RSA SecurID Access SAML Configuration for Kanban Tool

Similar documents
RSA SecurID Access SAML Configuration for Datadog

RSA SecurID Access SAML Configuration for StatusPage

RSA SecurID Access SAML Configuration for Samanage

RSA SecurID Access WS-Fed Configuration for Microsoft SharePoint

Configuring Single Sign-on from the VMware Identity Manager Service to Marketo

Add OKTA as an Identity Provider in EAA

<Partner Name> <Partner Product> RSA SECURID ACCESS Implementation Guide. Cisco Adaptive Security Appliance 9.5(2)

<Partner Name> <Partner Product> RSA SECURID ACCESS Implementation Guide. Pulse Connect Secure 8.x

RSA SecurID Access SAML Configuration for Brainshark

Configuring Single Sign-on from the VMware Identity Manager Service to Bonusly

Configuring Alfresco Cloud with ADFS 3.0

SafeNet Authentication Manager

Google SAML Integration with ETV

Integrating the YuJa Enterprise Video Platform with Dell Cloud Access Manager (SAML)

Configuring Confluence

Security Provider Integration SAML Single Sign-On

RSA SecurID Access SAML Configuration for Microsoft Office 365

Security Provider Integration: SAML Single Sign-On

Integrating YuJa Active Learning into Google Apps via SAML

Configuring Single Sign-on from the VMware Identity Manager Service to Trumba

<Partner Name> <Partner Product> RSA SECURID ACCESS Implementation Guide. Citrix NetScaler Gateway 12.0

SAML 2.0 SSO. Set up SAML 2.0 SSO. SAML 2.0 Terminology. Prerequisites

RECOMMENDED DEPLOYMENT PRACTICES. The F5 and Okta Solution for High Security SSO

Setting Up Resources in VMware Identity Manager (SaaS) Modified 15 SEP 2017 VMware Identity Manager

ComponentSpace SAML v2.0 Okta Integration Guide

Configuring Single Sign-on from the VMware Identity Manager Service to Exterro E-Discovery

Security Provider Integration SAML Single Sign-On

Configuration Guide - Single-Sign On for OneDesk

Welcome to Oracle Service Cloud Ask the Experts

Introduction to application management

SAML-Based SSO Configuration

MyWorkDrive SAML v2.0 Okta Integration Guide

INTEGRATING OKTA: VMWARE WORKSPACE ONE OPERATIONAL TUTORIAL VMware Workspace ONE

Google SAML Integration

<Partner Name> <Partner Product> RSA SECURID ACCESS Implementation Guide. PingIdentity PingFederate 8

Configuring ServiceNow

Setting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1

Integrating YuJa Active Learning into ADFS via SAML

Integrating VMware Workspace ONE with Okta. VMware Workspace ONE

RSA SecurID Ready Implementation Guide. Last Modified: December 13, 2013

Administering Workspace ONE in VMware Identity Manager Services with AirWatch. VMware AirWatch 9.1.1

Configuring Single Sign-on from the VMware Identity Manager Service to Vizru

Upland Qvidian Proposal Automation Single Sign-on Administrator's Guide

How to Configure Fiori Launchpad and Web Dispatcher to Support SAML2 Using SAP Identity Provider Step-by-Step

IMPLEMENTING SINGLE SIGN-ON (SSO) TO KERBEROS CONSTRAINED DELEGATION AND HEADER-BASED APPS. VMware Identity Manager.

OneLogin SAML Authentication with WatchGuard Access Portal. Integration Guide

Quick Connection Guide

Integrating the YuJa Enterprise Video Platform with ADFS (SAML)

Advanced Configuration for SAML Authentication

Okta Integration Guide for Web Access Management with F5 BIG-IP

SafeNet Authentication Manager

Morningstar ByAllAccounts SAML Connectivity Guide

Enabling Single Sign-On Using Okta in Axon Data Governance 5.4

Integrating YuJa Active Learning with ADFS (SAML)

Integration Guide. PingFederate SAML Integration Guide (SP-Initiated Workflow)

Okta SAML Authentication with WatchGuard Access Portal. Integration Guide

Configuring Single Sign-on from the VMware Identity Manager Service to Collibra

Five9 Plus Adapter for Agent Desktop Toolkit

Qualys SAML & Microsoft Active Directory Federation Services Integration

Configure Unsanctioned Device Access Control

Zendesk Connector. Version 2.0. User Guide

SAML-Based SSO Configuration

WebEx Connector. Version 2.0. User Guide

About This Document 3. Overview 3. System Requirements 3. Installation & Setup 4

Integrating AirWatch and VMware Identity Manager

This section includes troubleshooting topics about single sign-on (SSO) issues.

Contents Introduction... 5 Configuring Single Sign-On... 7 Configuring Identity Federation Using SAML 2.0 Authentication... 29

Slack Cloud App SSO. Configuration Guide. Product Release Document Revisions Published Date

Setting Up Resources in VMware Identity Manager. VMware Identity Manager 2.8

Access Manager Applications Configuration Guide. October 2016

Enabling Single Sign-On Using Microsoft Azure Active Directory in Axon Data Governance 5.2

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager

Oracle Access Manager Configuration Guide

Oracle WebLogic. Overview. Prerequisites. Baseline. Architecture. Installation. Contents

Five9 Plus Adapter for Microsoft Dynamics CRM

Setting Up Resources in VMware Identity Manager

McAfee Cloud Identity Manager

Revised: 08/02/ Click the Start button at bottom left, enter Server Manager in the search box, and select it in the list to open it.

MyWorkDrive SAML v2.0 Azure AD Integration Guide

2 Oracle WebLogic Overview Prerequisites Baseline Architecture...6

NETOP PORTAL ADFS & AZURE AD INTEGRATION

PingOne. How to Set Up a PingFederate Connection to the PingOne Dock. Quick Start Guides. Version 1.1 December Created by: Ping Identity Support

SAML-Based SSO Solution

VMware Identity Manager Administration. MAY 2018 VMware Identity Manager 3.2

Configuring and Delivering Salesforce as a managed application to XenMobile Users with NetScaler as the SAML IDP (Identity Provider)

Introduction... 5 Configuring Single Sign-On... 7 Prerequisites for Configuring Single Sign-On... 7 Installing Oracle HTTP Server...

Using Your Own Authentication System with ArcGIS Online. Cameron Kroeker and Gary Lee

Integration Documentation. Automated User Provisioning Common Logon, Single Sign On or Federated Identity Local File Repository Space Pinger

Quick Connection Guide

Single Sign-On with Sage People and Microsoft Active Directory Federation Services 2.0

Protecting SugarCRM with SafeNet Authentication Manager

Using Microsoft Azure Active Directory MFA as SAML IdP with Pulse Connect Secure. Deployment Guide

CONFIGURING AD FS AS A THIRD-PARTY IDP IN VMWARE IDENTITY MANAGER: VMWARE WORKSPACE ONE OPERATIONAL TUTORIAL VMware Workspace ONE

Five9 Plus Adapter for NetSuite

AT&T Business Messaging Account Management

Integration Guide. SafeNet Authentication Service. Protecting SugarCRM with SAS

CHAPTER. Introduction

SAML-Based SSO Solution

Setting Up the Server

Transcription:

RSA SecurID Access SAML Configuration for Kanban Tool Last Modified: October 4, 2016 Kanban Tool is a visual product management application based on the Kanban methodology (development) which was initially released by David Anderson in 2004. It aims to help people collaborate in real-time, improve performance, and visualize and optimize their workloads. Before You Begin Acquire administrator accounts for your RSA SecurID Access Identity Provider (IdP) and your Kanban Tool Service Provider (SP). Obtain your Kanban Tool Connection URL, ACS URL and SP Entity ID from your Kanban Tool administrator s account. You can find these values at the bottom of the SAML Single Sign-On configuration page. This guide uses the following Connection URL, ACS URL and SP Entity ID values: Connection URL ACS URL SP Entity ID https://pelab.kanbantool.com https://pelab.kanbantool.com/saml/complete https://pelab.kanbantool.com Procedure 1. Add the Kanban Tool Application in RSA SecurID Access 2. Configure Kanban Tool to Use RSA SecurID Access as an Identity Provider Add the Kanban Tool Application in RSA SecurID Access Procedure 1. Log in to the RSA SecurID Access Administration Console, click the Applications tab and select Application Catalog from the Application tab dropdown list. 2. Search for Kanban Tool in the list of applications and click the +Add button. 3. Enter a name for the application in the Name field on the Basic Information page and click the Next Step button.

4. Select the IdP-initiated radio button in the Initiate SAML Workflow section. Note: The following IdP-initiated configuration works for SP-initiated Kanban Tool connections as well. 5. Enter you Kanban Tool account s start page in the Connection URL field. Portal users will be redirected to this page when they click the Kanban Tool icon. The URL is formatted as follows: https://<your_domain>.kanatool.com, where <your_doamain> is your Kanban Tool account s domain name. The connection URL in this example is https://pelab.kanatool.com. 6. Scroll to SAML Identity Provider (Issuer) section, copy the value in the Identity Provider URL field and paste it into a temporary file. You will need the URL when you configure your Kanban Tool service provider. 7. You must import a private/public key pair to sign and validate SAML assertions. If you don t have one readily available, follow the steps to generate a certificate bundle. Otherwise, continue to step 8. a. Click the Generate Certificate Bundle button in the SAML Response Signature section. b. In the Common Name (CN) field, enter the hostname of the Kanban Tool service provider s HTTPS server that will be sending authentication requests. c. Click the Generate and Download button, save the certificate bundle ZIP file to a secure location and extract its contents. The ZIP file will contain a private key, a public certificate and a certificate-signing request. 8. Click the Choose File button on the left of the Generate Certificate Bundle button, locate and select a private key for signing the SAML assertions and click the Open button. 9. Click the Choose File button underneath the Generate Certificate Bundle button, locate and select your public certificate and click the Open button.

10. Select the Include Certificate in Outgoing Assertion checkbox. 11. Scroll to the Service Provider section and enter your Kanban Tool ACS URL in the Assertion Consumer Service (ACS) URL field. The URL should be formatted as follows: https://<your_domain>.kanbantool.com/saml/complete. The ACS URL in this example is https://pelab.kanbantool.com/saml/complete. 12. Enter https://<your_domian>.kanbantool.com in the Audience (Service Provider Entity ID) field. This value is case sensitive and must match your Kanban Tool Entity ID. The Entity ID in this example is https://pelab.kanbantool.com. 13. Scroll to the User Identity section, select Email Address from the Identifier Type dropdown list and select the name of your user identity source from the User Store dropdown list. In this example, user accounts are stored in an identity source named AD20. 14. From the Property dropdown list, select the identity source s attribute that will be used as the NameID. In this example, the identity source s mail attribute will be used to identify a user in SAML assertions. 15. Click the Next Step button. 16. On the User Access page, select the access policy the identity router will use to determine which users can access the Kanban Tool SP from the portal. If you want to allow access to all users who are signed in to the portal, select the Allow All Authenticated Users radio button. Otherwise, select the Select Custom Policy radio button and select the policy you want to use from the dropdown list.

17. Click the Next Step button. 18. Select the Display in Portal checkbox on the Portal Display page. 19. Enter descriptive text about the application in the Application Tooltip field. The portal will display this text when a user passes the cursor over the application s icon. 20. Click the Save and Finish button. 21. Click the Publish Changes button in the top left corner of the page.

22. Click the Applications tab and select My Applications from the dropdown list. 23. Search for Kanban Tool in the list of applications and select Export Metadata from the Edit dropdown list to download an XML file containing your RSA SecurID Access IdP s metadata.

Configure Kanban Tool to Use RSA SecurID Access as an Identity Provider Follow below steps to configure your Kanban Tool SP to use RSA SecurID Access as a SAML IdP. 1. Log in to your Kanban Tool account as an administrator. 2. Click the Account administration tab in the upper right corner of the page. 3. Click the Single Sign On link near the lower left corner of the page. 4. Check the enable SAML2 Single Sign On checkbox and enter your RSA SecurID Access Identity Provider URL in the SAML Login URL field.

5. Click the Choose File button in Security Certificate section, locate and select the public certificate file you uploaded when you configured RSA SecurID Access and click the OK button. 6. (Optional) If you want to enter your public certificate s fingerprint as well, follow the steps below: a. Open the public certificate and copy its SAH1 fingerprint value. b. Paste the value into Security Certificate Fingerprint field. 7. (Optional) If you want Kanban Tool to redirect users to a custom URL after they log out, enter the URL in the Logout URL field. 8. You can configure Kanban Tool to automatically create a Kanban account whenever it receives a SAML assertion from RSA SecurID Access for a new user. Choose the appropriate value from the How new accounts should be provisioned? dropdown list based on your requirements. Select Do not provision new accounts to disable provisioning. Select As a normal user if you want Kanban Tool to provision standard user accounts. Select As a Project manager if you want Kanban Tool to provision project manager accounts.

9. If needed, copy your account s ACS URL, connection URL and Entity ID from the table at the bottom of the page. Note: The URL in the Access/Login URL row is your account s ACS URL. The URL in the Start page row is your account s connection URL. 10. Click the Save Changes button.