Microsoft Office 365 Using SAML Integration Guide



Similar documents
SAM Context-Based Authentication Using Juniper SA Integration Guide

Cloud Authentication. Getting Started Guide. Version

SafeNet Authentication Manager 8.2 and Windows Azure. Quick Start Guide

Protecting Juniper SA using Certificate-Based Authentication. Quick Start Guide

CA Nimsoft Service Desk

Egnyte Single Sign-On (SSO) Configuration for Active Directory Federation Services (ADFS)

SAM 8.0 Backup and Restore Guide. SafeNet Integration Guide

ADFS Integration Guidelines

Tenrox. Single Sign-On (SSO) Setup Guide. January, Tenrox. All rights reserved.

Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x

Configuring ADFS 3.0 to Communicate with WhosOnLocation SAML

VMware Identity Manager Integration with Active Directory Federation Services 2.0

Cisco ASA Authentication QUICKStart Guide

Juniper SSL VPN Authentication QUICKStart Guide

SAML Authentication Quick Start Guide

How To Install Ctera Agent On A Pc Or Macbook With Acedo (Windows) On A Macbook Or Macintosh (Windows Xp) On An Ubuntu (Windows 7) On Pc Or Ipad

SAM Backup and Restore Guide. SafeNet Integration Guide

ACTIVID APPLIANCE AND MICROSOFT AD FS

AvePoint Meetings for SharePoint On-Premises. Installation and Configuration Guide

HOTPin Integration Guide: Salesforce SSO with Active Directory Federated Services

Configuring Single Sign-On from the VMware Identity Manager Service to Office 365

DualShield SAML & SSO. Integration Guide. Copyright 2011 Deepnet Security Limited. Copyright 2011, Deepnet Security. All Rights Reserved.

Active Directory Federation Services

Microsoft IAS and NPS Agent Configuration Guide

Single Sign On for ShareFile with NetScaler. Deployment Guide

HOTPin Integration Guide: Google Apps with Active Directory Federated Services

How To Use Saml 2.0 Single Sign On With Qualysguard

Remote Logging Agent Configuration Guide

Welcome Guide for MP-1 Token for Microsoft Windows

SAML 2.0 Configurations at SAP NetWeaver AS ABAP and Microsoft ADFS

EVault Endpoint Protection 7.0 Single Sign-On Configuration

Secure IIS Web Server with SSL

SafeNet Authentication Client (Windows)

CONFIGURATION GUIDE WITH MICROSOFT ACTIVE DIRECTORY FEDERATION SERVER

SalesForce SSO with Active Directory Federated Services (ADFS) v2.0 Authenticating Users Using SecurAccess Server by SecurEnvoy

Configuring Single Sign-on from the VMware Identity Manager Service to AirWatch Applications

T his feature is add-on service available to Enterprise accounts.

Configuring Single Sign-on from the VMware Identity Manager Service to ServiceNow

Dell One Identity Cloud Access Manager How to Configure for SSO to SAP NetWeaver using SAML 2.0

SafeNet Authentication Service

Enabling Kerberos SSO in IBM Cognos Express on Windows Server 2008

Wavecrest Certificate

SafeNet Authentication Client (Mac)

Lifesize Cloud Table of Contents

Reference and Troubleshooting: FTP, IIS, and Firewall Information

PaperClip. em4 Cloud Client. Manual Setup Guide

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Salesforce

LAB: Enterprise Single Sign-On Services. Last Saved: 7/17/ :48:00 PM

Integration Guide. SafeNet Authentication Service. Using SAS with Web Application Proxy. Technical Manual Template

DigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide

FTP, IIS, and Firewall Reference and Troubleshooting

Security Assertion Markup Language (SAML) Site Manager Setup

PingFederate. IWA Integration Kit. User Guide. Version 3.0

AWS Management Portal for vcenter. User Guide

Sage 200 Web Time & Expenses Guide

DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access

Cloud Attached Storage

Please evaluate this documentation on the following site:

Fairsail. Implementer. Single Sign-On with Fairsail and Microsoft Active Directory Federation Services 2.0. Version 1.92 FS-SSO-XXX-IG R001.

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014

Entrust Managed Services PKI. Configuring secure LDAP with Domain Controller digital certificates

Silect Software s MP Author

CRM Migration Manager for Microsoft Dynamics CRM. User Guide

LDAP Synchronization Agent Configuration Guide

Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER

LAB 1: Installing Active Directory Federation Services

Sharepoint server SSO

CLIENT CERTIFICATE (EAP-TLS USE)

Connected Data. Connected Data requirements for SSO

Dell One Identity Cloud Access Manager How to Develop OpenID Connect Apps

HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE

Deploying RSA ClearTrust with the FirePass controller

Windows Clients and GoPrint Print Queues

Installation Guide. SafeNet Authentication Service

Cloud Attached Storage

Configuring Active Directory with AD FS and SAML for Brainloop Secure Dataroom Setup Guide

Configuring Single Sign-on from the VMware Identity Manager Service to WebEx

PRODUCT WHITE PAPER LABEL ARCHIVE. Adding and Configuring Active Directory Users in LABEL ARCHIVE

Dell Recovery Manager for Active Directory 8.6. Quick Start Guide

How to Implement the X.509 Certificate Based Single Sign-On Solution with SAP Netweaver Single Sign-On

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Tableau Server

How To Set Up Chime For A Coworker On Windows (Windows) With A Windows 7 (Windows 7) On A Windows 8.1 (Windows 8) With An Ipad (Windows).Net (Windows Xp

Flexible Identity Federation

HP Software as a Service. Federated SSO Guide

System Administration Training Guide. S100 Installation and Site Management

APNS Certificate generating and installation

Phone Manager Application Support OCTOBER 2014 DOCUMENT RELEASE 4.1 SAGE CRM

TIBCO Spotfire Automation Services 6.5. Installation and Deployment Manual

SAML 2.0 SSO Deployment with Okta

SAS Token Validator Proxy Agent Configuration Guide

INTEGRATE SALESFORCE.COM SINGLE SIGN-ON WITH THIRD-PARTY SINGLE SIGN-ON USING SENTRY A GUIDE TO SUCCESSFUL USE CASE

PingFederate. IWA Integration Kit. User Guide. Version 2.6

ECA IIS Instructions. January 2005

etoken Single Sign-On

PingFederate. Windows Live Cloud Identity Connector. User Guide. Version 1.0

Installation and Configuration Guide

VPN CLIENT USER S GUIDE

Microsoft Dynamics GP. Workflow Installation Guide Release 10.0

Integrating LANGuardian with Active Directory

Transcription:

Microsoft Office 365 Using SAML Integration Guide Revision A

Copyright 2013 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete and accurate. SafeNet, Inc. is not responsible for any direct or indirect damages or loss of business resulting from inaccuracies or omissions. The specifications contained in this document are subject to change without notice. SafeNet, SafeNet Authentication Manager and SafeNet Authentication Client are either registered with the U.S. Patent and Trademark Office or are trademarks of SafeNet, Inc., and its subsidiaries and affiliates, in the United States and other countries. All other trademarks referenced in this Manual are trademarks of their respective owners. SafeNet Hardware and/or Software products described in this document may be protected by one or more U.S. Patents, foreign patents, or pending patent applications. Please contact SafeNet Support for details of FCC Compliance, CE Compliance, and UL Notification. Date of Publication: January 2013 Last update: January 2013 Contacting SafeNet We work closely with our reseller partners to offer the best worldwide technical support services. Your reseller is the first line of support when you have questions about products and services. However, if you require additional assistance you can contact the SafeNet technical support team help-desk which is available 24 hours a day, seven days a week: Country/Region Telephone USA +1-800-545-6608 International +1-410-931-7520 For further assistance submit additional questions to the SafeNet technical support team at the following web page: http://c3.safenet-inc.com/secure.asp For assistance via email to SafeNet technical support send the request to the following address: support@safenet-inc.com 2

Table of Contents About This Guide... 4 Intended Audience... 4 Additional Information... 4 Software Requirements... 4 Overview... 5 Introduction... 5 SAML... 5 Authentication Flow for this Solution... 6 AD FS Configuration... 7 Defining SAM as an Identity Provider in AD FS 2.0... 7 Setting the Identity Provider s Hash Algorithm... 13 Configuring the Identity Provider s Claim Rule... 14 Configuring the Microsoft Office 365 Claim Rule... 16 Setting the FS Application Protocol... 18 SAM Portal Configuration... 20 Running the Solution... 23 Troubleshooting... 29 3

About This Guide The goal of this document is to provide guidance for setting up and managing SafeNet s authentication solutions in a Microsoft Office 365 environment using SAML 2.0. In this document, Microsoft Office 365 is configured for Single Sign On (SSO) against an onpremise AD FS 2.0 service with reliance on SafeNet Authentication Manager for strong authentication. Intended Audience The guide is intended for Information Technology professionals responsible for the organization s network security. Additional Information For a detailed explanation of SafeNet Authentication Manager (SAM) 8.0 SP4 and the other infrastructure components involved in this solution, or any other SafeNet products mentioned in this guide, refer to SafeNet s product documentation. For additional information on Microsoft or Office 365 software and hardware components mentioned in this guide, refer to the manufacturer s documentation. Software Requirements For this scenario, the working environment must include the following software: Microsoft Office 365 account Microsoft Active Directory Federation Services (AD FS) 2.0 SafeNet Authentication Manager 8.0 SP4 or later 4

Overview Introduction SAML This guide describes the process for enabling strong authentication using SafeNet Authentication Manager (SAM) with Microsoft Office 365. This document assumes that the Microsoft Office 365 with Microsoft Active Directory Federation Services (AD FS) 2.0 environment is already configured. Security Assertion Markup Language (SAML) 2.0 is a standard for exchanging authentication and authorization data between security domains. SAML 2.0 is an XML-based protocol that uses security tokens (information packets) containing assertions to pass information about a principal (usually an end-user) between an Identity Provider (IdP) and a web service. SAML 2.0 enables web-based scenarios including single signon (SSO) authentication. The SafeNet Authentication Manager (SAM) authentication portal uses SAML 2.0 to communicate with Microsoft AD FS 2.0. AD FS 2.0 uses WS-security to communicate with Microsoft Office 365. 5

Authentication Flow for this Solution The figure describes the following SAML scenario: a. Sarah, a user, enters her logon credentials to Microsoft Office 365, and selects SafeNet Authentication Manager (SAM) as her Identity Provider for authentication. b. AD FS passes authentication authority to the SAM authentication server. c. The SAM authentication portal prompts Sarah for her SAM logon credentials. d. SAM verifies Sarah s credentials, and provides an accept/reject authentication assertion to Microsoft Office 365. e. Sarah is logged on to Microsoft Office 365. 6

AD FS Configuration Perform the following steps to configure AD FS for this solution: Defining SAM as an Identity Provider in AD FS 2.0; see page 7 Setting the Identity Provider s Hash Algorithm; see page 13 Configuring the Identity Provider s Claim Rule; see page 14 Configuring the Microsoft Office 365 Claim Rule; see page 16 Setting the FS Application Protocol; see page 18 Defining SAM as an Identity Provider in AD FS 2.0 Using the AD FS 2.0 management console, define SafeNet Authentication Manager as an Identity Provider by adding it to the Claims Provider Trusts list. To define SAM as an Identity Provider in AD FS 2.0: 1. In the AD FS 2.0 management console, expand the tree in the left panel to AD FS 2.0 > Trust Relationships. 2. Right-click Claims Provider Trusts, and from the drop-down menu, select Add Claims Provider Trust. 7

The Add Claims Provider Trust Wizard opens to the Welcome window. 3. Click Start. The Select Data Source window opens. 4. Select Enter claims provider trust data manually, and click Next. 8

The Specify Display Name window opens. 5. Enter a Display name, and click Next. In this example, the display name is Portal. The Choose Profile window opens. 6. Select AD FS 2.0 profile, and click Next. 9

The Configure URL window opens. 7. Select Enable support for the SAML 2.0 WebSSO protocol. 8. Copy the following text to the Claims provider WS-Federation Passive protocol URL field, replacing <SAM Server Name> with the SAM server s domain name: https://<sam Server Name>/samlcloud/default.aspx Note Ensure that the URL begins with https. This value will be used as the SAM Issuer value in step 7 b on page 21 of SAM Portal Configuration. 9. Click Next. The Configure Identifier window opens, displaying the SAM portal URL that was entered in step 7. 10. Click Next. 10

The Configure Certificates window opens. 11. Click Add to add the SAM portal certificate. The Select a Token Signing Certificate window opens. 12. Browse to the location of the exported SafeNet portal certificate, and click Open. Note If the SafeNet portal certificate has not been exported, open the SAM Configuration Manager, go Action > Cloud Configuration, select the Info for Service Provider tab, and click Export Certificate. See the SafeNet Authentication Manager 8.0 SP4 Administrator s Guide for more information. 11

The certificate is added. 13. If the SAM server s domain is different from the AD FS domain that is registered in Office 365, double-click the certificate icon, and install the certificate to the trusted root. 14. In the Configure Certificates window, click Next. The Ready to Add Trust window opens. 15. Click Next, and click Finish to close the wizard. 12

In the AD FS 2.0 Management console, the new Identity Provider entry for SAM, named in step 5, is included in the Claims Provider Trusts list. In this example, the name assigned to the SAM Identity Provider is Portal. Setting the Identity Provider s Hash Algorithm Define SHA-1 as the hash algorithm of the Identity Provider. To set the hash algorithm: 1. In the AD FS 2.0 management console, expand the tree in the left panel to AD FS 2.0 > Trust Relationships,and select Claims Provider Trusts. The Claims Provider Trusts list is displayed in the middle panel. 2. Right-click the Identity Provider entry for SAM named in step 5 of Defining SAM as an Identity Provider in AD FS 2.0, and from the drop-down menu, select Properties. The Identity Provider s Properties window opens. 3. Select the Advanced tab. 4. In the Secure hash algorithm drop-down menu, select SHA-1. 13

5. Click Apply, and click OK. Configuring the Identity Provider s Claim Rule Configure a mapping rule for the Identity Provider. To configure the Identity Provider s claim rule: 1. In the AD FS 2.0 management console, expand the tree in the left panel to AD FS 2.0 > Trust Relationships,and select Claims Provider Trusts. The Claims Provider Trusts list is displayed in the middle panel. 2. Right-click the Identity Provider entry for SAM named in step 5 of in Defining SAM as an Identity Provider in AD FS 2.0, and from the drop-down menu, select Edit Claim Rules. The Identity Provider s Edit Claim Rules window opens. 3. Click Add Rule. 14

The Add Transform Claim Rule Wizard opens to the Select Rule Template window. 4. From the Claim rule template drop-down menu, select Transform an Incoming Claim, and click Next. The Configure Rule window opens. 5. In the Claim rule name field, enter a name for the new rule. In this example, the rule name is Name ID to Windows account name. 6. Select the appropriate settings. In this example, we do the following: In the Incoming claim type drop-down menu, select Name ID. In the Incoming name ID format drop-down menu, select Unspecified. In the Outgoing claim type drop-down menu, select Windows account name. Select Pass through all claim values. 7. Click Finish. 15

A warning message may open confirming your intention to select Pass through all claim values. 8. Click Yes to close the warning message. In the Edit Claim Rules window, the rule named in step 5 is included in the Rule Name list. In this example, the rule name is Name ID to Windows account name. Configuring the Microsoft Office 365 Claim Rule Configure a custom rule for the Microsoft Office 365 Identity Platform. To configure a custom rule for the Microsoft Office 365 Identity Platform: 1. In the AD FS 2.0 Management console, expand the tree in the left panel to AD FS 2.0 > Trust Relationships > Relying Party Trusts. The Relying Party Trusts list is displayed in the middle panel. 2. In the middle panel, right-click Microsoft Office 365 Identity Platform, and from the drop-down menu, select Edit Claim Rules. 16

Microsoft Office 365 s Edit Claim Rules window opens, displaying two rules. 3. Select the first rule, and click Edit Rule. The Edit Rule window opens. 4. Do the following: In the Claim rule name field, enter a name for the rule. In this example, the new rule name is Custom Rule for Microsoft. In the Custom Rule box, delete the existing text, and then copy the following text, replacing <AD FS Domain Name> with the AD FS domain name that is registered in Office 365 for your installation. c:[type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccou ntname"] => issue(store = "Active Directory", types = ("http://schemas.xmlsoap.org/claims/upn", "http://schemas.microsoft.com/liveid/federation/2008/05/immutableid"), query = "samaccountname={0};userprincipalname,objectguid;<ad FS Domain Name>\{1}", param = c.value, param = c.value); 17

Note Ensure that the script is copied exactly as displayed above. Change only the <AD FS Domain Name> parameter. 5. Click OK to save the rule. The new name of the rule is displayed. 6. Click Apply, and click OK. Setting the FS Application Protocol Ensure that the Federation Service s Hypertext Transfer Protocol does not use SSL/TLS secure protocol. To set the Federation Service s application protocol: 1. In the AD FS 2.0 management console, right-click Service, and from the drop-down menu, select Edit Federation Service Properties. The Federation Service Properties window opens. 2. In the General tab, change the protocol listed at the beginning of the Federation Service identifier field from https to http. 18

Note You will need the information in this window for step 7 on page 21 in SAM Portal Configuration. In this example, the Federation Service display name is dc.safenetdemos.com. 3. Click Apply, and click OK. 19

SAM Portal Configuration SAM s Token Policy Object (TPO) policies include Protected Application Settings. These settings are used by the SAM portals. Note See the SafeNet Authentication Manager 8.0 SP4 Administrator s Guide for general portal configuration information. To configure the SAM portal for this solution: 1. Open the Token Policy Object Editor for the appropriate group. See the SafeNet Authentication Manager 8.0 SP4 Administrator s Guide for more information. The Token Policy Object Editor window opens. 2. In the left pane, select Protected Application Settings > User Authentication. Policies are displayed in the right pane. 3. In the right pane, double-click Application Authentication Settings. The Application Authentication Settings Properties window opens. 20

4. Select Define this policy setting, and select Enabled. 5. Click Definitions. The Application Authentication Settings window opens. 6. In the left pane, select Application Authentication Settings > ADFS. Policies are displayed in the right pane. Note You will need the FS properties displayed in the General tab of the Federation Service Properties window to complete the fields. To view the FS properties, see Setting the FS Application Protocol on page 18. 7. In the right pane, double-click the following policies, and enter the appropriate information: a. Application Issuer: Copy the Federation Service identifier value from the Federation Service Properties window, and then change the application protocol of the Application Issuer from http to https. Note The Federation Service identifier value is displayed in the General tab of the Federation Service Properties window. b. SAM Issuer: Copy the following text, replacing <SAM Server Name> with the SAM server s domain name: https://<sam Server Name>/samcloud/default.aspx Note This is the Claims provider WS-Federation Passive protocol URL value that was entered in step 8 on page 10 of Defining SAM as an Identity Provider in AD FS 2.0. 21

c. Application s login URL: Copy the following text, replacing <FS Name> with the Federation Service s display name: https://<fs Name>/adfs/ls In this example, the Federation Service display name is dc.safenetdemos.com. Note The Federation Service display name value is displayed in the General tab of the Federation Service Properties window. d. Audience URI: Copy the value entered into Application s login URL, in step 7 c. e. User mapping: Enter AccountName. 8. Ensure that at least one authentication type is enabled. 9. Click OK until all of the TPO Editor windows are closed. 22

Running the Solution This section describes a typical user authentication scenario using the solution. How Sarah authenticates to Microsoft Office 365: 1. Sarah opens a web browser and browses to Microsoft Online Services. The Microsoft Office 365 sign in window opens. 23

Sarah enters her account username including the domain name. 2. Sarah clicks the link that appears beneath the sign-in credentials: Sign in at <followed by the domain name>. If more than one Identity Provider is available, Sarah is prompted to select one. 24

From the drop-down menu, Sarah selects the Identity Provider entry for SAM named in step 5 on page 9 of Defining SAM as an Identity Provider in AD FS 2.0. In this example, the name assigned to the SAM Identity Provider is Portal. 3. Sarah clicks Continue to Sign In. AD FS redirects the authentication request to the SAM Authentication Portal. 25

The Authentication Portal s User Identification window opens. 4. Sarah enters her username, and clicks OK. 26

Sarah is prompted to enter the appropriate SAM credentials for the authentication method defined in the SAM TPO. 5. Sarah enters her SAM logon credentials, and clicks Log on. A message is displayed informing Sarah that she has successfully logged on. 27

Sarah is authenticated to her Microsoft Office 365 account. 28

Troubleshooting Problem Possible Cause Solution An error message is displayed: Your system configuration is incorrect. Contact your administrator. The SAM Authentication Portal does not open. After logon, an error message is displayed: The page you requested could not be found After logon, an error message is displayed: Schema validation failed for response. Audience must have TextContent Users cannot authenticate. The Application Issuer in the TPO is incorrect. The URL entered is not correct. The SAM Issuer in the TPO is incorrect. The Application s login URL in the TPO is incorrect. The Audience URI in the TPO is not enabled or is empty. The User mapping in the TPO does not match the mapped value defined in the Microsoft Office 365 rule s script. Ensure that the correct Application Issuer is in the TPO setting. See step 7 a on page 21 of SAM Portal Configuration. Ensure that the user typed the correct URL. Ensure that the correct SAM Issuer is in the TPO setting. See step 7 b on page 21 of SAM Portal Configuration. Ensure that the correct Application s login URL is in the TPO setting. See step 7 c on page 22 of SAM Portal Configuration. Ensure that the correct Audience URI is in the TPO setting. See step 7 d on page 22 of SAM Portal Configuration. Ensure that the rule s script is exactly as instructed in step 4 on page 17 of Configuring the Microsoft Office 365 Claim Rule. Ensure that the correct User mapping is in the TPO setting. See step 7 e on page 22 of SAM Portal Configuration. 29

Problem Possible Cause Solution A log file must be created and sent to SafeNet technical support for debugging purposes. Writing to a log file is no longer needed. To enable logging, run the following from the AD FS computer s command line: wevtutil.exe sl AD FS 2.0 Tracing/Debug /l:5 Disable logging from the Windows Event Viewer application. 30