013 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete and accurate. SafeNet, Inc. is not responsible for any direct or indirect damages or loss of business resulting from inaccuracies or omissions. The specifications contained in this document are subject to change without notice. SafeNet and SafeNet Authentication Service are either registered with the U.S. Patent and Trademark Office or are trademarks of SafeNet, Inc., and its subsidiaries and affiliates, in the United States and other countries. All other trademarks referenced in this Manual are trademarks of their respective owners. SafeNet Hardware and/or Software products described in this document may be protected by one or more U.S. Patents, foreign patents, or pending patent applications. Please contact SafeNet Support for details of FCC Compliance, CE Compliance, and UL Notification. Support SafeNet technical support specialists can provide assistance when planning and implementing SafeNet Authentication Service. In addition to aiding in the selection of the appropriate authentication products, SafeNet can suggest deployment procedures that will provide a smooth, simple transition from existing access control systems and a satisfying experience for network users. We can also help you leverage your existing network equipment and systems to maximize your return on investment. SafeNet works closely with channel partners to offer worldwide Technical Support services. If you purchased this product through a SafeNet channel partner, please contact your partner directly for support needs. To contact SafeNet Authentication Service support directly: Europe / EMEA Freephone: Telephone: (UK) +44 (0) (Int l) North America Toll Free: Telephone: sassupport@safenet-inc.com sassupport@safenet-inc.com Technical Support Customer Portal Existing customers with a Technical Support Customer Portal account can log in to manage incidents, get the latest software upgrades, and access the SafeNet Knowledge Base. 2

3 Publication History Date Description Revision Changes for Salesforce s new SAML configuration interface, and minor corrections Correction to Add Google Apps as a SAML Service Provider process Updates for SafeNet Branding Minor changes to Salesforce screenshots Add My Domain step to Salesforce configuration Initial Release 1.0 3

4 Contents Applicability... 5 Introduction... 6 Purpose of this Guide... 6 Audience... 6 Customer Feedback... 6 SafeNet Authentication Service and SAML... 7 Traditional RADIUS Scenario without SAML... 8 Introduction to SAML... 9 How SAML Works With SAS Web Application SSO Managing Cloud Identities Normalizing User Credentials using SafeNet Authentication Service Using SafeNet Authentication Service with Cloud SSO Service Providers Automatic Cloud App Authorization Configuring SAML Authentication in SAS Configuring SAML Service Providers in SAS Configuring SAML Services in SAS Configuring SAML Provisioning Rules in SAS Sample SAML Configurations Configuring SAML Authentication in Salesforce Part 1: Configuring Salesforce for Single Sign-On Part 2: Adding Salesforce as a SAML Service Provider Configuring SAML Authentication in Google Apps Part 1: Configuring Google Apps for Single Sign-On Part 2: Adding Google Apps as a SAML Service Provider Configuring SAML Authentication in Symplified Web SSO Part 1: Configuring Symplified for Single Sign-On Part 2: Adding Symplified as a SAML Service Provider

5 Applicability The information in this document applies to: SafeNet Authentication Service (SAS) A Cloud service of SafeNet, Inc. SafeNet Authentication Service Service Provider Edition (SAS-SPE) The software used to build an authentication service. SafeNet Authentication Service Private Cloud (SAS-PC) A term used to describe the implementation of SPE on-premise. Applicability 5

6 Introduction Purpose of this Guide This guide describes the application, configuration and use of SafeNet Authentication Service as a SAML Identity Provider (IdP) to relying SAML Service Providers (SP). It describes: How to configure a Virtual Server to be an IdP. How to use the SAML Provisioning Rules module introduced in SafeNet Authentication Service and LDAP to automate the configuration of individual user accounts to permit authentication for designated SPs such as Google Apps. How to customize logon and other pages presented to the user during SAML authentication. Examples of SAML configurations for: o Configuring SAML Authentication in Salesforce (see page 22) o Configuring SAML Authentication in Google Apps (see page 25) o Configuring SAML Authentication in Symplified Web SSO (see page 28) Readers are encouraged to read this guide in the order in which information is presented, as successive chapters often rely on information and concepts presented in prior chapters. Audience This guide is intended for SafeNet Authentication Service administrators responsible for how managed authentication services are delivered and responsible for configuring the Service to reflect the internal business processes, service level agreements and management hierarchy. Customer Feedback Help us to improve this documentation, our products and our services by communicating any ideas and suggestions that you feel would improve the usefulness and clarity of the documentation, product feature set or application in practice. Suggestions should be sent to: sasfeedback@safenet-inc.com or faxed to Customer Feedback at Introduction 6

7 SafeNet Authentication Service and SAML Figure 1: SafeNet Authentication Service s Various Authentication Options SafeNet Authentication Service now offers SAML authentication to its Cloud Subscribers. This means that enterprises can: Extend strong authentication beyond the enterprise perimeter to include Cloud Apps such as Salesforce, Google Apps, etc. Use SafeNet Authentication Service to protect internal applications, such as SAP, that support SAML authentication. Use SafeNet Authentication Service with perimeter devices, such as SSL VPNs, that support SAML authentication. Enable authorized users to authenticate to Cloud apps in a simple, familiar and consistent manner using the same token/authentication method they use for VPN and other traditional access. Automate Cloud app authorization. Use SafeNet Authentication Service reporting to audit all user authentication activity, including authentication into Cloud apps. SafeNet Authentication Service and SAML 7

8 Traditional RADIUS Scenario without SAML In a traditional RADIUS scenario, a user is prompted to provide authentication credentials (UserID and password) to an access point, such as a VPN. The VPN uses the RADIUS protocol to pass the credentials to the authentication service for validation. The authentication service in turn sends an accept or reject message via RADIUS back to the VPN. Figure 2: RADIUS Authentication User Experience The standardized RADIUS allows an organization to choose any vendor s RADIUS client, such as VPN, and be assured that it could use any other vendor s RADIUS Server, such as SafeNet Authentication Service. However, RADIUS has rarely been adopted outside of network perimeter devices. Much like the days before the adoption of RADIUS, applications have each tended to have their own authentication mechanism. As a result, users tended to have many passwords and had to log in to individual applications. With the growth in web apps and in Cloud computing, this quickly became unmanageable for users and administrators alike. A new authentication standard was required that could be adopted by application developers with ease and without requiring specific knowledge of how or what the authentication method will be. And equally important, the standard had to provide a way to federate identity so that users were not required to have many passwords or separate logons to individual applications. SAML, and in particular SAML 2.0, became the standard that made this possible. Traditional RADIUS Scenario without SAML 8

9 Introduction to SAML SAML (Security Assertion Markup Language) is an XML (Extensible Markup Language) standard for exchanging authentication and authorization data between two security domains: A. an identity provider (IdP) such as SafeNet Authentication Service B. a service provider (SP), typically a web application such as Google Apps SAML allows a user to log on once for affiliated but separate web sites or web applications. SAML has three components: 1 Assertions are of three different statement types: authentication, attribute, and authorization decision. Authentication assertion validates the user's identity. Attribute assertion contains specific information about the user. Authorization decision assertion identifies what the user is authorized to do. 2 Protocol defines how SAML asks for and receives assertions. 3 Binding defines how SAML message exchanges are mapped to Simple Object Access Protocol (SOAP) exchanges. SAML works with multiple protocols including Hypertext Transfer Protocol (HTTP), Simple Mail Transfer Protocol (SMTP), File Transfer Protocol (FTP), and also supports SOAP, BizTalk, and Electronic Business XML (ebxml). While generally considered an authentication protocol for web apps and in particular for Cloud computing, SAML is in fact supported by a range of applications and devices including SAP and perimeter devices such as SSL VPNs. Introduction to SAML 9

10 How SAML Works With SAS The SAML Service Provider, such as Google Apps, Salesforce, or SSL VPN, relies on SafeNet Authentication Service as the SAML identity provider (IdP) to present the logon page and to authenticate users. The SAML assertion generated by the IdP in response to a successful authentication is used by the Service Provider to grant the user access to the application. When a user attempts to log on to an application that supports SAML, they are redirected to SafeNet Authentication Service where they must authenticate. If the authentication is successful, the user is redirected to their Cloud app where access is granted. Figure 3: SAML Authentication General User Experience - illustrates SAML s net effect on the user logon experience Web Application SSO When separate web sites or applications are affiliated, the successful SAML authentication results in user access to the affiliate without requiring an additional user logon. This is essentially web SSO. Figure 3: SAML Authentication General User Experience illustrates a possible affiliation between Google Apps and Salesforce which would permit a user authenticated to one of these services to be able to use the other service without additional authentication. How SAML Works With SAS 10

11 Managing Cloud Identities It is not uncommon for individual Cloud applications to impose specific requirements for UserID. For example, a user may require a gmail account (e.g. bill@gmail.com) to log on to Google Apps, whereas Salesforce may require a domain specific address (e.g. bill@acmecompany.com). If there is no affiliation between the web apps, the user would be required to log on separately to each application using different credentials. These may be in addition to the UserID required for logon through the corporate VPN (e.g. blaham). This can become confusing and unmanageable for users and administrators. Fortunately there are a couple of solutions: 1. Normalizing User Credentials using SafeNet Authentication Service 2. Using SafeNet Authentication Service with Cloud SSO Service Providers Normalizing User Credentials using SafeNet Authentication Service Use SAS to normalize the user s logon credentials across corporate and Cloud applications and services. One of the capabilities of SafeNet Authentication Service is to authenticate a user with a single credential set the UserID and One-Time Password, but provide a different, specific credential required by the Cloud app service. On successful authentication, SAS replaces the UserID provided during authentication with the UserID required by the Cloud application in the SAML assertion. This is illustrated in Figure 4: Normalizing User Credentials using SafeNet Authentication Service. For the user, this delivers a consistent logon methodology (such as UserID: Bill, Password: OTP), and insulates the user from any other credential management requirements. Figure 4: Normalizing User Credentials using SafeNet Authentication Service How SAML Works With SAS 11

12 Using SafeNet Authentication Service with Cloud SSO Service Providers Cloud SSO Service Providers, such as Symplified ( provide a front end for managing multiple Cloud Service Providers and applications. Typically, these front ends support SAML authentication and can therefore use SafeNet Authentication Service as the IdP. The Cloud SSO can be configured as a SAML SP, relying on SafeNet Authentication Service to authenticate the user. Once authenticated, the user has access to Cloud applications and services configured for their personal Cloud SSO account. Figure 5: SafeNet Authentication Service and Cloud SSO Automatic Cloud App Authorization One of the challenges facing administrators of large user populations is efficient and timely activation of SAML authentication. As the number of users and Cloud apps grow, so does the challenge of timely activation and deactivation. To solve this problem, SafeNet Authentication Service offers SAML Provisioning Rules. Generally, these rules are triggered on the addition or removal of a user from an LDAP security group and/or SafeNet Authentication Service internal group. These rules allow or deny authentication for users authenticating to the specified SAML Service Providers. How SAML Works With SAS 12

13 Configuring SAML Authentication in SAS Configuring SAS for SAML authentication requires the following steps: Configuring SAML Service Providers in SAS Configure the virtual server to process authentication requests received from specific SAML Service Providers. Click Apply to save the new Service Provider. Configuring SAML Services in SAS Manually enable SAML authentication for your users to one or more of the SAML Service Providers that were configured on the virtual server. Click Add to save the new SAML service. Configuring SAML Provisioning Rules in SAS Automatically enable SAML authentication for users in specific containers or groups to one or more of the SAML Service Providers configured on the virtual server. SAML Provisioning Rules can be used instead of, or in addition to, configured SAML services. Configuring SAML Service Providers in SAS From the COMMS tab of your virtual server, select SAML Service Providers. Select SAML 2.0 Settings, and click Add to add a new Service Provider. Configuring SAML Authentication in SAS 13

14 Note: After a Service Provider has been configured in SAS, information is displayed in the SAML 2.0 Settings area fields. You will need these values when you configure the Service Provider to use SAS as a SAML identity provider. In the Add SAML 2.0 Settings area: Entity ID This is the Entity ID of the SAML Service Provider, typically (but not always) in the form of a URL. This value will be provided by the Service Provider, or it can be extracted from the metadata (XML file) provided by the Service Provider. For example: <?xml version="1.0" encoding="utf-8"?> <md:entitydescriptor xmlns:md="urn:oasis:names:tc:saml:2.0:metadata" entityid= Friendly Name This is a name you assign to the SAML Service Provider for easy identification. This name will appear in the SAML Services list displayed in Assignment SAML Services and Policies Automation Policies SAML Provisioning Rules. SAML 2.0 Metadata o Upload Existing Metadata File Use this to upload an XML file that has been generated by your SAML Service Provider. Configuring SAML Authentication in SAS 14

15 o Create New Metadata File Some SAML Service Providers do not provide a metadata file but instead provide only their Entity ID and Location (essentially the resource being accessed). This option instructs the virtual server to create and add a metadata file based on this information. The remaining options are used to customize the appearance of the logon page presented to the user. Custom Logo This is a customized logo that will appear on the logon form presented to your users during authentication. Custom CSS This is a customized CSS (Cascading Style Sheet) for the logon form presented to your users during authentication. If no file is chosen, the following default CSS is used:.tablebanner width: 600px; border-width: 0px; border-spacing: 0px; background-color: white;.tablemain width: 600px; border-width: 1px; border-spacing: 0px; border-style: solid; border-color: #4682B4; Configuring SAML Authentication in SAS 15

16 border-collapse: separate; background-color: white; padding: 0px;.tdTopSpaceAboveBanner height: 50px; text-align: center;.tdbanner height: 100px; text-align: center;.tdspacebelowbanner height: 50px; text-align: center;.tdloginheader height: 50px; text-align: center; font-size: 28px; color: white; background-color: #4682B4; padding-left: 0px; padding-right: 0px;.tdLoginMessage height: 50px; text-align: center; font-size:20px; color: #4682B4;.tdUserNameLabel text-align: right; font-size: 15px; color: #4682B4; padding-left: 70px; Configuring SAML Authentication in SAS 16

17 .textusername width: 225px; height: 20px; text-align: left; border-color: #4682B4; border-width: 1px;.tdPasswordLabel text-align: right; font-size: 15px; color: #4682B4; padding-left: 70px;.textPassword width: 225px; height: 20px; text-align: left; border-color: #4682B4; border-width: 1px;.tdUserName padding-left: 60px;.tdPassword padding-left: 60px;.td20PxSpace height: 20px;.td40PxSpace height: 40px;.tdUserErrorMessage height: 40px; color: red; text-align: center; font-size: 14px;.tdSubmit Configuring SAML Authentication in SAS 17

18 text-align: center; height: 30px;.buttonSubmit background-color: white; background-repeat:no-repeat; border-width: 0px; width: 120px; height: 28px; text-align: center; font-size: 14px; color: white;.tdspacebelowloginwindow height: 80px;.relayingParty text-align: center; font-size: 10px; color:darkblue; height: 20px;.sessionTimeout text-align: center; font-size: 12px; color:blue;.sessionwarning text-align: center; font-size: 14px; color:crimson;.copyright text-align: center; font-size: 8px; color: darkblue; height: 20px;.td404Error height: 40px; color: red; text-align: left; font-size: 28px;.tdError height: 40px; color: red; text-align: left; font-size: 28px;.tdWarning Configuring SAML Authentication in SAS 18

19 height: 40px; color: brown; text-align: left; font-size: 28px;.tdInformation height: 40px; color: darkblue; text-align: left; font-size: 28px;.tdSignoutMessage height: 40px; color: red; text-align: left; font-size: 18px;.tdErrorMessage height: 40px; color: red; text-align: left; font-size: 14px; Custom Button Image This defines the image to be used for the logon button. Custom Page Title This is the page title to be displayed on the browser tab. Custom Icon This is the icon to be displayed on the browser tab. Custom Login Header Text This is the text to be displayed in the header of the logon form. Custom Login Button Text This is the text to be displayed on the logon button. Login Message This is the text, usually containing instructions, to be displayed between the Logon Header Text and the Username field. Custom Username Field This is the text to be displayed for the user name field. Custom Password Text This is the text to be displayed for the password field. Click Apply to save the new Service Provider. Configuring SAML Authentication in SAS 19

20 Configuring SAML Services in SAS Manually enable a user to authenticate against one or more configured SAML Service Providers. From the Assignment tab of your virtual server, select SAML Services, and click Add to add a new SAML service. Service This lists all of the SAML Service Providers that were already configured in SAS. SAML Login ID This is the UserID that will be returned to the Service Provider in the SAML assertion on successful authentication. For example, if your Service Provider requires a UserID of name@domain.com, which is identical to the user s address, choose the option. Doing so allows the user to consistently use their UserID to authenticate regardless of the Service Providers requirements. In most cases, a Service Provider will require either the UserID or the . For all other cases, choose the Custom option and enter the field containing the UserID to be returned. Note: You can automate the creation and removal of SAML Services for users by creating a SAML provisioning rule. See Click Add to save the new SAML service. Configuring SAML Provisioning Rules in SAS. Click Add to save the new SAML service. Configuring SAML Provisioning Rules in SAS You can automate the granting and revocation of permissions for user authentication to SAML Service Providers. From the Policies tab of your virtual server, select Automation Policies SAML Provisioning Rules. Click New Rule to add a new rule. Configuring SAML Authentication in SAS 20

21 Rule Name This is a friendly name that describes the rule. User is in container Only users in the selected container are affected by this rule. Groups Filter: Search for Virtual Server groups Optionally enter text in the Groups Filter box to narrow the search. Groups: Virtual Server groups Users in these groups are not affected by this rule. Groups: Used by rule Only users in one or more of these groups are affected by this rule. Parties: Relying Parties Lists the Service Providers that are not affected by this rule. Parties: Rule Parties Lists the Service Providers which this rule enables the users to authenticate to. SAML Login ID This is the UserID that will be returned to the Service Provider in the SAML assertion. Click Add to save the new rule. Configuring SAML Authentication in SAS 21

22 Sample SAML Configurations The following examples illustrate how to configure various SAML Service Providers to use SafeNet Authentication Service as a SAML IdP. Note: The data used in these examples is for illustration purposes only! Be sure to use the actual data displayed in your SafeNet Authentication Service and SAML Service Provider. Configuring SAML Authentication in Salesforce To use SAML with Salesforce you must configure My Domain in Salesforce. Refer to Salesforce Administration Setup Company Profile My Domain. Part 1: Configuring Salesforce for Single Sign-On We recommend opening the virtual server to COMMS SAML Service Providers SAML 2.0 Settings. Some of the values displayed in that window are needed during this configuration. Figure 6: SAML configuration information displayed in SafeNet Authentication Service 1 Log in to Salesforce Administration Setup Security Controls Single Sign-On Settings. Sample SAML Configurations 22

23 2 Enable SAML. Figure 7: SAML configuration information displayed in Salesforce 3 Entity Id This is a unique ID created by Salesforce for your organization. This information, usually in the form of a URL, must be entered into the virtual server s COMMS SAML Service Providers SAML 2.0 Settings Entity ID field in SafeNet Authentication Service. See Part 2: Adding Salesforce as a SAML Service Provider, step 8. 4 Identity Provider Certificate Obtain this certificate from the link displayed in the virtual server s COMMS SAML Service Providers SAML 2.0 Settings Download URL for Identity Provider Certificate. 5 Identity Provider Login URL Use the value displayed in the virtual server s COMMS SAML Service Providers SAML 2.0 Settings Identity Provider AuthRequest login URL. 6 Identity Provider Logout URL Use the value displayed in the virtual server s COMMS SAML Service Providers SAML 2.0 Settings Identity Provider logout URL. 7 Select Download Metadata Download the metadata file from Salesforce and save to a convenient location. You will need to upload this file to SafeNet Authentication Service. See Part 2: Adding Salesforce as a SAML Service Provider, step 10. Sample SAML Configurations 23

24 Part 2: Adding Salesforce as a SAML Service Provider From the COMMS tab of your virtual server, select SAML Service Providers, and click Add to configure a new SAML Service Provider. Figure 8: Configuring Salesforce as a SAML Service Provider 8 Entity ID Copy the Entity Id value displayed in Salesforce. See Part 1: Configuring Salesforce for Single Sign- On, step 3. 9 Friendly Name This is a name you assign to the SAML Service Provider for easy identification. This name will appear in the SAML Services list displayed in Assignment SAML Services and Policies Automation Policies SAML Provisioning Rules. 10 SAML 2.0 Metadata Select Upload Existing Metadata File, and upload the Salesforce metadata file to SafeNet Authentication Service. See Part 1: Configuring Salesforce for Single Sign-On, step Customize Customize the logon page presented to users during logon to Salesforce. Sample SAML Configurations 24

25 Configuring SAML Authentication in Google Apps Part 1: Configuring Google Apps for Single Sign-On We recommend opening the virtual server to COMMS SAML Service Providers SAML 2.0 Settings. Some of the values displayed in that window are needed during this configuration. Figure 9: SAML configuration information displayed in SafeNet Authentication Service Log in to Google Apps Advanced tools Authentication Set up single sign-on (SSO). Figure 10: SAML configuration information displayed in Google Apps 1 Enable Single Sign-on. Sample SAML Configurations 25

26 2 Sign-in page URL Use the value displayed in the virtual server s COMMS SAML Service Providers SAML 2.0 Settings Identity Provider HTTP-Redirect login URL. 3 Sign-out page URL Use the value displayed in the virtual server s COMMS SAML Service Providers SAML 2.0 Settings Identity Provider logout URL. 4 Change password URL Use the value displayed in the virtual server s COMMS SAML Service Providers SAML 2.0 Settings Identity Provider HTTP-POST login URL. 5 Verification certificate Upload the certificate from the link displayed in the virtual server s COMMS SAML Service Providers SAML 2.0 Settings Download URL for Identity Provider Certificate. 6 Use a domain specific issuer Ensure that this value is checked. A value is generated by Google Apps, typically google.com/a/<mycompany> where <mycompany> is your domain registered in Google Apps. This information must be entered into the virtual server s COMMS SAML Service Providers SAML 2.0 Settings Entity ID field in SafeNet Authentication Service. See Part 2: Adding Google Apps as a SAML Service Provider, step 7. Part 2: Adding Google Apps as a SAML Service Provider From the COMMS tab of your virtual server, select SAML Service Providers, and click Add to configure a new SAML Service Provider. Figure 11: Configuring Google Apps as a SAML Service Provider Sample SAML Configurations 26

27 7 Entity ID Copy the issuer value displayed in Google Apps, typically google.com/a/<mycompany> where <mycompany> is your domain registered in Google Apps. See Part 1: Configuring Google Apps for Single Sign-On, step 6. 8 Friendly Name This is a name you assign to the SAML Service Provider for easy identification. This name will appear in the SAML Services list displayed in Assignment SAML Services and Policies Automation Policies SAML Provisioning Rules. 9 SAML 2.0 Metadata Google Apps does not generate metadata. Select Create New Metadata File, and enter the following information: Entity ID Copy the issuer value displayed in Google Apps, typically google.com/a/<mycompany> where <mycompany> is your domain registered in Google Apps. See Part 1: Configuring Google Apps for Single Sign-On, step 6. Location This is the SAML assertion consumer URL. Copy the Entity ID, preceded by and followed by: /acs. For example, where <mycompany> is your domain registered in Google Apps. 10 Customize Customize the logon page presented to users during logon to Google Apps. Sample SAML Configurations 27

28 Configuring SAML Authentication in Symplified Web SSO Part 1: Configuring Symplified for Single Sign-On We recommend opening the virtual server to COMMS SAML Service Providers SAML 2.0 Settings. Some of the values displayed in that window are needed during this configuration. Figure 12: SAML configuration information displayed in SafeNet Authentication Service Log in to Symplified Identity Providers New Identity Provider SAML2Generic IdP Handler. 1 Click the New Identity Provider icon. Figure 13: SAML configuration information displayed in Symplified Sample SAML Configurations 28

29 2 Name Enter a friendly name for SAS as the Identity Provider: SafeNet Authentication Service. 3 SP Entity ID A unique value is generated Symplified. This information must be entered into the virtual server s COMMS SAML Service Providers SAML 2.0 Settings Entity ID field in SafeNet Authentication Service. See Part 2: Adding Symplified as a SAML Service Provider, step 8. 4 SP ACS URL A unique location value is generated Symplified. This information must be entered into the virtual server s COMMS SAML Service Providers SAML 2.0 Settings Entity ID field in SafeNet Authentication Service. See Part 2: Adding Symplified as a SAML Service Provider, step IdP Entity ID Use the URL value displayed in the virtual server s COMMS SAML Service Providers SAML 2.0 Settings Entity ID. 6 IdP URL Use the value displayed in the virtual server s COMMS SAML Service Providers SAML 2.0 Settings Identity Provider HTTP-POST login URL. 7 Public Key Upload the certificate from the link displayed in the virtual server s COMMS SAML Service Providers SAML 2.0 Settings Download URL for Identity Provider Certificate. Part 2: Adding Symplified as a SAML Service Provider From the COMMS tab of your virtual server, select SAML Service Providers, and click Add to configure a new SAML Service Provider. Figure 14: Configuring Symplified as a SAML Service Provider Sample SAML Configurations 29

30 8 Entity ID Copy the SP Entity ID displayed in Symplified. See Part 1: Configuring Symplified for Single Sign-On, step 3. 9 Friendly Name This is a name you assign to the SAML Service Provider for easy identification. This name will appear in the SAML Services list displayed in Assignment SAML Services and Policies Automation Policies SAML Provisioning Rules. 10 SAML 2.0 Metadata Google Apps does not generate metadata. Select Create New Metadata File, and enter the following information: Entity ID Copy the SP Entity ID displayed in Symplified. See Part 1: Configuring Symplified for Single Sign- On, step 3. Location Copy the SP ACS URL displayed in Symplified. See Part 1: Configuring Symplified for Single Sign- On, step Customize Customize the logon page presented to users during logon to Symplified. Sample SAML Configurations 30

SAML Authentication with BlackShield Cloud

SAML Authentication with BlackShield Cloud SAML Authentication with BlackShield Cloud Powerful Authentication Management for Service Providers and Enterprises Version 3.1 Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCARD

More information

Juniper SSL VPN Authentication QUICKStart Guide

Juniper SSL VPN Authentication QUICKStart Guide Juniper SSL VPN Authentication QUICKStart Guide Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright 2012 SafeNet, Inc. All rights

More information

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Salesforce

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Salesforce SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information

More information

Cisco ASA Authentication QUICKStart Guide

Cisco ASA Authentication QUICKStart Guide Cisco ASA Authentication QUICKStart Guide Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright 2012 SafeNet, Inc. All rights reserved.

More information

Remote Logging Agent Configuration Guide

Remote Logging Agent Configuration Guide Remote Logging Agent Configuration Guide Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Synchronization Agent Configuration Guide Copyright

More information

Protecting Juniper SA using Certificate-Based Authentication. Quick Start Guide

Protecting Juniper SA using Certificate-Based Authentication. Quick Start Guide Protecting Juniper SA using Certificate-Based Authentication Copyright 2013 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete and accurate.

More information

Cloud Authentication. Getting Started Guide. Version 2.1.0.06

Cloud Authentication. Getting Started Guide. Version 2.1.0.06 Cloud Authentication Getting Started Guide Version 2.1.0.06 ii Copyright 2011 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete and accurate.

More information

LDAP Synchronization Agent Configuration Guide

LDAP Synchronization Agent Configuration Guide LDAP Synchronization Agent Configuration Guide Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright 2013 SafeNet, Inc. All rights

More information

Microsoft Office 365 Using SAML Integration Guide

Microsoft Office 365 Using SAML Integration Guide Microsoft Office 365 Using SAML Integration Guide Revision A Copyright 2013 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete and accurate.

More information

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Tableau Server

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Tableau Server SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information

More information

SAM Context-Based Authentication Using Juniper SA Integration Guide

SAM Context-Based Authentication Using Juniper SA Integration Guide SAM Context-Based Authentication Using Juniper SA Integration Guide Revision A Copyright 2012 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete

More information

Welcome Guide for MP-1 Token for Microsoft Windows

Welcome Guide for MP-1 Token for Microsoft Windows Welcome Guide for MP-1 Token for Microsoft Windows Protecting Your On-line Identity Authentication Service Delivery Made EASY Copyright 2012 SafeNet, Inc. All rights reserved. All attempts have been made

More information

Configuring Single Sign-on from the VMware Identity Manager Service to WebEx

Configuring Single Sign-on from the VMware Identity Manager Service to WebEx Configuring Single Sign-on from the VMware Identity Manager Service to WebEx VMware Identity Manager SEPTEMBER 2015 V 2 Configuring Single Sign-On from VMware Identity Manager to WebEx Table of Contents

More information

HOTPin Integration Guide: Salesforce SSO with Active Directory Federated Services

HOTPin Integration Guide: Salesforce SSO with Active Directory Federated Services 1 HOTPin Integration Guide: Salesforce SSO with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided

More information

Configuring Single Sign-on from the VMware Identity Manager Service to ServiceNow

Configuring Single Sign-on from the VMware Identity Manager Service to ServiceNow Configuring Single Sign-on from the VMware Identity Manager Service to ServiceNow VMware Identity Manager AUGUST 2015 V1 Configuring Single Sign-On from VMware Identity Manager to ServiceNow Table of Contents

More information

This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:

This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: CHAPTER 1 SAML Single Sign-On This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: Junos Pulse Secure Access

More information

SafeNet Authentication Manager 8.2 and Windows Azure. Quick Start Guide

SafeNet Authentication Manager 8.2 and Windows Azure. Quick Start Guide SafeNet Authentication Manager 8.2 and Windows Azure Copyright 2013 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete and accurate. SafeNet,

More information

SAP Cloud Identity Service Document Version: 1.0 2014-09-01. SAP Cloud Identity Service

SAP Cloud Identity Service Document Version: 1.0 2014-09-01. SAP Cloud Identity Service Document Version: 1.0 2014-09-01 Content 1....4 1.1 Release s....4 1.2 Product Overview....8 Product Details.... 9 Supported Browser Versions....10 Supported Languages....12 1.3 Getting Started....13 1.4

More information

DIGIPASS as a Service. Google Apps Integration

DIGIPASS as a Service. Google Apps Integration DIGIPASS as a Service Google Apps Integration April 2011 Table of Contents 1. Introduction 1.1. Audience and Purpose of this Document 1.2. Available Guides 1.3. What is DIGIPASS as a Service? 1.4. About

More information

HOTPin Integration Guide: Google Apps with Active Directory Federated Services

HOTPin Integration Guide: Google Apps with Active Directory Federated Services HOTPin Integration Guide: Google Apps with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as

More information

Security Assertion Markup Language (SAML) Site Manager Setup

Security Assertion Markup Language (SAML) Site Manager Setup Security Assertion Markup Language (SAML) Site Manager Setup Trademark Notice Blackboard, the Blackboard logos, and the unique trade dress of Blackboard are the trademarks, service marks, trade dress and

More information

Google Apps Deployment Guide

Google Apps Deployment Guide CENTRIFY DEPLOYMENT GUIDE Google Apps Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component of your corporate

More information

Flexible Identity Federation

Flexible Identity Federation Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server

INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server INTEGRATION GUIDE DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is

More information

Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x

Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x Sverview Trust between SharePoint 2010 and ADFS 2.0 Use article Federated Collaboration with Shibboleth 2.0 and SharePoint 2010 Technologies

More information

Connected Data. Connected Data requirements for SSO

Connected Data. Connected Data requirements for SSO Chapter 40 Configuring Connected Data The following is an overview of the steps required to configure the Connected Data Web application for single sign-on (SSO) via SAML. Connected Data offers both IdP-initiated

More information

Microsoft IAS and NPS Agent Configuration Guide

Microsoft IAS and NPS Agent Configuration Guide Microsoft IAS and NPS Agent Configuration Guide Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Agent IAS and NPS (Microsoft) Configuration

More information

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Drupal

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Drupal SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information

More information

PARTNER INTEGRATION GUIDE. Edition 1.0

PARTNER INTEGRATION GUIDE. Edition 1.0 PARTNER INTEGRATION GUIDE Edition 1.0 Last Revised December 11, 2014 Overview This document provides standards and guidance for USAA partners when considering integration with USAA. It is an overview of

More information

Single Sign On (SSO) Implementation Manual. For Connect 5 & MyConnect Sites

Single Sign On (SSO) Implementation Manual. For Connect 5 & MyConnect Sites Single Sign On (SSO) Implementation Manual For Connect 5 & MyConnect Sites Version 6 Release 5.7 September 2013 1 What is Blackboard Connect Single Sign On?... 3 How it Works... 3 Drawbacks to Using Single

More information

Installation Guide. SafeNet Authentication Service

Installation Guide. SafeNet Authentication Service SafeNet Authentication Service Installation Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information

More information

Configuring Single Sign-on from the VMware Identity Manager Service to AirWatch Applications

Configuring Single Sign-on from the VMware Identity Manager Service to AirWatch Applications Configuring Single Sign-on from the VMware Identity Manager Service to AirWatch Applications VMware Identity Manager AUGUST 2015 V1 Configuring Single Sign-On from VMware Identity Manager to AirWatch Applications

More information

INTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN

INTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN INTEGRATION GUIDE IDENTIKEY Federation Server for Juniper SSL-VPN Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO

More information

PingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1

PingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1 PingFederate Salesforce Connector Version 4.1 Quick Connection Guide 2011 Ping Identity Corporation. All rights reserved. PingFederate Salesforce Quick Connection Guide Version 4.1 June, 2011 Ping Identity

More information

DocuSign Single Sign On Implementation Guide Published: March 17, 2016

DocuSign Single Sign On Implementation Guide Published: March 17, 2016 DocuSign Single Sign On Implementation Guide Published: March 17, 2016 Copyright Copyright 2003-2016 DocuSign, Inc. All rights reserved. For information about DocuSign trademarks, copyrights and patents

More information

Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.

Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved. Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,

More information

Configuring Single Sign-on from the VMware Identity Manager Service to Dropbox

Configuring Single Sign-on from the VMware Identity Manager Service to Dropbox Configuring Single Sign-on from the VMware Identity Manager Service to Dropbox VMware Identity Manager SEPTEMBER 2015 V1 Configuring Single Sign-On from VMware Identity Manager to Dropbox Table of Contents

More information

DualShield SAML & SSO. Integration Guide. Copyright 2011 Deepnet Security Limited. Copyright 2011, Deepnet Security. All Rights Reserved.

DualShield SAML & SSO. Integration Guide. Copyright 2011 Deepnet Security Limited. Copyright 2011, Deepnet Security. All Rights Reserved. DualShield Integration Guide Copyright 2011 Deepnet Security Limited Copyright 2011, Deepnet Security. All Rights Reserved. Page 1 Trademarks Deepnet Unified Authentication, MobileID, QuickID, PocketID,

More information

IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS

IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS APPLICATION NOTE IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS SAML 2.0 combines encryption and digital signature verification across resources for a more

More information

SAML 2.0 SSO Deployment with Okta

SAML 2.0 SSO Deployment with Okta SAML 2.0 SSO Deployment with Okta Simplify Network Authentication by Using Thunder ADC as an Authentication Proxy DEPLOYMENT GUIDE Table of Contents Overview...3 The A10 Networks SAML 2.0 SSO Deployment

More information

Configuring Single Sign-On from the VMware Identity Manager Service to Office 365

Configuring Single Sign-On from the VMware Identity Manager Service to Office 365 Configuring Single Sign-On from the VMware Identity Manager Service to Office 365 VMware Identity Manager JULY 2015 V1 Table of Contents Overview... 2 Passive and Active Authentication Profiles... 2 Adding

More information

How To Use Salesforce Identity Features

How To Use Salesforce Identity Features Identity Implementation Guide Version 35.0, Winter 16 @salesforcedocs Last updated: October 27, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of

More information

PingFederate. Identity Menu Builder. User Guide. Version 1.0

PingFederate. Identity Menu Builder. User Guide. Version 1.0 Identity Menu Builder Version 1.0 User Guide 2011 Ping Identity Corporation. All rights reserved. Identity Menu Builder User Guide Version 1.0 April, 2011 Ping Identity Corporation 1099 18th Street, Suite

More information

SalesForce SSO with Active Directory Federated Services (ADFS) v2.0 Authenticating Users Using SecurAccess Server by SecurEnvoy

SalesForce SSO with Active Directory Federated Services (ADFS) v2.0 Authenticating Users Using SecurAccess Server by SecurEnvoy SalesForce SSO with Active Directory Federated Services (ADFS) v2.0 Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 Merlin House

More information

Single Sign On for ShareFile with NetScaler. Deployment Guide

Single Sign On for ShareFile with NetScaler. Deployment Guide Single Sign On for ShareFile with NetScaler Deployment Guide This deployment guide focuses on defining the process for enabling Single Sign On into Citrix ShareFile with Citrix NetScaler. Table of Contents

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server INTEGRATION GUIDE DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document

More information

Cloud Single Sign-On and On-Premise Identity Federation with SAP NetWeaver Cloud White Paper

Cloud Single Sign-On and On-Premise Identity Federation with SAP NetWeaver Cloud White Paper Cloud Single Sign-On and On-Premise Identity Federation with SAP NetWeaver Cloud White Paper TABLE OF CONTENTS INTRODUCTION... 3 Where we came from... 3 The User s Dilemma with the Cloud... 4 The Administrator

More information

HOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services

HOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services HOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided

More information

For details about using automatic user provisioning with Salesforce, see Configuring user provisioning for Salesforce.

For details about using automatic user provisioning with Salesforce, see Configuring user provisioning for Salesforce. Chapter 41 Configuring Salesforce The following is an overview of how to configure the Salesforce.com application for singlesign on: 1 Prepare Salesforce for single sign-on: This involves the following:

More information

Egnyte Single Sign-On (SSO) Installation for OneLogin

Egnyte Single Sign-On (SSO) Installation for OneLogin Egnyte Single Sign-On (SSO) Installation for OneLogin To set up Egnyte so employees can log in using SSO, follow the steps below to configure OneLogin and Egnyte to work with each other. 1. Set up OneLogin

More information

SAP NetWeaver AS Java

SAP NetWeaver AS Java Chapter 75 Configuring SAP NetWeaver AS Java SAP NetWeaver Application Server ("AS") Java (Stack) is one of the two installation options of SAP NetWeaver AS. The other option is the ABAP Stack, which is

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep

More information

Configuring Salesforce

Configuring Salesforce Chapter 94 Configuring Salesforce The following is an overview of how to configure the Salesforce.com application for singlesign on: 1 Prepare Salesforce for single sign-on: This involves the following:

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager SAML2 Cloud Connector Guide McAfee Cloud Identity Manager version 1.2 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Siebel CRM On Demand Single Sign-On. An Oracle White Paper December 2006

Siebel CRM On Demand Single Sign-On. An Oracle White Paper December 2006 Siebel CRM On Demand Single Sign-On An Oracle White Paper December 2006 Siebel CRM On Demand Single Sign-On Introduction... 3 Single Sign-On with Siebel CRM On Demand... 4 Customer Requirements... 4 SSO

More information

TIB 2.0 Administration Functions Overview

TIB 2.0 Administration Functions Overview TIB 2.0 Administration Functions Overview Table of Contents 1. INTRODUCTION 4 1.1. Purpose/Background 4 1.2. Definitions, Acronyms and Abbreviations 4 2. OVERVIEW 5 2.1. Overall Process Map 5 3. ADMINISTRATOR

More information

Zendesk SSO with Cloud Secure using MobileIron MDM Server and Okta

Zendesk SSO with Cloud Secure using MobileIron MDM Server and Okta Zendesk SSO with Cloud Secure using MobileIron MDM Server and Okta Configuration Guide Product Release Document Revisions Published Date 1.0 1.0 May 2016 Pulse Secure, LLC 2700 Zanker Road, Suite 200 San

More information

Only LDAP-synchronized users can access SAML SSO-enabled web applications. Local end users and applications users cannot access them.

Only LDAP-synchronized users can access SAML SSO-enabled web applications. Local end users and applications users cannot access them. This chapter provides information about the Security Assertion Markup Language (SAML) Single Sign-On feature, which allows administrative users to access certain Cisco Unified Communications Manager and

More information

Single Sign-On Implementation Guide

Single Sign-On Implementation Guide Version 27.0: Spring 13 Single Sign-On Implementation Guide Last updated: February 1, 2013 Copyright 2000 2013 salesforce.com, inc. All rights reserved. Salesforce.com is a registered trademark of salesforce.com,

More information

Service Provider Administrator Guide

Service Provider Administrator Guide Service Provider Administrator Guide Powerful Authentication Management for Service Providers and Enterprises Version 3.3 Authentication Service Delivery Made EASY Copyright 2013 SafeNet, Inc. All rights

More information

Strong Authentication for Juniper Networks SSL VPN

Strong Authentication for Juniper Networks SSL VPN Strong Authentication for Juniper Networks SSL VPN with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard

More information

Implementation Guide for. Juniper SSL VPN SSO with OWA. with. BlackShield ID

Implementation Guide for. Juniper SSL VPN SSO with OWA. with. BlackShield ID Implementation Guide for Juniper SSL VPN SSO with OWA with BlackShield ID Copyright 2009 CRYPTOCard Inc. http:// www.cryptocard.com Copyright Copyright 2009, CRYPTOCard All Rights Reserved. No part of

More information

SAML Single-Sign-On (SSO)

SAML Single-Sign-On (SSO) C O L A B O R A T I V E I N N O V A T I O N M A N A G E M E N T Complete Feature Guide SAML Single-Sign-On (SSO) 1. Features This feature allows administrators to setup Single Sign-on (SSO) integration

More information

Egnyte Single Sign-On (SSO) Installation for Okta

Egnyte Single Sign-On (SSO) Installation for Okta w w w. e g n y t e. c o m Egnyte Single Sign-On (SSO) Installation for Okta To set up Egnyte so employees can log in using SSO, follow the steps below to configure Okta and Egnyte to work with each other.

More information

Configuring. SuccessFactors. Chapter 67

Configuring. SuccessFactors. Chapter 67 Chapter 67 Configuring SuccessFactors The following is an overview of the steps required to configure the SuccessFactors Enterprise Edition Web application for single sign-on (SSO) via SAML. SuccessFactors

More information

McAfee Cloud Single Sign On

McAfee Cloud Single Sign On Setup Guide Revision B McAfee Cloud Single Sign On COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

SP-initiated SSO for Smartsheet is automatically enabled when the SAML feature is activated.

SP-initiated SSO for Smartsheet is automatically enabled when the SAML feature is activated. Chapter 87 Configuring Smartsheet The following is an overview of the steps required to configure the Smartsheet Web application for single sign-on (SSO) via SAML. Smartsheet offers both IdP-initiated

More information

Configuring SuccessFactors

Configuring SuccessFactors Chapter 117 Configuring SuccessFactors The following is an overview of the steps required to configure the SuccessFactors Enterprise Edition Web application for single sign-on (SSO) via SAML. SuccessFactors

More information

Using SAML for Single Sign-On in the SOA Software Platform

Using SAML for Single Sign-On in the SOA Software Platform Using SAML for Single Sign-On in the SOA Software Platform SOA Software Community Manager: Using SAML on the Platform 1 Policy Manager / Community Manager Using SAML for Single Sign-On in the SOA Software

More information

Symplified I: Windows User Identity. Matthew McNew and Lex Hubbard

Symplified I: Windows User Identity. Matthew McNew and Lex Hubbard Symplified I: Windows User Identity Matthew McNew and Lex Hubbard Table of Contents Abstract 1 Introduction to the Project 2 Project Description 2 Requirements Specification 2 Functional Requirements 2

More information

An overview of configuring WebEx for single sign-on. To configure the WebEx application for single-sign on from the cloud service (an overview)

An overview of configuring WebEx for single sign-on. To configure the WebEx application for single-sign on from the cloud service (an overview) Chapter 83 WebEx This chapter includes the following sections: An overview of configuring WebEx for single sign-on Configuring WebEx for SSO Configuring WebEx in Cloud Manager For more information about

More information

Protect Everything: Networks, Applications and Cloud Services

Protect Everything: Networks, Applications and Cloud Services Protect Everything: Networks, Applications and Cloud Services Tokens & Users Cloud Applications Private Networks Corporate Network API LDAP / Active Directory SAML RADIUS Corporate Network LDAP / Active

More information

Integration Guide. SafeNet Authentication Service. SAS Using RADIUS Protocol with Microsoft DirectAccess

Integration Guide. SafeNet Authentication Service. SAS Using RADIUS Protocol with Microsoft DirectAccess SafeNet Authentication Service Integration Guide SAS Using RADIUS Protocol with Microsoft DirectAccess Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet,

More information

VMware Identity Manager Administration

VMware Identity Manager Administration VMware Identity Manager Administration VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Single Sign-On Implementation Guide

Single Sign-On Implementation Guide Salesforce.com: Salesforce Winter '09 Single Sign-On Implementation Guide Copyright 2000-2008 salesforce.com, inc. All rights reserved. Salesforce.com and the no software logo are registered trademarks,

More information

Single Sign-On Implementation Guide

Single Sign-On Implementation Guide Single Sign-On Implementation Guide Salesforce, Winter 16 @salesforcedocs Last updated: November 4, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark

More information

Agent Configuration Guide for Microsoft Windows Logon

Agent Configuration Guide for Microsoft Windows Logon Agent Configuration Guide for Microsoft Windows Logon Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright 2013 SafeNet, Inc. All

More information

Single Sign-On Implementation Guide

Single Sign-On Implementation Guide Single Sign-On Implementation Guide Salesforce, Summer 15 @salesforcedocs Last updated: July 1, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of

More information

Configuring. Moodle. Chapter 82

Configuring. Moodle. Chapter 82 Chapter 82 Configuring Moodle The following is an overview of the steps required to configure the Moodle Web application for single sign-on (SSO) via SAML. Moodle offers SP-initiated SAML SSO only. 1 Prepare

More information

SAML-Based SSO Solution

SAML-Based SSO Solution About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 May 2015 About this guide Prerequisites and requirements NetWeaver configuration Legal notices About

More information

CA Performance Center

CA Performance Center CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

To set up Egnyte so employees can log in using SSO, follow the steps below to configure VMware Horizon and Egnyte to work with each other.

To set up Egnyte so employees can log in using SSO, follow the steps below to configure VMware Horizon and Egnyte to work with each other. w w w. e g n y t e. c o m Egnyte Single Sign-On (SSO) Installation for VMware Horizon To set up Egnyte so employees can log in using SSO, follow the steps below to configure VMware Horizon and Egnyte to

More information

CA Nimsoft Service Desk

CA Nimsoft Service Desk CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Getting Started with AD/LDAP SSO

Getting Started with AD/LDAP SSO Getting Started with AD/LDAP SSO Active Directory and LDAP single sign- on (SSO) with Syncplicity Business Edition accounts allows companies of any size to leverage their existing corporate directories

More information

Configuring Parature Self-Service Portal

Configuring Parature Self-Service Portal Configuring Parature Self-Service Portal Chapter 2 The following is an overview of the steps required to configure the Parature Self-Service Portal application for single sign-on (SSO) via SAML. Parature

More information

Identity Implementation Guide

Identity Implementation Guide Identity Implementation Guide Version 37.0, Summer 16 @salesforcedocs Last updated: May 26, 2016 Copyright 2000 2016 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,

More information

SAP Best Practices for SAP Mobile Secure Cloud Configuration March 2015

SAP Best Practices for SAP Mobile Secure Cloud Configuration March 2015 SAP Best Practices for SAP Mobile Secure Cloud Configuration March 2015 2014 SAP SE or an SAP affiliate company. All rights reserved. No part of this publication may be reproduced or transmitted in any

More information

SAS Token Validator Proxy Agent Configuration Guide

SAS Token Validator Proxy Agent Configuration Guide SAS Token Validator Proxy Agent Configuration Guide Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright 2014 SafeNet, Inc. All rights

More information

Synchronization Agent Configuration Guide

Synchronization Agent Configuration Guide SafeNet Authentication Service Synchronization Agent Configuration Guide 1 Document Information Document Part Number 007-012476-001, Revision A Release Date July 2014 Trademarks All intellectual property

More information

SAP NetWeaver Fiori. For more information, see "Creating and enabling a trusted provider for Centrify" on page 108-10.

SAP NetWeaver Fiori. For more information, see Creating and enabling a trusted provider for Centrify on page 108-10. Chapter 108 Configuring SAP NetWeaver Fiori The following is an overview of the steps required to configure the SAP NetWeaver Fiori Web application for single sign-on (SSO) via SAML. SAP NetWeaver Fiori

More information

SAML AS AN SSO STANDARD FOR CUSTOMER IDENTITY MANAGEMENT. How to Create a Frictionless, Secure Customer Identity Management Strategy

SAML AS AN SSO STANDARD FOR CUSTOMER IDENTITY MANAGEMENT. How to Create a Frictionless, Secure Customer Identity Management Strategy SAML AS AN SSO STANDARD FOR CUSTOMER IDENTITY MANAGEMENT How to Create a Frictionless, Secure Customer Identity Management Strategy PART 1: WHAT IS SAML? SAML in Context Security Assertion Markup Language

More information

Sharepoint server SSO

Sharepoint server SSO Configuring g on-premise Sharepoint server SSO Chapter 99 You can now provide single sign-on to your on-premise Sharepoint server applications. This section includes the following topics: "An overview

More information

T his feature is add-on service available to Enterprise accounts.

T his feature is add-on service available to Enterprise accounts. SAML Single Sign-On T his feature is add-on service available to Enterprise accounts. Are you already using an Identity Provider (IdP) to manage logins and access to the various systems your users need

More information

Strong Authentication for Juniper Networks

Strong Authentication for Juniper Networks Strong Authentication for Juniper Networks SSL VPN SSO and OWA with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright

More information

IBM WebSphere Application Server

IBM WebSphere Application Server IBM WebSphere Application Server SAML 2.0 web single-sign-on 2012 IBM Corporation This presentation describes support for SAML 2.0 web browser Single Sign On profile included in IBM WebSphere Application

More information

Agenda. How to configure

Agenda. How to configure dlaw@esri.com Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services

More information

Increase the Security of Your Box Account With Single Sign-On

Increase the Security of Your Box Account With Single Sign-On A Box White Paper Increase the Security of Your Box Account With Single Sign-On Box s high level of security, 24x7 support and 99.9% uptime are critical for us. The biggest benefits are the reliability

More information

SAML single sign-on configuration overview

SAML single sign-on configuration overview Chapter 46 Configurin uring Drupal Configure the Drupal Web-SAML application profile in Cloud Manager to set up single sign-on via SAML with a Drupal-based web application. Configuration also specifies

More information