About This Document 3. Overview 3. System Requirements 3. Installation & Setup 4

Similar documents
Overview 4. System Requirements 4

Table of Contents. The Keeper Vault

RECOMMENDED DEPLOYMENT PRACTICES. The F5 and Okta Solution for High Security SSO

Add OKTA as an Identity Provider in EAA

Integrating VMware Workspace ONE with Okta. VMware Workspace ONE

Okta Integration Guide for Web Access Management with F5 BIG-IP

IMPLEMENTING SINGLE SIGN-ON (SSO) TO KERBEROS CONSTRAINED DELEGATION AND HEADER-BASED APPS. VMware Identity Manager.

OneLogin SCIM. Table of Contents. Summary... 2 System Requirements... 2 Installation & Setup... 2 Contact Us... 6

All about SAML End-to-end Tableau and OKTA integration

O365 Solutions. Three Phase Approach. Page 1 34

ComponentSpace SAML v2.0 Okta Integration Guide

RSA SecurID Access SAML Configuration for Datadog

VMware Workspace ONE Quick Configuration Guide. VMware AirWatch 9.1

MyWorkDrive SAML v2.0 Okta Integration Guide

Google SAML Integration with ETV

Configuring Single Sign-on from the VMware Identity Manager Service to Marketo

Enabling Single Sign-On Using Microsoft Azure Active Directory in Axon Data Governance 5.2

VMWARE HORIZON CLOUD WITH VMWARE IDENTITY MANAGER QUICK START GUIDE WHITE PAPER MARCH 2018

SAML 2.0 SSO. Set up SAML 2.0 SSO. SAML 2.0 Terminology. Prerequisites

Android Mobile Single Sign-On to VMware Workspace ONE. SEP 2018 VMware Workspace ONE VMware Identity Manager VMware Identity Manager 3.

Setting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1

Integrating the YuJa Enterprise Video Platform with Dell Cloud Access Manager (SAML)

CONFIGURING AD FS AS A THIRD-PARTY IDP IN VMWARE IDENTITY MANAGER: VMWARE WORKSPACE ONE OPERATIONAL TUTORIAL VMware Workspace ONE

Configuration Guide - Single-Sign On for OneDesk

Introduction... 5 Configuring Single Sign-On... 7 Prerequisites for Configuring Single Sign-On... 7 Installing Oracle HTTP Server...

Unified Contact Center Enterprise (UCCE) Single Sign On (SSO) Certificates and Configuration

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Better MDM

VMware AirWatch - Workspace ONE, Single Sign-on and VMware Identity Manager

Five9 Plus Adapter for Agent Desktop Toolkit

Cloud Secure Integration with ADFS. Deployment Guide

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.

Centrify for Dropbox Deployment Guide

APM Proxy with Workspace One

Quick Connection Guide

REVIEWERS GUIDE NOVEMBER 2017 REVIEWER S GUIDE FOR CLOUD-BASED VMWARE WORKSPACE ONE: MOBILE SINGLE SIGN-ON. VMware Workspace ONE

INTEGRATING OKTA: VMWARE WORKSPACE ONE OPERATIONAL TUTORIAL VMware Workspace ONE

Integrating YuJa Active Learning into Google Apps via SAML

Udemy for Business SSO. Single Sign-On (SSO) capability for the UFB portal

Security Guide Zoom Video Communications Inc.

Security Provider Integration SAML Single Sign-On

VMware Identity Manager Cloud Deployment. Modified on 01 OCT 2017 VMware Identity Manager

VMware Identity Manager Administration. MAY 2018 VMware Identity Manager 3.2

Citrix Federated Authentication Service Integration with APM

McAfee Cloud Identity Manager

Configuring Alfresco Cloud with ADFS 3.0

Security Provider Integration: SAML Single Sign-On

Administering Jive Mobile Apps

Introduction to application management

User Guide. Admin Guide. r

Setting Up Resources in VMware Identity Manager. VMware Identity Manager 2.8

Office 365. Exporting and Importing Safe and Blocked Senders List

Contents Introduction... 5 Configuring Single Sign-On... 7 Configuring Identity Federation Using SAML 2.0 Authentication... 29

RSA SecurID Ready Implementation Guide. Last Modified: December 13, 2013

Colligo Console. Administrator Guide

VMware Identity Manager Administration

Administering Jive Mobile Apps for ios and Android

Qualys SAML 2.0 Single Sign-On (SSO) Technical Brief

Setting Up Resources in VMware Identity Manager

VMware Identity Manager Cloud Deployment. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager

Qualys SAML & Microsoft Active Directory Federation Services Integration

Google SAML Integration

Enhancing cloud applications by using external authentication services. 2015, 2016 IBM Corporation

AirWatch Mobile Device Management

McAfee Cloud Identity Manager

An Introduction to Box.com

Integrating AirWatch and VMware Identity Manager

AppController :21:56 UTC Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement

Community Manager Guide: Jive Jabber Add-on

Enabling Single Sign-On Using Okta in Axon Data Governance 5.4

ARCHITECTURAL OVERVIEW REVISED 6 NOVEMBER 2018

Oracle Access Manager Configuration Guide

SAML-Based SSO Solution

IBM Single Sign On for Bluemix Version December Identity Bridge Configuration topics

Single Sign-On for PCF. User's Guide

Cloud Access Manager How to Configure for SSO to SAP NetWeaver using SAML 2.0

Guide to Deploying VMware Workspace ONE with VMware Identity Manager. SEP 2018 VMware Workspace ONE

McAfee Cloud Identity Manager

OneLogin Integration User Guide

Setting Up Resources in VMware Identity Manager (SaaS) Modified 15 SEP 2017 VMware Identity Manager

Introduction Secure Message Center (Webmail, Mobile & Visually Impaired) Webmail... 2 Mobile & Tablet... 4 Visually Impaired...

Google Auto User Provisioning

SecureAuth IdP Realm Guide

Table of Contents HOL-1757-MBL-6

Setting Up the Server

ArcGIS Enterprise Administration

SAML-Based SSO Configuration

VMware Identity Manager Connector Installation and Configuration (Legacy Mode)

Hypersocket SSO. Lee Painter HYPERSOCKET LIMITED Unit 1, Vision Business Centre, Firth Way, Nottingham, NG6 8GF, United Kingdom. Getting Started Guide

Guide to Deploying VMware Workspace ONE. VMware Identity Manager VMware AirWatch 9.1

F5 BIG-IP Access Policy Manager: SAML IDP

CLI users are not listed on the Cisco Prime Collaboration User Management page.

Install and Configure the F5 Identity Provider (IdP) for Cisco Identity Service (IdS) to enable SSO

McAfee Cloud Identity Manager

1Y Citrix. Designing Deploying and Managing Citrix XenMobile 10 Enterprise Solutions

Administering Workspace ONE in VMware Identity Manager Services with AirWatch. VMware AirWatch 9.1.1

VMware AirWatch Integration with RSA PKI Guide

SAML-Based SSO Solution

Okta SAML Authentication with WatchGuard Access Portal. Integration Guide

Deploying VMware Identity Manager in the DMZ. JULY 2018 VMware Identity Manager 3.2

RECOMMENDED DEPLOYMENT PRACTICES. The F5 and Okta Solution for Web Access Management with Multifactor Authentication

Transcription:

About This Document 3 Overview 3 System Requirements 3 Installation & Setup 4 Step By Step Instructions 5 1. Login to Admin Console 6 2. Show Node Structure 7 3. Create SSO Node 8 4. Create SAML IdP 10 5. Install Keeper SSO Connect 12 6. Login to Keeper SSO Connect 13 7. Extract F5 BIG-IP APM Metadata 17 8. Import F5 BIG-IP APM Metadata into Keeper SSO Connect 18 9. Import Keeper SSO Connect metadata into F5 BIG-IP APM 21 10. Bind the Keeper External SAML SP Connector to the Local IdP Service 24 11. Configure the matching SAML Attributes between F5 BIG-IP APM and Keeper 25 Logging and Monitoring 27 Logging into the Keeper Vault 29 1. Service Provider-Initiated Login 29 2. Keeper-initiated Login 29 3. End-user Activation Email 33 Technical Support 34

About This Document This guide provides setup instructions for Keeper SSO Connect on the F5 BIG-IP Access Policy Manager (BIG-IP APM ). Overview Keeper SSO Connect is a SAML 2.0 and OpenID Connect application which leverages Keeper s zero-knowledge security architecture to securely and seamlessly authenticate users into their Keeper Vault and dynamically provision users to the platform. Keeper SSO Connect works with popular SSO IdP platforms such as Okta, OneLogin, Ping Identity, F5 BIG-IP APM, G Suite and Microsoft ADFS / Azure to provide businesses the utmost in authentication flexibility. Keeper SSO Connect is a software application that is installed on the enterprise customer's on-premise, private or cloud servers. Users encryption keys are generated dynamically by Keeper SSO Connect, encrypted and stored locally on the installed server, providing the customer with full control over the encryption keys that are used to encrypt and decrypt their digital vaults. The Keeper SSO Connect service application can be installed on a private on-premise or cloud-based server. Windows, Mac OS and Linux operating systems are supported. System Requirements Keeper SSO Connect's service application requires installation on a private on-premises or cloud-based server with the below minimum requirements. - Mac OS 10.7+ - Windows 7+ - Linux OS with Java 8

Installation & Setup The steps for setting up Keeper SSO Connect are below: 1. Enable SSO Connect on a node from the Keeper Admin Console 2. Install Keeper SSO Connect on your server (supports Windows, Mac, Unix/Linux) 3. Configure Keeper as a service provider on F5 BIG-IP APM

Step By Step Instructions The below flowchart illustrates the setup flow.

1. Login to Admin Console Visit the Keeper Admin Console at https://keepersecurity.com/console and login as the Keeper administrator.

2. Show Node Structure SSO integration is applied to specific nodes (e.g. organizational units) within your Admin Console. To display the node structure, click on "Advanced Configuration" then "Show Node Structure".

3. Create SSO Node Click on the "+" button to create a new node which will host the Keeper SSO Connect integration. The node can be anywhere in your organizational structure. In the below example, the node is called "SSO" and added beneath the root node. Click "Create" then select the node. Click on the "Bridge" tab and then click on the "+ SSO Connection" link.

SSO Connection Node Each SSO Connection can be associated with a node. Therefore, your organization is able to create multiple SSO connections assigned to different nodes. To move an existing SSO Connection to a different node, click on the pencil icon. Dynamic User Provisioning Users can be dynamically provisioned to your Keeper Business account upon first successful authentication on SSO. For the best user experience, we recommend selecting this option. You can also manually invite users through the Admin Console "Users" tab, or invite users via the Keeper Bridge. Enterprise Domain Every SSO Connection must be uniquely identified through the use of a supplied "Enterprise Domain" alias. This alias should be named something that is easy for your users to remember because they may need to type the name into their mobile and apps (ios, Android, Mac, Windows) upon first logging into a new device.

4. Create SAML IdP On the F5 BIG-IP APM, configure a new SAML IdP service for your Keeper platform: Go to Access Policy -> SAML -> BIG-IP as IdP -> Local IdP Services

Once configured, the next step is to configure SSO Connect.

5. Install Keeper SSO Connect Next, click on the "Download the Keeper SSO Connect" link on the "Bridge" tab in the Keeper Admin Console to download the application. You can select Mac OS or Windows platforms.

6. Login to Keeper SSO Connect After installation, login to Keeper SSO Connect with your Keeper Administrator email address and master password.

If you use a proxy server in your environment, click on the gear icon and select the proxy type and/or authentication.

The first time logging in, you will be prompted to select the SSO node from the admin console:

After selecting the SSO Connect endpoint, you will be taken to the Keeper SSO Connect configuration page: By default, the Server Base URL is automatically assigned. It will default to the local IP address of the computer, with port 8443. If users will be accessing Keeper SSO Connect from outside of your internal network, the URL must be publicly accessible, and the port number must pass through your firewall to the service.

7. Extract F5 BIG-IP APM Metadata Navigate to: Access Policy > SAML : BIG-IP as IdP - Local IdP Services. Select your applicable IdP connection point and "Export Metadata". Upload this file to the server where Keeper SSO Connect is installed. We'll need it in the next step.

8. Import F5 BIG-IP APM Metadata into Keeper SSO Connect A. Ensure the local Keeper SSO Connect configuration has been completed (Server Base URL and SSL Certificate imported).

B. Import the Metadata file extracted from F5 BIG-IP APM C. Click "Save" to save the configuration and verify all settings look correct. D. Export the Keeper SSO Connect Metadata file for configuration of F5 BIG-IP APM from the Export Metadata link.

Retain this file for upload to F5 BIG-IP APM in the next step.

9. Import Keeper SSO Connect metadata into F5 BIG-IP APM A. On F5 BIG-IP APM, navigate to Access Policy -> SAML : BIG-IP as IdP -> External SP Connectors B. Select "From Metadata" from the Create dropdown menu C. Browse to the Keeper SSO Connect Metadata file as exported in Step 8 above and enter a Service Provider Name.

D. Click "OK" E. Verify the SAML SP Connector Settings and adjust as needed.

10. Bind the Keeper External SAML SP Connector to the Local IdP Service A. In Access Policy -> SAML : BIG-IP as IdP -> Local IdP Services tab, select the IdP service B. Select "Bind/Unbind SP Connectors" C. Select the configured SAML SP Connector for Keeper

11. Configure the matching SAML Attributes between F5 BIG-IP APM and Keeper Keeper needs 3 attributes to be configured: Email, First Name, and Last Name. The attribute names must be spelled exactly as it appears below: Attribute Name * First Last Email Description The user's first name The user's last name Email address * The attribute name must be spelled exactly as it appears. A. In Access Policy -> SAML : BIG-IP as IdP -> Local IdP Services tab, select the IdP service. B. Select " Edit " and then " SAML Attributes " section C. Configure and verify that the SAML Attributes on F5 BIG-IP APM match the " SAML User Attributes " in Keeper SSO Connect.

IMPORTANT: The attribute names are case sensitive and must match exactly.

Logging and Monitoring The Keeper SSO Connect "Incident Log" screen contains all activity, such as new account creation and errors. This screen is helpful in the initial deployment and testing, to ensure that all system functions are performing optimally.

The Keeper SSO Connect application runs as a service. Closing out the user interface does not stop the service. To fully stop the service, exit the application from the system tray. Windows: Mac OS:

Logging into the Keeper Vault 1. Service Provider-Initiated Login Users can login to their Keeper Web Vault using a special URL. On the Keeper SSO Connect configuration screen you'll see the " Service Provider Login URL " field: This URL can be provided to your users as a shortcut to logging into Keeper from their desktop web browser. When opening this link in your web browser, you will be routed to F5 BIG-IP APM for authentication, then immediately logged into the Keeper Web Vault. This method only works on web browsers, for accessing the Keeper Web Vault and browser fill functionality. To access Keeper on native mobile and desktop devices, users can make use of Keeper-initiated login as described in the next section. 2. Keeper-initiated Login Keeper supports logging in directly from the Keeper Web App, Desktop App and Mobile Apps. To do this, your users will need to know their " Enterprise Domain " that you have set up in the Keeper Admin Console, as described in section 3 above.

For example, from the Web App, visit https://keepersecurity.com/vault Click on "Enterprise SSO Login"

Then enter the Enterprise Domain as provided by the Keeper Administrator, then click "Connect". The user will be routed to the IdP to authenticate, then logged into their Keeper vault.

Mobile app users can use the same flow by selecting "Enterprise SSO Login" during signup.

3. End-user Activation Email After a user has been provisioned on Keeper SSO Connect (by logging into the Identity Provider via the Service Provider Login URL as described above), they will receive an email that contains helpful information such as: - Enterprise Domain - Download Links - Support / Training Help Below is a sample email:

Technical Support If you have any questions or require assistance in configuring this identity provider, please contact the Keeper Business Support team at: business.support@keepersecurity.com