SAML Authentication with BlackShield Cloud



Similar documents
SAML Authentication Quick Start Guide

Strong Authentication for Juniper Networks

BlackShield Authentication Service

Strong Authentication for Juniper Networks SSL VPN

Strong Authentication for Microsoft TS Web / RD Web

Strong Authentication for Cisco ASA 5500 Series

Strong Authentication for Microsoft SharePoint

LDAP Synchronization Agent Configuration Guide for

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Salesforce

DIGIPASS as a Service. Google Apps Integration

HOTPin Integration Guide: Salesforce SSO with Active Directory Federated Services

HOTPin Integration Guide: Google Apps with Active Directory Federated Services

Dell One Identity Cloud Access Manager How to Configure for SSO to SAP NetWeaver using SAML 2.0

Juniper SSL VPN Authentication QUICKStart Guide

INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Tableau Server

Cisco ASA Authentication QUICKStart Guide

Configuring Single Sign-on from the VMware Identity Manager Service to WebEx

Implementation Guide for. Juniper SSL VPN SSO with OWA. with. BlackShield ID

Security Assertion Markup Language (SAML) Site Manager Setup

Configuring Single Sign-on from the VMware Identity Manager Service to ServiceNow

DualShield SAML & SSO. Integration Guide. Copyright 2011 Deepnet Security Limited. Copyright 2011, Deepnet Security. All Rights Reserved.

This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server

INTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN

Google Apps Deployment Guide

Dell One Identity Cloud Access Manager How to Develop OpenID Connect Apps

BlackShield ID Agent for Terminal Services Web and Remote Desktop Web

PingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1

CA Nimsoft Service Desk

BlackShield ID Agent for Remote Web Workplace

HOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services

Siebel CRM On Demand Single Sign-On. An Oracle White Paper December 2006

SAM Context-Based Authentication Using Juniper SA Integration Guide

PingFederate. Identity Menu Builder. User Guide. Version 1.0

SalesForce SSO with Active Directory Federated Services (ADFS) v2.0 Authenticating Users Using SecurAccess Server by SecurEnvoy

SAP Cloud Identity Service Document Version: SAP Cloud Identity Service

Protecting Juniper SA using Certificate-Based Authentication. Quick Start Guide

PARTNER INTEGRATION GUIDE. Edition 1.0

DocuSign Single Sign On Implementation Guide Published: March 17, 2016

Cloud Authentication. Getting Started Guide. Version

Cloud Single Sign-On and On-Premise Identity Federation with SAP NetWeaver Cloud White Paper

Flexible Identity Federation

Connected Data. Connected Data requirements for SSO

Using SAML for Single Sign-On in the SOA Software Platform

Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x

CA Performance Center

Single Sign On (SSO) Implementation Manual. For Connect 5 & MyConnect Sites

HP Software as a Service. Federated SSO Guide

Radius Integration Guide Version 9

SafeNet Authentication Service

Clearview Customer Web Access

SAP Best Practices for SAP Mobile Secure Cloud Configuration March 2015

BlackShield ID MP Token Guide. for Java Enabled Phones

Configuring Single Sign-on from the VMware Identity Manager Service to AirWatch Applications

Dell One Identity Cloud Access Manager How to Configure vworkspace Integration

OpenLDAP Oracle Enterprise Gateway Integration Guide

Configuring Single Sign-on from the VMware Identity Manager Service to Dropbox

Egnyte Single Sign-On (SSO) Installation for OneLogin

Tenrox. Single Sign-On (SSO) Setup Guide. January, Tenrox. All rights reserved.

Setup Guide Access Manager 3.2 SP3

formerly Help Desk Authority HDAccess Administrator Guide

Configuring Single Sign-On from the VMware Identity Manager Service to Office 365

Single Sign-on to Salesforce.com with CA Federation Manager

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Drupal

SAML 2.0 SSO Deployment with Okta

IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS

PingFederate. SSO Integration Overview

CA Spectrum and CA Embedded Entitlements Manager

Single Sign On for ShareFile with NetScaler. Deployment Guide

IBM WebSphere Application Server

SAP NetWeaver AS Java

BlackShield ID PRO. Steel Belted RADIUS 6.x. Implementation Guide. Copyright 2008 to present CRYPTOCard Corporation. All Rights Reserved

For details about using automatic user provisioning with Salesforce, see Configuring user provisioning for Salesforce.

Enabling Single Sign- On for Common Identity using F5

Microsoft Office 365 Using SAML Integration Guide

Internet Information Services Integration Kit. Version 2.4. User Guide

INTEGRATION GUIDE. DIGIPASS Authentication for VMware Horizon Workspace

Single Sign-On Implementation Guide

McAfee Cloud Identity Manager

Dell One Identity Cloud Access Manager How to Configure Microsoft Office 365

SAML Single-Sign-On (SSO)

Configuring Salesforce

HTTP Client Installation Guide Version 9

Configuring IBM Cognos Controller 8 to use Single Sign- On

LDAP Synchronization Agent Configuration Guide

Egnyte Single Sign-On (SSO) Installation for Okta

Single Sign-On Implementation Guide

Zendesk SSO with Cloud Secure using MobileIron MDM Server and Okta

Microsoft Active Directory Oracle Enterprise Gateway Integration Guide

How To Manage A Plethora Of Identities In A Cloud System (Saas)

PingFederate. Windows Live Cloud Identity Connector. User Guide. Version 1.0

The increasing popularity of mobile devices is rapidly changing how and where we

McAfee Cloud Single Sign On

Microsoft Dynamics GP. Workflow Installation Guide Release 10.0

Single Sign-On Implementation Guide

CA Nimsoft Service Desk

Strong Authentication for Microsoft Windows Logon

Remote Logging Agent Configuration Guide

Single Sign-On Implementation Guide

Transcription:

SAML Authentication with BlackShield Cloud Powerful Authentication Management for Service Providers and Enterprises Version 3.1 Authentication Service Delivery Made EASY

Copyright Copyright 2011. CRYPTOCARD Inc. All rights reserved. The information contained herein is subject to change without notice. Proprietary Information of CRYPTOCARD Inc. Disclaimer The information contained in this document may change without notice, and may have been altered or changed if you have received it from a source other than CRYPTOCARD Inc. While every effort is made to ensure the accuracy of content offered on these pages, CRYPTOCARD Inc. shall have no liability for errors, omissions or inadequacies in the content contained herein or for interpretations thereof. Use of this information constitutes acceptance for use in an AS IS condition, without warranties of any kind, and any use of this information is at the user s own risk. No part of this documentation may be reproduced without the prior written permission of the copyright owner. CRYPTOCARD Inc. disclaims all warranties, either expressed or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall CRYPTOCARD Inc. be liable for any damages whatsoever, including direct, indirect, incidental, consequential or special damages, arising from the use or dissemination hereof, even if CRYPTOCARD Inc. has been advised of the possibility of such damages. Some provinces, states or countries do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation may not apply. Links and addresses to Internet resources are inspected thoroughly prior to release, but the everchanging nature of the Internet prevents CRYPTOCARD Inc. from guaranteeing the content or existence of the resource. When possible, the reference contains alternate sites or keywords that could be used to acquire the information by other methods. If you find a broken or inappropriate link, please send an email with the topic name, link, and its behavior to support@cryptocard.com. The software described in this document is furnished under a license and may be used or copied only in accordance with the terms of the license. Trademarks BlackShield ID, BlackShield Server, BlackShield Cloud, CRYPTOCARD and the CRYPTOCARD logo are trademarks and/or registered trademarks of CRYPTOCARD Corp. in Canada and/or other countries. All other goods and/or services mentioned are trademarks of their respective holders. 2

Contact Information CRYPTOCARD s technical support specialists can provide assistance when planning and implementing CRYPTOCARD in your network. In addition to aiding in the selection of the appropriate authentication products, CRYPTOCARD can suggest deployment procedures that provide a smooth, simple transition from existing access control systems and a satisfying experience for network users. We can also help you leverage your existing network equipment and systems to maximize your return on investment. CRYPTOCARD works closely with channel partners to offer worldwide Technical Support services. If you purchased this product through a CRYPTOCARD channel partner, please contact your partner directly for support needs. To contact CRYPTOCARD directly: CRYPTOCARD Europe Ltd. Venture House Downshire Way Arlington Square Bracknell, UK RG12 1WA Freephone: 0800 694 1000 (UK) Telephone: +44 1344 746 663 (Int l) Fax: +44 1454 878 634 CRYPTOCARD Inc., North America 340 March Road, Suite 600 Ottawa, Ontario, Canada K2K 2E4 Toll Free: 800-307-7042 Telephone: +1 613 599 2441 Fax: +1 613 599 2442 E-mail: support@cryptocard.com E-mail: support@cryptocard.com For information about obtaining a support contract, see our Support Web page at http://www.cryptocard.com Publication History Date Description Revision 2012.01.16 Add My Domain step to Salesforce configuration 1.1 2011.11.21 Initial Release 1.0 3

Contents Introduction... 5 Purpose of this Guide... 5 Audience... 5 Customer Feedback... 5 BlackShield Cloud v3.1 with SAML... 6 A Brief Introduction to SAML... 7 RADIUS on Steroids?... 7 How does SAML Work?... 9 Web Application SSO... 9 Managing Cloud Identities... 10 Normalizing User Credential using BlackShield Cloud... 10 BlackShield Cloud with Cloud SSO Service Providers... 11 Automate Cloud App authorization... 12 Configuring SAML Authentication in BlackShield Cloud... 13 Step 1: Configure SAML Service Providers... 14 Step 2: Configure SAML Services... 20 Step 3: SAML Provisioning Rules... 21 Sample SAML Configurations... 23 Salesforce... 23 Google Apps... 26 Symplified Web SSO... 29 4

Introduction Purpose of this Guide This guide describes the application, configuration and use of BlackShield Cloud as a SAML Identity Provider ( IdP ) to relying SAML Service Providers ( SP ). It describes: How to configure a Virtual Server to be an IdP. How to use the new SAML Provisioning Rules Module introduced in BlackShield Cloud v3.1 and LDAP to automate the configuration of individual user accounts to permit authentication for designated SPs such as Google Apps. How to customize logon and other pages presented to the user during SAML authentication. Provides examples of SAML configurations for Google Apps and Salesforce. Readers are encouraged to read this guide in the order in which information is presented as successive chapters often rely on information and concepts presented in prior chapters. Audience This guide is intended for BlackShield Cloud administrators responsible for how managed authentication services are delivered and responsible for configuring the Service to reflect the internal business processes, service level agreements and management hierarchy. Customer Feedback Help us to improve this documentation, our products and our services by communicating any ideas and suggestions that you feel would improve the usefulness and clarity of the documentation, product feature set or application in practice. Suggestions should be sent to: feedback@cryptocard.com or faxed to Customer Feedback at +1-613-599-2442. Introduction 5

BlackShield Cloud v3.1 with SAML BlackShield Cloud v3.1 adds SAML to the range of authentication options available to Cloud Subscribers. Figure 1: BlackShield Cloud v3.1 This means that enterprises can: 1. Extend strong authentication beyond the enterprise perimeter to include Cloud Apps such as Salesforce, Google Apps etc. 2. Use BlackShield Cloud to protect internal applications such as SAP and others that support SAML authentication. 3. Use BlackShield Cloud with perimeter devices such as SSL VPNs that support SAML authentication. 4. Enable authorized users to authenticate into Cloud Apps in a simple, familiar and consistent manner using the same token/authentication method they use for VPN and other traditional access. 5. Automate Cloud App authorization. BlackShield Cloud v3.1 with SAML 6

6. Use BlackShield Cloud reporting to audit all user authentication activity, including authentication into Cloud apps. A Brief Introduction to SAML SAML ( Security Assertion Markup Language ) is an Extensible Markup Language (XML) standard for exchanging authentication and authorization data between security domains, that is, between an identity provider ( IdP ) such as BlackShield Cloud and a service provider ( SP ), typically a web application such as Google Apps. It allows a user to log on once for affiliated but separate Web sites or web applications. SAML specifies three components: assertions, protocol, and binding. There are three assertions: authentication, attribute, and authorization. Authentication assertion validates the user's identity. Attribute assertion contains specific information about the user. Authorization assertion identifies what the user is authorized to do. Protocol defines how SAML asks for and receives assertions. Binding defines how SAML message exchanges are mapped to Simple Object Access Protocol (SOAP) exchanges. SAML works with multiple protocols including Hypertext Transfer Protocol (HTTP), Simple Mail Transfer Protocol (SMTP), File Transfer Protocol (FTP) and also supports SOAP, BizTalk, and Electronic Business XML (ebxml). While generally considered as an authentication protocol for web apps and in particular Cloud computing, SAML is in fact supported by a range of applications and devices including SAP and perimeter devices such as SSL VPNs. RADIUS on Steroids? Those familiar with RADIUS might want to think of SAML as RADIUS on steroids though the protocol is vastly different and substantially more flexible. In a traditional RADIUS scenario, a user is prompted to provide authentication credentials (User ID and password) by an access point such as a VPN. The VPN uses the RADIUS protocol to pass the credentials to the authentication service for validation which in turn sends an accept or reject message via RADIUS back to the VPN (Figure 2: RADIUS Authentication User Experience on page 8). By standardizing on RADIUS, an organization gained the freedom to choose any vendor s RADIUS client (e.g. VPN) and be assured that it could use any other vendor s RADIUS Server (e.g. BlackShield Cloud). A Brief Introduction to SAML 7

Figure 2: RADIUS Authentication User Experience However, RADIUS has rarely been adopted outside of network perimeter devices. Much like the days before the adoption of RADIUS, applications have each tended to have their own authentication mechanism. As a result, users tend to have many passwords and had to log into individual applications. With the growth in web apps and in particular cloud computing, this quickly becomes unmanageable for users and administrators alike. Obviously a new authentication standard is required that can be adopted by application developers with ease without requiring specific knowledge of how or what the authentication method will be. And equally important, the standard must provide a way to federate identity so that users do not require many password or separate logon to individual applications. SAML and in particular SAML 2.0 is the standard that makes this possible. A Brief Introduction to SAML 8

How does SAML Work? 1 A SAML Service Provider (e.g. Google Apps, Salesforce, SSL VPNs) relies on a SAML IdP (e.g. BlackShield Cloud) to present the logon page and authenticate users. When a user logs into an application that supports SAML, they are redirected to BLACKSHIELD Cloud where they must authenticate. If the authentication is successful, the user is redirected to their Cloud app where access is granted. The SAML assertion generated by the IdP in response to a successful authentication is used by the Service Provider to grant the user access to the application (Figure 3: SAML Authentication User Experience on page 9). Figure 3: SAML Authentication User Experience Web Application SSO Where an affiliation exists between separate web sites or applications, the successful SAML authentication results in user access to the affiliate without imposing additional user logon essentially web SSO. Figure 3: SAML Authentication User Experience illustrates a possible affiliation between 1 Figure 3: SAML Authentication User Experience is not meant to be technically correct with respect to the SAML protocol or authentication process but rather illustrate the net effect on the user logon experience. How does SAML Work?0F 9

Google Apps and Salesforce which would permit a user authenticated into one of these services to be able to use the other service without additional authentication. Managing Cloud Identities It s not uncommon for individual Cloud applications to impose specific requirements with respect to UserIDs. For example, a user may require a gmail account (e.g. bill@gmail.com) to log into Google Apps whereas Salesforce may require a domain specific email address (e.g. bill@cryptocard.com). If there s no affiliation between the web apps, the user may be required to logon separately to each application using different credentials. These of course may be in addition to the UserID required for logon through the corporate VPN (e.g. bill). This can quickly become confusing and unmanageable for users and administrators. Fortunately there are a couple of remedies: 7. Use BlackShield Cloud to normalize the user s logon credentials across corporate and cloud applications and services. 8. Use BlackShield Cloud in conjunction with a Cloud SSO service. Normalizing User Credential using BlackShield Cloud One of the capabilities of BlackShield Cloud is to authenticate a user with a single credential their UserID and One-time Password, but provide a different, specific credential required by the Cloud app service. Effectively BlackShield on successful authentication replaces the UserID provided during authentication with the UserID required by the Cloud application in the SAML assertion as illustrated in Figure 4: Normalizing User Credential using BlackShield Cloud on page 11. For the user, this delivers a consistent logon methodology, (e.g. UserID: Bill, Password: OTP) and insulates the user from any other credential management requirements. How does SAML Work?0F 10

Figure 4: Normalizing User Credential using BlackShield Cloud BlackShield Cloud with Cloud SSO Service Providers Cloud SSO Service Providers such as Symplified (www.symplified.com) provide a front end for managing multiple Cloud service providers and applications. Typically these front ends support SAML authentication and can therefore use BlackShield as the IdP. The Cloud SSO can be configured as a SAML SP, relying on BlackShield Cloud to authenticate the user. Once authenticated, the user has access to Cloud applications and services configured for their personal Cloud SSO account. (Figure 5: BlackShield Cloud and Cloud SSO on page 12) How does SAML Work?0F 11

Figure 5: BlackShield Cloud and Cloud SSO Automate Cloud App authorization One of the challenges facing administrators of large user populations is efficient and timely activation of SAML authentication. As the number of users and cloud apps grow, so to does the challenge of timely activation/deactivation. BlackShield offers an elegant solution to the problem in the form of SAML Provisioning Rules. Generally these rules are triggered on the addition or removal of a user from an LDAP security group and/or BlackShield internal group and allow/deny authentication for users authenticating at the specified SAML Service Providers respectively. How does SAML Work?0F 12

Configuring SAML Authentication in BlackShield Cloud There are 3 steps to configure SAMLE authentication: 1. Configure SAML Service Providers Use this step to configure the virtual server to process authentication requests received from a specific SAML Service Provider. 2. Configure SAML Services Use this step to manually enable SAML authentication for individual users to one or more of the SAML Service Providers created in the step 1. 3. Configure SAML Provisioning Rules Use this step to automatically enable SAML authentication for individual users to one or more of the SAML Service Providers created in step 1. SAML Provisioning Rules can be used instead of manual configuration of services (Step 2) or in addition to manual configuration. Configuring SAML Authentication in BlackShield Cloud 13

Step 1: Configure SAML Service Providers Start configuration of SAML Service Providers from the SAML Service Providers module on the COMMS tab. The information displayed below the ADD button will be required by your Service Provider. Click Add to insert a new provider into the list where: Relying Party ID This is the Entity ID of the SAML Service Provider, typically (but not always) in the form of a URL. This value will be provided by the SAML Service Provider or can be extracted from the metadata (XML file) provided by the SAML Service Provider. For example: <?xml version="1.0" encoding="utf-8"?> <md:entitydescriptor xmlns:md="urn:oasis:names:tc:saml:2.0:metadata" entityid=https://mycompany.salesforce.com Configuring SAML Authentication in BlackShield Cloud 14

Friendly Name This is a name you assign to the Relying Party for easy identification. This name will appear in SAML Services lists on the Assignment Tab SAML Services Module and on the Policies Tab Automation Policies SAML Provisioning Rules. SAML 2.0 Metadata o o Upload existing metadata file This is an XML file that is generated by your SAML Service Provider. Create new metadata file Some SAML Service Providers do not provide an metadata file but instead provide only their Entity ID and Location (essentially the resource being accessed). Use this option to have the virtual server create and add a metadata file based on this information. The remaining options are used to customize the appearance of the logon page presented to the user: Custom Logo This is the logo you want to appear on the logon form presented to your users during authentication. Custom CSS Modify the default CSS then upload to modify the appearance of the page. The following is the default CSS:.tableBanner width: 600px; Configuring SAML Authentication in BlackShield Cloud 15

border-width: 0px; border-spacing: 0px; background-color: white;.tablemain width: 600px; border-width: 1px; border-spacing: 0px; border-style: solid; border-color: #4682B4; border-collapse: separate; background-color: white; padding: 0px;.tdTopSpaceAboveBanner height: 50px; text-align: center;.tdbanner height: 100px; text-align: center;.tdspacebelowbanner height: 50px; text-align: center;.tdloginheader height: 50px; text-align: center; font-size: 28px; color: white; background-color: #4682B4; padding-left: 0px; padding-right: 0px;.tdLoginMessage Configuring SAML Authentication in BlackShield Cloud 16

height: 50px; text-align: center; font-size:20px; color: #4682B4;.tdUserNameLabel text-align: right; font-size: 15px; color: #4682B4; padding-left: 70px;.textUserName width: 225px; height: 20px; text-align: left; border-color: #4682B4; border-width: 1px;.tdPasswordLabel text-align: right; font-size: 15px; color: #4682B4; padding-left: 70px;.textPassword width: 225px; height: 20px; text-align: left; border-color: #4682B4; border-width: 1px;.tdUserName padding-left: 60px;.tdPassword padding-left: 60px;.td20PxSpace Configuring SAML Authentication in BlackShield Cloud 17

height: 20px;.td40PxSpace height: 40px;.tdUserErrorMessage height: 40px; color: red; text-align: center; font-size: 14px;.tdSubmit text-align: center; height: 30px;.buttonSubmit background-color: white; background-repeat:no-repeat; border-width: 0px; width: 120px; height: 28px; text-align: center; font-size: 14px; color: white;.tdspacebelowloginwindow height: 80px;.relayingParty text-align: center; font-size: 10px; color:darkblue; height: 20px;.sessionTimeout text-align: center; font-size: 12px; color:blue;.sessionwarning text-align: center; font-size: 14px; color:crimson;.copyright Configuring SAML Authentication in BlackShield Cloud 18

text-align: center; font-size: 8px; color: darkblue; height: 20px;.td404Error height: 40px; color: red; text-align: left; font-size: 28px;.tdError height: 40px; color: red; text-align: left; font-size: 28px;.tdWarning height: 40px; color: brown; text-align: left; font-size: 28px;.tdInformation height: 40px; color: darkblue; text-align: left; font-size: 28px;.tdSignoutMessage height: 40px; color: red; text-align: left; font-size: 18px;.tdErrorMessage height: 40px; color: red; text-align: left; font-size: 14px; Custom Button Image This is the image used for the logon button. Custom Page Title This is the page title displayed on the browser tab. Custom Icon This is the displayed on the browser tab. Custom Login Header Text This is the text displayed in the header of the logon form. Configuring SAML Authentication in BlackShield Cloud 19

Custom Login Button Text This is the text displayed on the logon button. Login Message This is the text, usually containing instructions displayed between the Logon Header Text and the Username field. Custom Username Field This is the label for the user name field Custom Password Text This is the label for the password field. Step 2: Configure SAML Services Use this module to manually enable a user to authenticate against one or more configured SAML Service Providers where: Service Lists all of the configured SAML Service Providers configured in Step 1. SAML Login ID This is the UserID that will be returned to the Service Provider in the SAML assertion on successful authentication. For example, if your service provider (eg. Salesforce) requires a userid of name@domain.com and this is identical to the user s email address, choose the Email option. Doing so allows the user to consistently use their UserID to authenticate regardless of the Service Providers requirements. In most cases a Service Provider will require either the UserID or Email. For all other cases choose the Custom option and enter the required userid to be returned. You can automate the creation/removal of SAML Services for users by creating a SAML provisioning rule. Refer to Step 3: SAML Provisioning Rules. Configuring SAML Authentication in BlackShield Cloud 20

Step 3: SAML Provisioning Rules Use this module to automate adding or removing the right for users to authenticate to SAML Service Providers where: Rule Name This is a name that describes the rule. User is in container Users affected by this rule must be in the selected container. Server Groups Users in these groups are not affected by this rule. Rule Groups Users must be in one or more of these groups to be affected by this rule. Relying Parties Service Providers in this section are not affected by this rule. Configuring SAML Authentication in BlackShield Cloud 21

Rule Parties Users that belong to one or more of the Rule Groups will be able to authenticate against Service Providers in this section. SAML Login ID This is the UserID that will be returned to the Service Provider in the SAML assertion. Configuring SAML Authentication in BlackShield Cloud 22

Sample SAML Configurations The following examples illustrate how to configure various SAML Service Providers to use BlackShield as a SAML IdP. Note that the data used in these examples is for illustration only. Be sure to use data as displayed in your BlackShield Cloud service and SAML Service Provider. Salesforce To use SAML with Salesforce you must configure My Domain in Salesforce. Refer to Salesforce Administration Setup Company Profile My Domain. Step 1: Configure Single Sign-On 1. Log into Salesforce Administration Setup Security Controls Single Sign-On Settings. 2. Enable SAML. Figure 6: SAML configuration information displayed in Salesforce Sample SAML Configurations 23

3. Upload BlackShield Cloud Identity Provider Certificate Obtain this certificate from the Download URL for Identity Provider Certificate link displayed in the SAML 2.0 Settings in the SAML Service Providers module on the COMMS tab. Figure 7: SAML configuration information displayed in BlackShield 4. Identity Provider Login URL Use the value from Identity Provider AuthenRequest URL displayed in the SAML 2.0 Settings in the SAML Service Providers module on the COMMS tab. 5. Identity Provider Logout URL Use the value from Identity Provider Logout URL displayed in the SAML 2.0 Settings in the SAML Service Providers module on the COMMS tab. 6. Entity ID This is a unique ID created by Salesforce for your organization. This information, usually in the form of a URL must be entered into the Entity ID field in BlackShield (see step 8) 7. Download Metadata Download the metadata file from Salesforce and save to a convenient location. You will upload this file to Blackshield in step 10. Step 2: Add Salesforce as a SAML Service Provider Click Add in the SAML Service Providers SAML 2.0 Setting module to configure a new SAML Service Provider. 8. Entity ID Copy the Entity ID information displayed in Salesforce (step 6 above) into the Entity ID field in BlackShield. Sample SAML Configurations 24

Figure 8: Configuring Salesforce as a SAML Service Provider 9. Friendly Name This is a name you assign to the Relying Party for easy identification. This name will appear in SAML Services lists on the Assignment Tab SAML Services Module and on the Policies Tab Automation Policies SAML Provisioning Rules. 10. SAML 2.0 Metadata Upload the Salesforce metadata file from step 7 to BlackShield. 11. Customize Customize the logon page presented to users during logon to Salesforce. Sample SAML Configurations 25

Google Apps 1. Log into Google Apps Advanced tools Authentication Set up Single Sign-on (SSO) 2. Enable SAML. Figure 9: SAML configuration information displayed in Google Apps 3. Sign-in page URL Use the value from Identity Provider HTTP-Redirect logon URL displayed in the SAML 2.0 Settings in the SAML Service Providers module on the COMMS tab. Figure 10: SAML configuration information displayed in BlackShield 4. Sign-out Page URL Use the value from Identity Provider logout URL displayed in the SAML 2.0 Settings in the SAML Service Providers module on the COMMS tab. Sample SAML Configurations 26

5. Change Password URL Use the value from Identity Provider HTTP=POST logon URL displayed in the SAML 2.0 Settings in the SAML Service Providers module on the COMMS tab. 6. Verification Certificate Use the Download URL for Identity Provider Certificate link displayed in the SAML 2.0 Settings in the SAML Service Providers module on the COMMS tab to obtain the BlackShield certificate. Upload this certificate to Google Apps. 7. Use a domain specific issuer Ensure this value is checked. Use the value generated by Google Apps, typically google.com/a/mycompany where mycompany is your domain registered in Google Apps. This information will be required in next steps. Step 2: Add Google Apps as a SAML Service Provider Click Add in the SAML Service Providers SAML 2.0 Setting module to configure a new SAML Service Provider. 8. Entity ID Copy the domain specific identifier generated by Google Apps displayed in Salesforce (step 7 above) into the Entity ID field in BlackShield. Figure 11: Configuring Google Apps as a SAML Service Provider 9. Friendly Name This is a name you assign to the Relying Party for easy identification. This name will appear in SAML Services lists on the Assignment Tab SAML Services Module and on the Policies Tab Automation Policies SAML Provisioning Rules. 10. SAML 2.0 Metadata Google Apps does not generate metadata. To compensate, select the Create New Metadata File option, then enter: - Entity ID: This is the Google Apps Entity ID from step 7 above. (i.e. google.com/a/mycompany) - Location: This is the SAML assertion consumer URL, typically the Entity ID preceded by https://www. (e.g. https://www.google.com/a/mycompany). Sample SAML Configurations 27

11. Customize Customize the logon page presented to users during logon to Google Apps. Sample SAML Configurations 28

Symplified Web SSO 1. Log into Symplified Identity Providers New Identity Provider SAML2Generic IdP Handler 2. Create an Identity Provider Click the New Identity Provider icon (1) Figure 12: SAML configuration information displayed in Symplified 3. Name Enter BlackShield Cloud as the name of the identity provider (2). 4. SP Entity ID The SP Entity ID is the unique identifier generated by Symplified. This value will be required by BlackShield (Entity ID). 5. SP ACS URL The SP ACS URL is a unique location value generated by Symplified. This value will be required by BlackShield ID (Location) Sample SAML Configurations 29

6. IdP Entity ID Use the Entity ID URL displayed in the SAML 2.0 Settings in the SAML Service Providers module on the COMMS tab. Figure 13: SAML configuration information displayed in BlackShield 7. IdP URL Use the Entity ID URL displayed in the SAML 2.0 Settings in the SAML Service Providers module on the COMMS tab. 8. Public Key Use the Download URL for Identity Provider Certificate link displayed in the SAML 2.0 Settings in the SAML Service Providers module on the COMMS tab to obtain the BlackShield certificate. Upload this certificate to Sypmlified. Step 2: Add Symplified as a SAML Service Provider Click Add in the SAML Service Providers SAML 2.0 Setting module to configure a new SAML Service Provider. 9. Entity ID Copy the SP Entity ID displayed in Salesforce (step 4 above) into the Entity ID field in BlackShield. Figure 14: Configuring Symplified as a SAML Service Provider 10. Friendly Name This is a name you assign to the Relying Party for easy identification. This name will appear in SAML Services lists on the Assignment Tab SAML Services Module and on the Policies Tab Automation Policies SAML Provisioning Rules. Sample SAML Configurations 30

11. SAML 2.0 Metadata Symplified does not generate metadata. To compensate, select the Create New Metadata File option, then enter: - Entity ID: This is the SP Entity ID from step 4 above. - Location: This is the SP ACS URL from step 5 above. 12. Customize Customize the logon page presented to users during logon to Google Apps. Sample SAML Configurations 31