Integration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for Okta

Similar documents
Integration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for Tableau Server

Integration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for SonicWALL Secure Remote Access

Integration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for PingFederate

Integration Guide. SafeNet Authentication Manager. Using RADIUS Protocol for Citrix NetScaler 10.5

Integration Guide. SafeNet Authentication Manager. SAM using RADIUS Protocol with SonicWALL E-Class Secure Remote Access

Integration Guide. SafeNet Authentication Manager. SAM using RADIUS Protocol with Microsoft DirectAccess

SafeNet Authentication Manager. Integration Guide. Using SAM as an Identity Provider for Dropbox

Integration Guide. SafeNet Authentication Service. NetDocuments

SafeNet Authentication Manager

Integration Guide. SafeNet Authentication Manager. SAM using RADIUS Protocol with Check Point Security Gateway

Integration Guide. SafeNet Authentication Manager. Using RADIUS Protocol for Cisco ASA

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Better MDM

Integration Guide. SafeNet Authentication Service. Protecting SugarCRM with SAS

Integration Guide. SafeNet Authentication Manager. Using SafeNet Authentication Manager with Citrix XenApp 6.5

SafeNet Authentication Manager

Integration Guide. SafeNet Authentication Client. Using SAC CBA with BitLocker

Integration Guide. SafeNet Authentication Service. Protecting Microsoft Internet Security and Acceleration (ISA) Server 2006 with SAS

Integration Guide. SafeNet Authentication Client. Using SAC CBA with Juniper Junos Pulse

Integration Guide. SafeNet Authentication Service. SAS Using RADIUS Protocol with CA SiteMinder

Integration Guide. SafeNet Authentication Service. Using RADIUS Protocol for Citrix GoToMyPC

Integration Guide. SafeNet Authentication Service. Using RADIUS Protocol for VMware Horizon 6

Integration Guide. SafeNet Authentication Service. Strong Authentication for Juniper Networks SSL VPN

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft NPS Technical Manual Template

Integration Guide. SafeNet Authentication Service. Protecting Syncplicity with SAS

Integration Guide. SafeNet Authentication Client. Using SAC CBA for VMware Horizon 6 Client

Integration Guide. SafeNet Authentication Service. SAS using RADIUS Protocol with WatchGuard XTMv. SafeNet Authentication Service: Integration Guide

SafeNet Authentication Manager

SafeNet Authentication Manager

Integration Guide. SafeNet Authentication Service. Strong Authentication for Citrix Web Interface 4.6

SafeNet Authentication Service

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft SharePoint on IIS 7/8. Technical Manual Template

SafeNet Authentication Service

KT-4 Keychain Token Welcome Guide

SafeNet Authentication Service

SafeNet Authentication Manager

SafeNet Authentication Service Cisco AnyConnect Agent. Configuration Guide

SafeNet Authentication Service

SafeNet Authentication Service

Welcome Guide. SafeNet Authentication Service. MP-1 BlackBerry. SafeNet Authentication Service: Welcome Guide. MP-1 BlackBerry

Synchronization Agent Configuration Guide

SafeNet Authentication Manager

Synchronization Agent Configuration Guide

SafeNet Authentication Client

MobilePASS for BlackBerry OS 10

Oracle iplanet Web Server Integration Guide

SafeNet Authentication Service

SafeNet Authentication Manager

Protecting SugarCRM with SafeNet Authentication Manager

SafeNet Authentication Service

SAS Agent for NPS CUSTOMER RELEASE NOTES. Contents

SafeNet Authentication Client

Welcome Guide. SafeNet Authentication Service. RB-1 Tokens. SafeNet Authentication Service: Welcome Guide. RB-1 Tokens

SafeNet Authentication Service

SAS Agent for NPS FAQS. Contents. Page 1 of 5. Description... 2 Frequently Asked Questions... 2 Product Documentation... 5 Support Contacts...

SafeNet Authentication Client

SafeNet Authentication Service

SafeNet Authentication Client

SAS Agent for Microsoft SharePoint

SafeNet Authentication Client

SafeNet Authentication Client

Sentinel Cloud Run-time Java Samples ReadMe

Oracle Access Manager Configuration Guide

SafeNet Authentication Service

INTEGRATING OKTA: VMWARE WORKSPACE ONE OPERATIONAL TUTORIAL VMware Workspace ONE

SafeNet Authentication Service

Sentinel Cloud V.3.6 Installation Guide

SAS Agent for Microsoft Internet Information Services (IIS)

April Understanding Federated Single Sign-On (SSO) Process

Integrating VMware Workspace ONE with Okta. VMware Workspace ONE

SafeNet Authentication Client

SafeNet Authentication Client

SafeNet Authentication Service Token Validator Proxy Agent. Installation and Configuration Guide

SafeNet Authentication Service (SAS) SAML Authentication Quick Start Guide

SafeNet Authentication Service Agent for Microsoft Outlook Web App. Installation and Configuration Guide

SafeNet Authentication Manager

SafeNet MobilePASS+ for Android. User Guide

SafeNet Authentication Service

SafeNet Authentication Service

SafeNet Authentication Service (SAS) Service Provider Billing and Reporting Guide

SafeNet Authentication Service

SAML-Based SSO Configuration

Novell Access Manager

Configuring Single Sign-on from the VMware Identity Manager Service to Marketo

RECOMMENDED DEPLOYMENT PRACTICES. The F5 and Okta Solution for High Security SSO

SafeNet Authentication Service Agent for Cisco AnyConnect Client. Installation and Configuration Guide

Integration Guide. SafeNet Authentication Service (SAS)

Nimsoft Service Desk. Single Sign-On Configuration Guide. [assign the version number for your book]

Novell Access Manager

Preface. Microsoft SQL Server 2008 and Luna SA/Luna PCI Integration Guide SafeNet, Inc. All rights reserved.

Integration Guide. PingFederate SAML Integration Guide (SP-Initiated Workflow)

Enabling Single Sign-On Using Okta in Axon Data Governance 5.4

Enabling Single Sign-On Using Microsoft Azure Active Directory in Axon Data Governance 5.2

Novell Access Manager

Quick Connection Guide

Configuring Alfresco Cloud with ADFS 3.0

Zendesk Connector. Version 2.0. User Guide

Slack Connector. Version 2.0. User Guide

MyWorkDrive SAML v2.0 Okta Integration Guide

SafeNet Authentication Service. Push OTP Solution Guide

Five9 Plus Adapter for Agent Desktop Toolkit

Transcription:

SafeNet Authentication Manager Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1

Document Information Document Part Number 007-013097-001, Rev. A Release Date June 2015 Trademarks All intellectual property is protected by copyright. All trademarks and product names used or referred to are the copyright of their respective owners. No part of this document may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, chemical, photocopy, recording, or otherwise, without the prior written permission of SafeNet, Inc. Disclaimer SafeNet makes no representations or warranties with respect to the contents of this document and specifically disclaims any implied warranties of merchantability or fitness for any particular purpose. Furthermore, SafeNet reserves the right to revise this publication and to make changes from time to time in the content hereof without the obligation upon SafeNet to notify any person or organization of any such revisions or changes. We have attempted to make these documents complete, accurate, and useful, but we cannot guarantee them to be perfect. When we discover errors or omissions, or they are brought to our attention, we endeavor to correct them in succeeding releases of the product. SafeNet invites constructive comments on the contents of this document. These comments, together with your personal and/or company details, should be sent to the address or email below. Contact Method Mail Email Contact Information SafeNet, Inc. 4690 Millennium Drive Belcamp, Maryland 21017, USA TechPubs@safenet-inc.com 2

Contents Third-Party Software Acknowledgement... 4 Description... 4 Applicability... 4 Environment... 4 Audience... 4 SAML Authentication using SAM... 5 Authentication Dataflow using SAM... 5 SAML Prerequisites... 5 Configuring Okta... 6 Configuring SafeNet Authentication Manager... 8 Synchronizing User Stores to SAM... 8 Assigning a Token in SAM... 9 Configuring SAM as an Identity Provider... 9 Exporting the SAM Certificate... 12 Adding Okta as a Service Provider in the Token Policy Object... 13 Running the Solution... 17 Support Contacts... 18 3

Third-Party Software Acknowledgement This document is intended to help users of SafeNet products when working with third-party software, such as Okta. Material from third-party software is being used solely for the purpose of making instructions clear. Screen images and content obtained from third-party software will be acknowledged as such. Description SafeNet Authentication Manager (SAM) is a versatile authentication solution that allows you to match the authentication method and form factor to your functional, security, and compliance requirements. Use this innovative management service to handle all authentication requests and to manage the token lifecycle. Okta is an integrated identity and mobility management service that securely connects people to their applications from any device, anywhere, at any time. This document describes how to: Deploy multi-factor authentication (MFA) options in Okta using SafeNet tokens managed by SafeNet Authentication Manager. Configure SAML authentication in Okta using SafeNet Authentication Manager as an identity provider. It is assumed that the Okta environment is already configured and working with static passwords prior to implementing multi-factor authentication using SafeNet Authentication Manager. Okta can be configured to support multi-factor authentication in several modes. SAML authentication will be used for the purpose of working with SafeNet Authentication Manager. Applicability The information in this document applies to: SafeNet Authentication Manager A server version of SAM that is used to deploy the solution onpremises in the organization. Environment The integration environment that was used in this document is based on the following software versions: SafeNet Authentication Manager Version 8.2.158.654 Okta Okta s cloud-based service Audience This document is targeted to system administrators who are familiar with Okta, and are interested in adding multi-factor authentication capabilities using SafeNet Authentication Manager. 4

SAML Authentication using SAM SAM provides a SAML authentication option that is already implemented in the SAM environment and can be used without any installation. Authentication Dataflow using SAM SafeNet Authentication Manager communicates with a large number of Service Providers and cloud-based services solutions using the SAML protocol. The image below describes the dataflow of a multi-factor authentication transaction for Okta. 1. A user attempts to log on to Okta. The user is redirected to SAM. SAM collects and evaluates the user's credentials. 2. SAM returns a response to Okta, accepting or rejecting the user`s authentication request. SAML Prerequisites To enable SafeNet Authentication Manager to receive SAML authentication requests from Okta, ensure that the end users can authenticate from the Okta environment with a static password. 5

Configuring Okta Add SafeNet Authentication Manager as an identity provider in Okta. 1. In your Okta account, log in as an administrator. 2. On the main window, click Admin. (The screen image above is from Okta. Trademarks are the property of their respective owners.) 3. Click Security > Authentication. (The screen image above is from Okta. Trademarks are the property of their respective owners.) 4. On the Inbound SAML tab, click Add Endpoint. (The screen image above is from Okta. Trademarks are the property of their respective owners.) 6

5. On the Add/Edit Endpoint window, complete the following fields, and then click Save Endpoint: Alias IDP Certificate IDP Issuer IDP Login URL IDP Binding Default Group Assignment Transform Username Name ID Format Enable SP initiated SAML Enter the company name. Use lowercase characters only (for example, gemalto). Click Browse, and then select the SAM certificate. (To get the SAM certificate, see Exporting the SAM Certificate on page 12.) Enter the SAM Entity ID (for example, SAM). Enter https://sam.safenetdemos.com/samcloud/default.aspx. Select HTTP-Post. Leave this option as the default (None). Select username. Select Email Address. Select this option. (The screen image above is from Okta. Trademarks are the property of their respective owners.) 7

An endpoint is added and the Okta SAML metadata details are displayed. (The screen image above is from Okta. Trademarks are the property of their respective owners.) Configuring SafeNet Authentication Manager Using SAM as an identity provider for Okta requires the following: Synchronizing User Stores to, page 8 Assigning a Token in SAM, page 9 Configuring SAM as an Identity Provider, page 9 Exporting the SAM Certificate, page 12 Adding Okta as a Service Provider in the Token Policy Object, page 13 Synchronizing User Stores to SAM SAM manages and maintains OTP token information in its data store, including the token status and the token assignment to users. For user information, SAM can be integrated with an external user store. During the design process, it is important to identify which user store the organization is using, such as Microsoft Active Directory. If the organization is not using an external user store, SAM uses an internal ( stand-alone ) user store created and maintained by the SAM server. 8

SAM 8.2 supports the following external user stores: Microsoft Active Directory 2003, 2008, 2008 R2, 2012, and 2012 R2 Novell edirectory Microsoft ADAM/AD LDS OpenLDAP Microsoft SQL Server 2005 and 2008 IBM Lotus Domino IBM Tivoli Directory Server Assigning a Token in SAM SAM supports a number of OTP authentication methods that can be used as a second authentication factor for users authenticating through Okta. The following tokens are supported: etoken PASS SafeNet GOLD SafeNet etoken 3400 SafeNet etoken 3500 etoken NG-OTP MobilePASS SafeNet etoken Virtual products MobilePASS Messaging SafeNet Mobile Authentication (ios) Tokens can be assigned to users as follows: SAM Management Center Management site used by SAM administrators and help desk personnel for token enrollment and lifecycle management. SAM Self-Service Center Self-service site used by end users for managing their tokens. SAM Remote Service Self-service site used by employees not on the organization s premises as a rescue website to manage cases where tokens are lost or passwords are forgotten. For more information on SafeNet s tokens and service portals, refer to the SafeNet Authentication Manager 8.2 Administrator s Guide. Configuring SAM as an Identity Provider To use Okta as a service provider and SAM as an identity provider, the SAM must be configured as an identity provider. 1. From the Windows Start menu, click All Programs > SafeNet > SafeNet Authentication Manager > Configuration Manager. 9

(The screen image above is from Microsoft. Trademarks are the property of their respective owners.) 2. Click the Action tab, and then select Cloud Configuration. 3. Click the Info for Service Provider tab. 10

4. Fill in the web address of the SAM portal server in the Domain URL field. The remaining fields are generated according to the Domain URL that was entered. 5. Click OK. 11

Exporting the SAM Certificate The SAM certificate is shared between SAM and Okta. The certificate will be used to sign the authentication requests. 1. From the Windows Start menu, click All Programs > SafeNet > SafeNet Authentication Manager > Configuration Manager. (The screen image above is from Microsoft. Trademarks are the property of their respective owners.) 2. On the SafeNet Authentication Manager Configuration Manager window, click the Action tab, and the select Cloud Configuration. 12

3. On the Cloud Settings window, click the Info for Service Provider tab, click Export Certificate, and then save the certificate file. This certificate file will be imported into AD FS in a later step. (The screen image above is from Microsoft. Trademarks are the property of their respective owners.) Adding Okta as a Service Provider in the Token Policy Object SafeNet Authentication Manager s Token Policy Object (TPO) policies include Application Authentication Settings for SAML service providers. These settings are used by SAM s portal to communicate with service providers. For general portal configuration, refer to the SafeNet Authentication Manager 8.2 Administrator s Guide. To edit the Token Policy Object for SAM s portal configuration: 1. Open the Token Policy Object Editor for the appropriate group. See the SafeNet Authentication Manager 8.2 Administrator s Guide for more information. 2. On the Token Policy Object Editor window, expand Protected Application Settings, and then click User Authentication. (The screen image above is from Microsoft. Trademarks are the property of their respective owners.) 13

3. In the right pane, double-click Application Authentication Settings. 4. On the Application Authentication Settings window, perform the following steps: a. Select Define this policy setting. b. Select Enabled. c. Click Definitions. (The screen image above is from Microsoft. Trademarks are the property of their respective owners.) 5. On the Application Authentication Settings window, right-click Application Authentication Settings, and then click Create a new profile. (The screen image above is from Microsoft. Trademarks are the property of their respective owners.) 6. Right-click the new profile and rename it to a friendly name (for example, Okta). 7. Click the new profile (for example, Okta). 14

(The screen image above is from Microsoft. Trademarks are the property of their respective owners.) 8. Double-click on each of the following policies, and then enter the appropriate information: Application Issuer From step 6 of Configuring Okta on page 6, copy the value of Audience URI and paste it in this field. Example: https://www.okta.com/saml2/serviceprovider/spien604gspsj7ndb0y6 SAM issuer Enter a unique SAM ID to be identified in SAML authentication. Application s login URL From step 6 of Configuring Okta on page 6, copy the value of Assertion Consumer Service and paste it in this field. Example: https://gemaltonoida.okta.com/auth/saml20/gemalto Audience URI From step 6 of Configuring Okta on page 6, copy the value of Audience URI and paste it in this field. Example: https://www.okta.com/saml2/serviceprovider/spien604gspsj7ndb0y6 User mapping Select the field name in your user repository that identifies your Okta login name; for example, email. 15

9. Enable the appropriate authentication methods for your organization. Refer to the SafeNet Authentication Manager Version 8.2 Administrator s Guide for detailed information on authentication methods. The following is an example of the completed fields in the Application Authentication Settings window: (The screen image above is from Microsoft. Trademarks are the property of their respective owners.) 10. Click OK until all of the Token Policy Object Editor windows are closed. 16

Running the Solution For this integration, the SafeNet etoken PASS token is configured for authentication with the SAM solution. 1. Open the web browser and enter the Okta URL. (For example, https://gemaltonoida.okta.com.) You are redirected to the SAM Login page. 2. In the Username field, enter your user name, and then click OK. 3. The OTP Authentication page is displayed. Generate an OTP using the SafeNet token. 4. In the OTP Authentication Code field, enter the generated OTP, and then click OK. 17

After successful authentication, the, the user is logged in. (The screen image above is from Okta. Trademarks are the property of their respective owners.) Support Contacts If you encounter a problem while installing, registering, or operating this product, please make sure that you have read the documentation. If you cannot resolve the issue, contact your supplier or SafeNet Customer Support. SafeNet Customer Support operates 24 hours a day, 7 days a week. Your level of access to this service is governed by the support plan arrangements made between SafeNet and your organization. Please consult this support plan for further information about your entitlements, including the hours when telephone support is available to you. Contact Method Address Contact Information SafeNet, Inc. 4690 Millennium Drive Belcamp, Maryland 21017 USA Phone United States 1-800-545-6608 International 1-410-931-7520 Technical Support Customer Portal https://serviceportal.safenet-inc.com Existing customers with a Technical Support Customer Portal account can log in to manage incidents, get the latest software upgrades, and access the SafeNet Knowledge Base. 18