SAML Authentication

SAML Authentication adds an extra layer of security to the password reset and account unlock process. If your organization already has SAML-based identity provider (IdP) applications such as OneLogin or Okta, it makes sense to use SAML Authentication as a method to verify users' identities. When SAML Authentication is enabled, users are redirected to their IdP login URL for authentication during password self-service operations. After successful authentication, users are routed back to the ADSelfService Plus portal where they can reset their password or unlock their account. To use SAML Authentication, end users do not have to enroll with ADSelfService Plus. 

Steps for SAML Authentication:

Configuration of SAML authentication must be done in two places:

  1. At the service provider (SP).
  2. At the identity provider (IdP).

Here, the IdP is the SAML-based identity provider application such as OneLogin or Okta. The SP is ADSelfService Plus.

Note: SAML authentication cannot be used to perform user identification through the ADSelfService Plus mobile app during self-service actions.

Prerequisite Steps:

  1. Log in to ADSelfService Plus web console as an administrator. Navigate to Configuration tab → Self-ServiceMulti-factor AuthenticationAuthenticators SetupSAML authentication. Click ACS URL/ Recepient URL and the Relay State.
  2. The SAML-based identity provider that you intend to use must have ADSelfService Plus as one of its SAML-supported applications. If it is not supported by default, you can add ADSelfService Plus as a new application in your identity provider. Find the steps to add a new application in OktaOneLogin, ADFS and Line Works by clicking on the respective links. For other identity providers, contact their support team for further assistance.
  3. Log in to your identity provider application web console with admin credentials and navigate to ADSelfService Plus from the list of applications provided.
  4. Either download the Metadata in XML format, or get the required data by copying the Issuer URL/Entity ID, IdP Login URL, and the X509-certificate.

Step 1: Service Provider Configuration (ADSelfService Plus)

  1. Log in to ADSelfService Plus web console with admin credentials.
  2. Navigate to Configuration tab → Self-ServiceMulti-factor Authentication Authenticators Setup.
  3. Click SAML Authentication section. Click Modify, if you have already configured.
  4. saml-auth
  5. Choose an IdP from the drop-down list.
  6. There are two SAML Config Modes: Upload Metadata File and Manual Configuration.

    1. Select Upload Metadata File to manually upload the IdP metadata file downloaded from the identity provider (Refer to step 4 of Prerequisite).
      • Click Browse to upload the IdP metadata file.
    2. Select Manual Configuration to manually configure the URLs and certificates.
      • Enter the Issuer URL/Entity ID URL obtained from the identity provider in the respective field. (Refer to step 4 of Prerequisite).
      • In the IdP Login URL, enter the login URL obtained from the identity provider (Refer to step 4 of Prerequisite).
      • In the space provided for X.509-Certificate, enter the public certificate key fetched from the identity provider (Refer step 4 of Prerequisite).

        Note:

        The X.509-Certificate begins with '-----BEGIN CERTIFICATE-----', and ends with '-----END CERTIFICATE-----'. If this pattern--though default in most cases--is absent, you'll need to manually add it to the file.

        Saml Configuration

        Important:

        • By default, ADSelfService Plus utilizes the same SAML authentication configuration for multi-factor authentication during password self-service and single sign-on (SSO) during login. This means that the MFA SAML configurations will automatically be reflected on the logon SSO settings, if the latter is enabled.
        • When you select the Create a new SAML SSO checkbox, you can maintain a separate SAML configuration for multi-factor authentication by generating a new ACS URL/Recipient URL and SP Metadata file. Use the newly generated ACS URL/Recipient URL or the SP Metadata file to create a new SAML configuration for ADSelfService Plus in your identity provider.
        • Click Save, and the new ACS/Recipient URL will be generated.
        • Copy the Relay State value.
  7. Click Save.

Step 2: Setting up an SAML application in the Identity Provider

In this section we have covered the configuration steps for

A. Steps to set up a SAML application in Okta
  1. Log in to Okta web console with admin credentials. Make sure you are logged in to the admin portal.
  2. Navigate to the Classic UI drop-down box.
  3. Go to the Applications tab > Add applications shortcut > Create New App button.
  4. In the dialog box that opens, select the SAML 2.0 option, then click Create.
  5. In General Settings, enter the SAML application name (Example: SelfService MFA) in the App name field. Upload a logo for the application if needed, then click Next.

    General Settings

  6. In Configure SAML, enter the ACS URL/Recipient URL into the Single sign on URL and Audience URI (SP Entity ID) fields.

    SAML Settings

      Note:

    • ACS URL/Recipient URL: Log into ADSelfService Plus web console with admin credentials. Navigate to Configuration tab → Multi-factor AuthenticationSAML authenticationACS URL/Recipient URL. Copy the ACS URL/Recipient URL.

    • If your identity provider needs metadata of the service provider, click Download SP Metadata and download an XML file of your SAML configurations.
  7. Click Next.

  8. In Feedback, select an appropriate response and then click Finish.

  9. The Sign on tab of the newly created application appears. Download the metadata file by clicking the Identity Provider metadata link. You will need this file while configuring SAML authentication in ADSelfService Plus. So, save this file and keep it safe. Rename the downloaded metadata file as 'metadata_okta.xml'.

    Sign On Methods

  10. Click on the Assignments tab and navigate to Assign. Select Assign to People or Assign to Groups based on your requirement. After selecting an option, click the Save and Go Back button.

  11. Click Done.

B. Setting up an SAML application in OneLogin:
  1. Log in to OneLogin web console with admin credentials.
  2. Click the Administration button.
  3. Navigate to Apps tab → Add Apps.
  4. Find SAML in the Find Applications section. Select SAML Test Connector (IdP) from the search result.

    Finding SAML Test Connector (IdP)

  5. Update the Display Name and the application logo. Click SAVE.
  6. Under the Configuration tab, enter the ACS URL/Recipient URL into the ACS (Consumer) URL Validator, ACS (Consumer) URL, Recipient, and Audience fields.

      Note:

    • ACS URL/Recipient URL: Log into ADSelfService Plus web console with admin credentials. Navigate to Configuration tab → Multi-factor Authentication → SAML authentication → ACS URL/Recipient URL. Copy the ACS URL/Recipient URL.
    • If your identity provider needs metadata of the service provider, click Download SP Metadata and download an XML file of your SAML configurations.
  7. Click on the Users tab and assign the application to users or groups based on your needs.
  8. In the MORE ACTIONS button on the top panel, select SAML Metadata to download the metadata file. You will need this file while configuring SAML authentication in ADSelfService Plus. So, save this file and keep it safe.

    Connection configuration

  9. Click SAVE.

C. Setting up an SAML application in AD FS:

Prerequisites:

To configure AD FS for identity verification in ADSelfService Plus, you need the following components:

  1. The AD FS server. The detailed steps for installing and configuring AD FS can be found in this  Microsoft article.
  2. An SSL certificate to sign your AD FS login page and the fingerprint for that certificate.
Configuration steps
Important: Form-based authentication is the only method configured for users trying to access ADSelfService Plus through AD FS authentication, whether for intranet or extranet based use. You can view this setting in  Authentication Policies > Primary Authentication > Global Settings. 
Claim Rules and Relying Party Trust

During configuration, you will need to add a Relying Party Trust and create claim rules.

A Relying Party Trust is created to establish the connection between two applications for authentication purposes by verifying claims. In this case, AD FS will trust the relying party (ADSelfService Plus) and authenticate users based on the claims generated.

Claims are generated from claim rules by applying certain conditions on them. A claim is an attribute that is used for identifying an entity, to establish access. For example, the Active Directory sAMAccountName.

Step 1: Adding a Relying Party Trust

Note: ACS URL/Recipient URL: Log in to ADSelfService Plus web console with admin credentials. Navigate to Configuration tab → Multi-factor Authentication → SAML authentication → ACS URL/Recipient URL. Copy the ACS URL/Recipient URL.

adfs-relying-party-trust

Step 2: Creating Claim Rules

Once you have configured the Relying Party Trust, you can create the claim rules using the Claim Rules Editor which opens by default when you finish creating the trust.

Note: You can choose multiple LDAP attributes and map them to their corresponding outgoing claim types. For example, you can add attributes such as the Given Name, Surname, Phone Number, etc.

adfs-choose-rule-type

After completing the AD FS configuration, download the metadata file by clicking on the Identity Provider metadata link. For example:
 https://server_name/FederationMetadata/2007-06/FederationMetadata.xml. 

You will need this file while configuring SAML authentication in ADSelfService Plus. So, save this file and keep it safe.

Step 3: Enabling SAML logout option
IdP-initiated SSO for ADSelfService Plus

Follow these steps to authenticate your ADSelfService Plus account through AD FS.

Prerequisite

Enable RelayState in AD FS.

Steps to generate an IdP URL:

D. Steps to set up a SAML application in Line Works
  1. Log in to Line Works Developer console. Go to the Apps section > SAML Apps click add to button.

    lineworks-add-saml

  2. In the window that opens, provide an appropriate Application Name, Description, and Logo in the respective fields.

  3. In the ACS URL field and the Issuer URL/Entity ID, enter the ACS URL/Recipient URL of ADSelfService Plus.

    Note: ACS URL/Recipient URL: Log into ADSelfService Plus web-console with admin credentials. Navigate to Configuration tab → Multi-factor Authentication SAML authenticationACS URL/Recipient URL. Copy the ACS URL/Recipient URL.

    lineworks-add-saml

  4. In the popup window that opens, click OK.
  5. Go to SAML Apps section and find the application you have just created. Click the Change button and change the status to 'Effectiveness'. Click Save.

    lineworks-add-saml

E. Steps to set up a SAML application in Microsoft Azure AD
  1. Log in to Microsoft Azure using Global Admin credentials.
  2. Go to Azure Active Directory → Enterprise applications → All applications.
  3. Select New application.

    saml-mfa-authentication

  4. Click Create your own application.

    saml-mfa-authentication

  5. In the pop-up that appears, enter a name for ADSelfService Plus. Select the Integrate any other application you don't find in the gallery radio button, and click Create.

    saml-mfa-authentication

  6. On the next page, select Set up single sign on.

    saml-mfa-authentication

  7. Select SAML, and click Edit under Basic SAML Configuration. Fill in the following details copied in Step 4 of Prerequisites:
    • Identifier: SP Issuer URL
    • Reply URL: ACS URL/Recipient URL
    • Relay State: Relay State
    • Sign on URL: Access URL of ADSelfService Plus

    saml-mfa-authentication

  8. Navigate to SAML Signing Certificate, and click Add a certificate. Here you can create a new SAML signing certificate, upload a self-signed certificate that you’ve generated, or upload a certificate obtained from a CA.
    • To import a certificate: Click Import Certificate.
    • Upload the certificate and enter the PFX password.

      saml-mfa-authentication


      saml-mfa-authentication

    • To add a new certificate: Click New Certificate and then Save.

      saml-mfa-authentication


      saml-mfa-authentication

    • Click the icon-more icon in the certificate's entry, and select Make certificate active.

      saml-mfa-authentication

  9. After closing the screen, download the metadata file by clicking the Download button next to Federation Metadata XML.

    saml-mfa-authentication

  10. After completing the ADSelfService Plus (SP) configuration steps, test the single sign-on functionality by clicking Test.

    saml-mfa-authentication

Thanks!

Your request has been submitted to the ADSelfService Plus technical support team. Our technical support people will assist you at the earliest.

 

Need technical assistance?

  • Enter your email ID
  • Talk to experts
  •  
  •  
    By clicking 'Talk to experts', you agree to processing of personal data according to the Privacy Policy.

Copyright © 2021, ZOHO Corp. All Rights Reserved.