Single Sign On for ZenDesk with NetScaler. Deployment Guide



Similar documents
Single Sign On for Google Apps with NetScaler. Deployment Guide

Single Sign On for GoToMeeting with NetScaler

Single Sign On for ShareFile with NetScaler. Deployment Guide

Single Sign On for Office 365 with NetScaler. Deployment Guide

This guide identifies two possible enterprise integration scenarios for NetScaler and Azure AD.

Deploying NetScaler Gateway in ICA Proxy Mode

icrosoft TMG Replacement with NetScaler

Using Vasco IDENTIKEY Server with NetScaler

How To Use Netscaler As An Afs Proxy

Microsoft Dynamics CRM 2015 with NetScaler for Global Server Load Balancing

Citrix NetScaler and Microsoft SharePoint 2013 Hybrid Deployment Guide

Configuring Citrix NetScaler for IBM WebSphere Application Services

Securing Outlook Web Access (OWA) 2013 with NetScaler AppFirewall

Microsoft TMG Replacement with NetScaler

Solutions Guide. Deploying Citrix NetScaler with Microsoft Exchange 2013 for GSLB. citrix.com

Microsoft SharePoint 2013 with Citrix NetScaler

Deploying NetScaler with Microsoft Exchange 2016

Guide to Deploying Microsoft Exchange 2013 with Citrix NetScaler

Provisioning ShareFile on Microsoft Azure Storage

Citrix Workspace Cloud Apps and Desktop Service with an on-premises Resource Reference Architecture

Deploying Microsoft Dynamics CRM 2015 with NetScaler

Solutions Guide. Deploying Citrix NetScaler for Global Server Load Balancing of Microsoft Lync citrix.com

Citrix Lifecycle Management

Solution Guide. Optimizing Microsoft SharePoint 2013 with Citrix NetScaler. citrix.com

How To Install A Citrix Netscaler On A Pc Or Mac Or Ipad (For A Web Browser) With A Certificate Certificate (For An Ipad) On A Netscaler (For Windows) With An Ipro (For

Safeguard Protected Health Information With Citrix ShareFile

Deployment Guide ICA Proxy for XenApp

Solution Guide for Citrix NetScaler and Cisco APIC EM

The Office Reinvented: Mobile Workspaces are the Future of Work

Cisco and Citrix: Building Application Centric, ADC-enabled Data Centers

Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x

Cloud Authentication. Getting Started Guide. Version

Cisco and Citrix: Building Application Centric, ADC-enabled Data Centers

Taking Windows Mobile on Any Device

Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER

Dell One Identity Cloud Access Manager How to Configure for SSO to SAP NetWeaver using SAML 2.0

White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com

Powering Real-Time Mobile Access to Critical Information With Citrix ShareFile

White Paper. The Value Add of Citrix Enterprise Mobility Management over App Configuration for the Enterprise. citrix.com

Replacing Microsoft Forefront TMG with Citrix NetScaler for enterprise authentication

Configuring ADFS 3.0 to Communicate with WhosOnLocation SAML

Citrix ShareFile Enterprise: a technical overview citrix.com

Advanced Service Desk Security

SAML 2.0 SSO Deployment with Okta

Mobilize with Enterprise-Grade Security and a Great Experience

VMware Identity Manager Administration

Solution Brief. Deliver Production Grade OpenStack LBaaS with Citrix NetScaler. citrix.com

Configuring Single Sign-on from the VMware Identity Manager Service to ServiceNow

How To Get Cloud Services To Work For You

Authentication in XenMobile 8.6 with a Focus on Client Certificate Authentication

App Orchestration 2.5

Powering real-time mobile access to critical information with ShareFile

Citrix ShareFile Enterprise technical overview

F-Secure Messaging Security Gateway. Deployment Guide

Microsoft Office 365 Using SAML Integration Guide

Google Apps Deployment Guide

RSA Adaptive Authentication and Citrix NetScaler SDX Platform Overview

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Configuring Single Sign-On from the VMware Identity Manager Service to Office 365

Authentication Methods

Configuring Single Sign-on from the VMware Identity Manager Service to WebEx

McAfee Cloud Identity Manager

OneLogin Integration User Guide

CA Nimsoft Service Desk

Configuring Single Sign-on from the VMware Identity Manager Service to AirWatch Applications

SAM Context-Based Authentication Using Juniper SA Integration Guide

Connected Data. Connected Data requirements for SSO

White Paper. Optimizing the video experience for XenApp and XenDesktop deployments with CloudBridge. citrix.com

McAfee Cloud Identity Manager

Top Three Reasons to Deliver Web Apps with App Virtualization

Configuring SuccessFactors

INTEGRATE SALESFORCE.COM SINGLE SIGN-ON WITH THIRD-PARTY SINGLE SIGN-ON USING SENTRY A GUIDE TO SUCCESSFUL USE CASE

WHITE PAPER Citrix Secure Gateway Startup Guide

Zendesk SSO with Cloud Secure using MobileIron MDM Server and Okta

Citrix desktop virtualization and Microsoft System Center 2012: better together

Configuring Salesforce

App Orchestration 2.0

The Always-on Enterprise: Business Continuity Scenarios that Work

Agenda. How to configure

This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:

SAP NetWeaver AS Java

ADFS Integration Guidelines

Configuration Guide. BES12 Cloud

SalesForce SSO with Active Directory Federated Services (ADFS) v2.0 Authenticating Users Using SecurAccess Server by SecurEnvoy

Configuring. SuccessFactors. Chapter 67

Deployment Guide ICA Proxy for XenApp

Sophos UTM Web Application Firewall for Microsoft Exchange connectivity

Entrust Managed Services PKI. Configuring secure LDAP with Domain Controller digital certificates

VMware Identity Manager Administration

Single Sign-On Implementation Guide

Security Assertion Markup Language (SAML) Site Manager Setup

CA Performance Center

HOTPin Integration Guide: Salesforce SSO with Active Directory Federated Services

Deploying XenApp on a Microsoft Azure cloud

PingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1

Only LDAP-synchronized users can access SAML SSO-enabled web applications. Local end users and applications users cannot access them.

Secure SSL, Fast SSL

Centrify Cloud Connector Deployment Guide

Transcription:

Deployment Guide Single Sign On for ZenDesk with NetScaler Deployment Guide This deployment guide focuses on defining the process for enabling Single Sign On into ZenDesk with Citrix NetScaler.

Table of Contents Introduction 3 Configuration details 4 NetScaler features to be enabled 4 Solution description 5 Step 1: Configure ZenDesk 5 Step 2: Configure NetScaler 8 Configure LDAP domain authentication 8 To Configure the SAML IDP Policy and Profile 11 To Configure your AAA Virtual Server 13 Validate the configuration 14 Troubleshooting 15 Conclusion 18 2

Citrix NetScaler is a world-class product with the proven ability to load balance, accelerate, optimize, and secure enterprise applications. ZenDesk is a popular cloud-based customer service platform that includes ticketing, self-service options, and customer support features on a subscription basis. It is a preferred solution for several leading enterprises. Introduction This guide focuses on enabling ZenDesk single sign on with Citrix NetScaler. 3

Configuration Details The table below lists the minimum required software versions for this integration to work successfully. The integration process should also work with higher versions of the same. Product NetScaler Minimum Required Version 11.0, Enterprise/Platinum License NetScaler features to be enabled The following feature must be enabled to use single sign-on with ZenDesk: AAA-TM (Authentication, authorization and auditing - Traffic Management) AAA-TM The AAA feature set controls NetScaler authentication, authorization, and auditing policies. These policies include definition and management of various authentication schemas. NetScaler supports a wide range of authentication protocols and a strong, policy-driven application firewall capability. 4

Solution description Enabling SSO for ZenDesk with NetScaler consists of two parts configuring the ZenDesk portal and the NetScaler appliance. ZenDesk should be configured to use NetScaler as a third party SAML IDP (Identity Provider). The NetScaler is configured as a SAML IDP by creating the AAA Virtual Server that will host the SAML IDP policy. The following instructions assume that you have already created the appropriate external and/or internal DNS entries to route authentication requests to a NetScaler-monitored IP address, and that an SSL certificate has already been created and installed on the appliance for the SSL/HTTPS communication. This document also assumes that a ZenDesk account has been created and the relevant organizational domain (*.zendesk.com) has been created and verification for the same has been completed. Part 1: Configure ZenDesk In a web browser, log in to your ZenDesk administration portal at https://<your domain>.zendesk. com using an account with administrative rights. Enter the administrative console by clicking on the nut shaped icon as indicated. Here, navigate to Settings>Security and for both Admins and Agents as well as End users, enable single sign on by clicking on the tick mark next to it. Provide settings as shown in the next screenshot. 5

For the certificate fingerprint, you will need to download the signing certificate that NetScaler will use to sign the assertion. To get the verification certificate from the NetScaler appliance, follow these steps:login to your NetScaler appliance, then select the Configuration tab. 1. Select Traffic Management > SSL 2. Select Manage Certificates / Keys/ CSR s under the Tools section on the right as shown below 6

4. After the download is complete, open the certificate file in Windows, then copy the thumbprint listed under details as shown below. 7

Step 2: Configure NetScaler The following configuration is required on the NetScaler appliance for it to be supported as a SAML identity provider for ZenDesk: LDAP authentication policy and server for domain authentication SSL certificate with external and internal DNS configured for the FQDN presented by the certificate (Wildcard certificates are supported.) SAML IDP policy and profile AAA virtual server This guide covers the configuration described above. The SSL certificate and DNS configurations should be in place prior to setup. Configuring LDAP domain authentication For domain users to be able to log on to the NetScaler appliance with their corporate email addresses, you must configure an LDAP authentication server and policy on the appliance that is bound to your AAA VIP address. (Use of an existing LDAP configuration is also supported) 1. In the NetScaler configuration utility, in the navigation pane, select Security > AAA Application Traffic > Policies > Authentication > Basic Policies > LDAP. 2. To create a new LDAP policy: On the Policies tab click Add, and then enter ZenDesk_LDAP_SSO_ Policy as the name. In the Server field, click the + icon to add a new server. The Authentication LDAP Server window appears. 3. In the Name field, enter ZenDesk_LDAP_SSO_Server. 4. Select the bullet for Server IP. Enter the IP address of one of your Active Directory domain controllers. (You can also point to a virtual server IP for the purpose of redundancy if you are load balancing domain controllers) 5. Specify the port that the NetScaler will use to communicate with the domain controller. Use 389 for LDAP or 636 for Secure LDAP (LDAPS). Leave the other settings as they are. 8

6. Under Connection Settings, enter the base domain name for the domain in which the user accounts reside within the Active Directory (AD) for which you want to allow authentication. The example below uses cn=users,dc=ctxns,dc=net. 7. In the Administrator Bind DN field, add a domain account (using an email address for ease of configuration) that has rights to browse the AD tree. A service account is advisable, so that there will be no issues with logins if the account that is configured has a password expiration. 8. Check the box for Bind DN Password and enter the password twice. 9. Under Other Settings: Enter samaccountname as the Server Logon Name Attribute. 10.In the SSO Name Attribute field, enter UserPrincipalName. Enable the User Required and Referrals options. Leave the other settings as they are. 9

11. Click on More at the bottom of the screen, then add mail as Attribute 1 in the Attribute Fields section. Leave Nested Group Extraction in the Disabled state (we are not going to be using this option for this deployment) 12. Click the Create button to complete the LDAP server settings. 13. For the LDAP Policy Configuration, select the newly created LDAP server from the Server drop-down list, and in the Expression field type ns_true. 14. Click the Create button to complete the LDAP Policy and Server configuration. 10

Configure the SAML IDP Policy and Profile For your users to receive the SAML token for logging on to ZenDesk, you must configure a SAML IDP policy and profile, and bind them to the AAA virtual server where users credentials are sent. Use the following procedure: 1. Select the NetScaler Configuration tab and navigate to Security > AAA Application Traffic > Policies > Authentication > Basic Policies > SAML IDP 2. In the Policies tab, select the Add button. 3. In the Create Authentication SAML IDP Policy window, create a name for your policy (for example ZenDesk_SSO_Policy). 4. Click the + icon next to the Action field to add a new action or profile. 5. Create an action name (for example, ZenDesk_SSO_Profile). 6. In the Assertion Consumer Service URL field, enter https://<your domain>.zendesk.com/ access/saml/ 7. Leave the SP Certificate Name blank. 8. In the IDP Certificate Name field, browse to the certificate installed on the NetScaler that will be used to secure your AAA authentication Virtual Server. 9. In the Issuer Name field enter https://nssaml./saml/login (where nssaml.citrix. com refers to your AAA vserver domain name) 10. Set the Encryption Algorithm to AES256 and the Service Provider ID field to <your domain>.zendesk.com. 11. Set both the Signature and Digest algorithms to SHA-1. 12. Set the SAML Binding to REDIRECT. 11

13. Click on More, then put zendesk.com in the Audience field. 14. Set the Skew Time to an appropriate value. This is the time difference that will be tolerated between the NetScaler appliance and the ZenDesk server for the validity of the SAML assertion. 15. Set the Name ID Format to EmailAddress, and put HTTP.REQ.USER.ATTRIBUTE(1) in the Name ID Expression field. This directs NetScaler to provide the mail attribute added earlier as the user ID for ZenDesk. If this user does not already exist, Zendesk will automatically create one. 16. Click Create to complete the SAML IDP profile configuration and return to the SAML IDP Policy creation window. 17. In the Expression field, add the following expression: HTTP.REQ.URL. CONTAINS( zendesk ) 18. Click Create to complete the SAML IDP Configuration. 12

To Configure your AAA Virtual Server An employee trying to log in to ZenDesk is redirected to a NetScaler AAA virtual server which validates the employee s corporate credentials. This virtual server listens on port 443, which requires an SSL certificate, in addition to external and/or internal DNS resolution of the virtual server s IP address on the NetScaler appliance. The following steps require a pre-existing virtual server to be in place and assume that the DNS name resolution is already in place, and that the SSL certificate is already installed on your NetScaler appliance. 1. In the NetScaler Configuration tab navigate to Security > AAA Application Traffic > Virtual Servers and click the Add button. 2. In the Authentication Virtual Server window, enter the virtual server s name and IP address. (av1 and 10.105.157.62 in this example) 3. Scroll down and make sure that the Authentication and State check boxes are selected. 4. Click Continue. 5. In the Certificates section, select No Server Certificate. 6. In the Server Cert Key window, click Bind. 7. Under SSL Certificates, choose your AAA SSL Certificate and select Insert. (Note This is NOT the ZenDesk SP certificate. ) 8. Click Save, then click Continue. 9. Click Continue again to bypass the Advanced Policy creation option, instead opting to add a Basic Authentication Policy by selecting the + icon on the right side of the window. 10. From the Choose Type window, select Choose Policy from the drop-down list, select LDAP, leaving Primary as the type, and select Continue. 11. Select Bind and from within the Policies window select the ZenDesk_LDAP_SSO_Policy created earlier. 12. Click OK to return to the Authentication Virtual Server screen. 13. Under Basic Authentication Policies click the + icon on the right to add a second Basic Policy. 14. From the Choose Policy drop-down list, select SAMLIDP, leave Primary as the type, and click Continue. 15. Under Policies select Bind, select your ZenDesk_SSO_Policy, and click Insert and OK. 16. Click Continue and Done. 13

After completing the AAA configuration above, this is how the Basic Settings screen of the AAA vserver will look: Validate the configuration Point your browser to https://<your domain>.zendesk.com. You should be redirected to the NetScaler AAA logon form. Log in with user credentials that are valid for the NetScaler environment you just configured. Your ZenDesk account details should appear. Note that you cannot now login to Zendesk directly. To do so, use https://<your domain.zendesk.com/access/normal. 14

Troubleshooting In order to help while troubleshooting, here is the list of entries that will be observed in the ns.log file (located at /var/log on the NetScaler appliance) for a successful SAML login (note that some of the entries such as encrypted hash values etc. will vary) Section 1: The NetScaler receives the authentication request from ZenDesk and parses the same. Jan 24 23:40:11 <local0.debug> 10.105.157.60 01/24/2016:23:40:11 GMT 0-PPE-0 : default SSLLOG SSL_HANDSHAKE_SUCCESS 4692 0 : SPCBId 956 - ClientIP 116.202.102.156 - ClientPort 62330 - VserverServiceIP 10.105.157.62 - VserverServicePort 443 - ClientVersion TLSv1.0 - CipherSuite AES-256-CBC-SHA TLSv1 Non-Export 256-bit - Session New Jan 24 23:40:11 <local0.debug> 10.105.157.60 01/24/2016:23:40:11 GMT 0-PPE-0 : default AAATM Message 4693 0 : SAMLIDP: GET AuthnRequest seen Jan 24 23:40:11 <local0.debug> 10.105.157.60 01/24/2016:23:40:11 GMT 0-PPE-0 : default AAATM Message 4694 0 : SAMLIDP: Redirect Binding: SAMLRequest is gleaned successfully: SAMLRequest=fVHLTsJAFN3zFc3sp%2B0M5TWhJQ3EhASNAXXhbpheQuM8cO4U0a%2B3VEkwRrf3%0AnJPz unpzyejocb5rz3pc4ptmit4updehutzhb9fw2gcgqovzfb2qk8zb4stw%0akkw0gciosslvv4lhqth4f5xymlxj %2FldIRPChDUCi5SInZ4GnKR%2Fz8XaYUsV3%0AGWUMBnQy4WMKapdtt9VoMFCq5SM2sLQYpA054Skb0pRRnj3w vsiy6i%2besfr0%0aadd6kai8mm2dxcaa34a%2f1goe16uc7em4icrr4wqx%2fgbbab7eyplekgwiytka%0akbp 5RGfti1%2FcaXINf09515ZeLu6drtV7VGrt3uYeZICcBN8AiW6cNzL8PROL%0AWXepK7rrqAKMrHVZVb7NRZLiy %2FXnz4reJw%3D%3D%0A Jan 24 23:40:11 <local0.debug> 10.105.157.60 01/24/2016:23:40:11 GMT 0-PPE-0 : default AAATM Message 4695 0 : SAMLIDP: Redirect Binding: RelayState is gleaned successfully Jan 24 23:40:11 <local0.info> 10.105.157.60 01/24/2016:23:40:11 GMT 0-PPE-0 : default AAATM Message 4696 0 : SAMLIDP: Redirect Binding: response or relaystate or sigalg missing; response 1, relaystate 1 sigalg 0 Jan 24 23:40:11 <local0.debug> 10.105.157.60 01/24/2016:23:40:11 GMT 0-PPE-0 : default AAATM Message 4697 0 : SAMLIDP: Redirect Binding: no sigalg 0 or sign_len 0, trying to inflate data Jan 24 23:40:11 <local0.debug> 10.105.157.60 01/24/2016:23:40:11 GMT 0-PPE-0 : default AAATM Message 4698 0 : SAMLIDP: Redirect Binding: inflate succeeded, outlen 479, data <?xml version= 1.0?> <samlp:authnrequest xmlns:samlp= urn:oasis:names:tc:saml:2.0:prot ocol xmlns:saml= urn:oasis:names:tc:saml:2.0:assertion ID= samlr-02828b60-c2f4-11e5-9928-ecf4bbd755cc IssueInstant= 2016-01-24T23:41:37Z Version= 2.0 AssertionConsumerS erviceurl= http://ctxns.zendesk.com/access/saml ><saml:issuer>ctxns.zendesk.com</ saml:issuer><samlp:nameidpolicy AllowCreate= true Format= urn:oasis:names:tc:saml:1.1: nameid-format:emailaddress /></samlp:authnrequest> Jan 24 23:40:11 <local0.debug> 10.105.157.60 01/24/2016:23:40:11 GMT 0-PPE-0 : default AAATM Message 4699 0 : SAMLIDP: Redirect Response: relaystate is http%3a%2f%2fctxns. zendesk.com 15

Section 2: Messages indicating successful authentication and extraction of parameters from the backend LDAP server. Jan 24 23:40:24 <local0.info> 10.105.157.60 01/24/2016:23:40:24 GMT 0-PPE-0 : default AAA Message 4706 0 : In update_aaa_cntr: Succeeded policy for user u3test = ldap2 Jan 24 23:40:24 <local0.debug> 10.105.157.60 01/24/2016:23:40:24 GMT 0-PPE-0 : default AAATM Message 4707 0 : extracted SSOusername: U3Test@CTXNS.net for user u3test Jan 24 23:40:24 <local0.debug> 10.105.157.60 01/24/2016:23:40:24 GMT 0-PPE-0 : default SSLVPN Message 4708 0 : sslvpn_extract_attributes_from_resp: attributes copied so far are U3Test@ctxns.com Jan 24 23:40:24 <local0.debug> 10.105.157.60 01/24/2016:23:40:24 GMT 0-PPE-0 : default SSLVPN Message 4709 0 : sslvpn_extract_attributes_from_resp: total len copied 21, mask 0x1 Jan 24 23:40:24 <local0.debug> 10.105.157.60 01/24/2016:23:40:24 GMT 0-PPE-0 : default AAATM Message 4710 0 : SAMLIDP: Checking whether current flow is SAML IdP flow, input WmVuRGVza19TQU1MAElEPXNhbWxyLTAyODI4 YjYwLWMyZjQtMTFlNS05OTI4LWVjZjRiYmQ3NTVjYyZiaW5kPXBvc3QmaHR0cCUzQSUyRi UyRmN0eG5zLnplbmRlc2suY29t Jan 24 23:40:24 <local0.info> 10.105.157.60 01/24/2016:23:40:24 GMT 0-PPE-0 : default AAA EXTRACTED_GROUPS 4711 0 : Extracted_groups LyncDL,TestDL-LYnc Jan 24 23:40:24 <local0.info> 10.105.157.60 01/24/2016:23:40:24 GMT 0-PPE-0 : default AAATM LOGIN 4712 0 : Context u3test@116.202.102.156 - SessionId: 30- User u3test - Client_ip 116.202.102.156 - Nat_ip Mapped Ip - Vserver 10.105.157.62:443 - Browser_type Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko - Group(s) N/A Jan 24 23:40:24 <local0.debug> 10.105.157.60 01/24/2016:23:40:24 GMT 0-PPE-0 : default SSLVPN Message 4714 0 : UnifiedGateway: SSOID update skipped due to StepUp or LoginOnce OFF, user: u3test Section 3: Messages verifying SAML transaction and sending of SAML assertion with signature Jan 24 23:40:24 <local0.debug> 10.105.157.60 01/24/2016:23:40:24 GMT 0-PPE-0 : default AAATM Message 4715 0 : SAML: SendAssertion: Response tag is <samlp:response xmlns:samlp= urn:oasis:names:tc:saml:2.0:protocol Destination= https://ctxns.zendesk. com/access/saml/ ID= _8a10b2b28cb37e3832b731b0ddc74bd8 InResponseTo= samlr- 02828b60-c2f4-11e5-9928-ecf4bbd755cc IssueInstant= 2016-01-24T23:40:24Z Version= 2.0 ><saml:issuer xmlns:saml= urn:oasis:names:tc:saml:2.0:assertion Format= urn:oasis:names:tc:saml:2.0:nameid-format:entity >https://nssaml./saml/login</saml:issuer><samlp:status><samlp:statuscode Value= urn:oasis:names:tc:saml:2.0:st atus:success ></samlp:statuscode></samlp:status> 16

Jan 24 23:40:24 <local0.debug> 10.105.157.60 01/24/2016:23:40:24 GMT 0-PPE-0 : default AAATM Message 4716 0 : SAML: SendAssertion: Assertion tag is <saml:assertion xmlns:sa ml= urn:oasis:names:tc:saml:2.0:assertion ID= _8a10b2b28cb37e3832b731b0ddc74bd IssueInstant= 2016-01-24T23:40:24Z Version= 2.0 ><saml:issuer Format= urn:oasis:names: tc:saml:2.0:nameid-format:entity >https://nssaml./saml/login</saml:issuer><sa ml:subject><saml:nameid Format= urn:oasis:names:tc:saml:1.1:nameidformat:emailaddress >U3Test@ctxns.com</saml:NameID><saml:SubjectConfirmation Method= urn:oasis:names:tc:saml:2.0:cm:bearer ><saml:subjectconfirmationdata InResponseTo= samlr-02828b60-c2f4-11e5-9928-ecf4bbd755cc NotOnOrAfter= 2016-01- 24T23:45:24Z Recipient= https://ctxns.zendesk.com/access/saml/ ></ saml:subjectconfirmationdata></saml:subjectconfirmation></saml:subject><saml:conditions NotBefore= 2016-01-24T23:35:24Z NotOnOrAfter= 2016-01-24T23:45:24Z ><saml:audiencerest riction><saml:audience>zendesk.com</saml:audience></saml:audiencerestriction></ saml:cond Jan 24 23:40:24 <local0.debug> 10.105.157.60 01/24/2016:23:40:24 GMT 0-PPE-0 : default AAATM Message 4717 0 : SAML: SendAssertion, Digest Method SHA1, SignedInfo used for digest is <ds:signedinfo xmlns:ds= http://www.w3.org/2000/09/xmldsig# ><ds:canonicaliza tionmethod Algorithm= http://www.w3.org/2001/10/xml-exc-c14n# ></ds:canonicalizationmet hod><ds:signaturemethod Algorithm= http://www.w3.org/2000/09/xmldsig#rsa-sha1 ></ds:sig naturemethod><ds:reference URI= #_8a10b2b28cb37e3832b731b0ddc74bd ><ds:transforms><ds:t ransform Algorithm= http://www.w3.org/2000/09/xmldsig#enveloped-signature ></ ds:transform><ds:transform Algorithm= http://www.w3.org/2001/10/xml-exc-c14n# ></ ds:transform></ds:transforms><ds:digestmethod Algorithm= http://www.w3.org/2000/09/ xmldsig#sha1 ></ds:digestmethod><ds:digestvalue>jwmmpmua1k/qq10effvrzmo7fwy=</ ds:digestvalue></ds:reference></ds:signedinfo> Jan 24 23:40:24 <local0.debug> 10.105.157.60 01/24/2016:23:40:24 GMT 0-PPE-0 : default AAATM Message 4718 0 : SAML: SendAssertion, Signature element is <ds:signature xmlns:ds= http://www.w3.org/2000/09/xmldsig# ><ds:signedinfo xmlns:ds= http://www. w3.org/2000/09/xmldsig# ><ds:canonicalizationmethod Algorithm= http://www. w3.org/2001/10/xml-exc-c14n# ></ds:canonicalizationmethod><ds:signaturemethod Algorithm= http://www.w3.org/2000/09/xmldsig#rsa-sha1 ></ds:signaturemethod><ds:referen ce URI= #_8a10b2b28cb37e3832b731b0ddc74bd ><ds:transforms><ds:transform Algorithm= http://www.w3.org/2000/09/xmldsig#enveloped-signature ></ ds:transform><ds:transform Algorithm= http://www.w3.org/2001/10/xml-exc-c14n# ></ ds:transform></ds:transforms><ds:digestmethod Algorithm= http://www.w3.org/2000/09/ xmldsig#sha1 ></ds:digestmethod><ds:digestvalue>jwmmpmua1k/qq10effvrzmo7fwy=</ ds:digestvalue></ds:reference></ds:signedinfo><ds:signaturevalue>eg33zqjebpvhmsyffoejtj cbsmcfwxpisvbmwwv1lz6vimr3ulfsqce/yf6glaj1pxcqqxfidjisvxdhaw4zgdyvzpa/ XluQb8gICyc2NqkUVycdZC1DtGuqIAm6 17

Conclusion NetScaler provides a secure and seamless experience with ZenDesk by enabling single sign-on into ZenDesk accounts, avoiding the need for users to remember multiple passwords and user IDs, while reducing the administrative overhead involved in maintaining these deployments. Corporate Headquarters Fort Lauderdale, FL, USA India Development Center Bangalore, India Latin America Headquarters Coral Gables, FL, USA Silicon Valley Headquarters Santa Clara, CA, USA Online Division Headquarters Santa Barbara, CA, USA UK Development Center Chalfont, United Kingdom EMEA Headquarters Schaffhausen, Switzerland Pacific Headquarters Hong Kong, China About Citrix Citrix (NASDAQ:CTXS) is leading the transition to software-defining the workplace, uniting virtualization, mobility management, networking and SaaS solutions to enable new ways for businesses and people to work better. Citrix solutions power business mobility through secure, mobile workspaces that provide people with instant access to apps, desktops, data and communications on any device, over any network and cloud. With annual revenue in 2014 of $3.14 billion, Citrix solutions are in use at more than 330,000 organizations and by over 100 million users globally. Learn more at www.. Copyright 2016 Citrix Systems, Inc. All rights reserved. Citrix and NetScaler are trademarks of Citrix Systems, Inc. and/or one of its subsidiaries, and may be registered in the U.S. and other countries. Other product and company names mentioned herein may be trademarks of their respective companies.. 0116/PDF 18