Install and Configure the F5 Identity Provider (IdP) for Cisco Identity Service (IdS) to enable SSO

Similar documents
Configure the Identity Provider for Cisco Identity Service to enable SSO

RECOMMENDED DEPLOYMENT PRACTICES. The F5 and Okta Solution for High Security SSO

SAML-Based SSO Solution

CLI users are not listed on the Cisco Prime Collaboration User Management page.

Unified Contact Center Enterprise (UCCE) Single Sign On (SSO) Certificates and Configuration

About This Document 3. Overview 3. System Requirements 3. Installation & Setup 4

BIG-IP Access Policy Manager (APM) v11.2 Table of Contents

CLI users are not listed on the Cisco Prime Collaboration User Management page.

Configuration Guide - Single-Sign On for OneDesk

F5 BIG-IP Access Policy Manager: SAML IDP

BIG-IP Access Policy Manager : Authentication and Single Sign-On. Version 13.1

This section includes troubleshooting topics about single sign-on (SSO) issues.

SAML-Based SSO Configuration

Quick Start Guide for SAML SSO Access

SAML-Based SSO Solution

SAML-Based SSO Configuration

All about SAML End-to-end Tableau and OKTA integration

Manage SAML Single Sign-On

Single Sign-On. Non-SSO - Continue to use existing Active Directory-based and local authentication, without SSO.

Okta Integration Guide for Web Access Management with F5 BIG-IP

Unified Communications Manager Version 10.5 SAML SSO Configuration Example

Quick Start Guide for SAML SSO Access

Unity Connection Version 10.5 SAML SSO Configuration Example

SafeNet Authentication Manager

Setting Up the Server

INTEGRATING OKTA: VMWARE WORKSPACE ONE OPERATIONAL TUTORIAL VMware Workspace ONE

Enabling Single Sign-On Using Microsoft Azure Active Directory in Axon Data Governance 5.2

Citrix Federated Authentication Service Integration with APM

Integration Guide. PingFederate SAML Integration Guide (SP-Initiated Workflow)

IMPLEMENTING SINGLE SIGN-ON (SSO) TO KERBEROS CONSTRAINED DELEGATION AND HEADER-BASED APPS. VMware Identity Manager.

Quick Connection Guide

CONFIGURING AD FS AS A THIRD-PARTY IDP IN VMWARE IDENTITY MANAGER: VMWARE WORKSPACE ONE OPERATIONAL TUTORIAL VMware Workspace ONE

SAML 2.0 SSO. Set up SAML 2.0 SSO. SAML 2.0 Terminology. Prerequisites

Add OKTA as an Identity Provider in EAA

Configuring Confluence

1Y Citrix. Designing Deploying and Managing Citrix XenMobile 10 Enterprise Solutions

Configuring Alfresco Cloud with ADFS 3.0

Upgrade from a Standalone Deployment to a Coresident Deployment (Cisco Unified Intelligence Center with Live Data and IdS)

akkadian Provisioning Manager Express

AppController :21:56 UTC Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement

Configure Per-User Dynamic Access Control Lists in ISE

SAML Authentication with Pulse Connect Secure and Pulse Secure Virtual Traffic Manager

Integrating VMware Workspace ONE with Okta. VMware Workspace ONE

RSA SecurID Ready Implementation Guide. Last Modified: December 13, 2013

SAML SSO Deployment Guide for Cisco Unified Communications Applications, Release 12.0(1)

O365 Solutions. Three Phase Approach. Page 1 34

CA SiteMinder. Federation Manager Guide: Legacy Federation. r12.5

CA CloudMinder. SSO Partnership Federation Guide 1.51

CA SiteMinder Federation

Introduction... 5 Configuring Single Sign-On... 7 Prerequisites for Configuring Single Sign-On... 7 Installing Oracle HTTP Server...

Zendesk Connector. Version 2.0. User Guide

Configure Single Sign-On using CUCM and AD FS 2.0 (Windows Server 2008 R2)

Getting Started & Deployment Best Practices

Using Your Own Authentication System with ArcGIS Online. Cameron Kroeker and Gary Lee

Integration Documentation. Automated User Provisioning Common Logon, Single Sign On or Federated Identity Local File Repository Space Pinger

Setting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1

Configuring Single Sign-on from the VMware Identity Manager Service to Marketo

CA SiteMinder. Federation Manager Guide: Partnership Federation. r12.5

VMware Workspace ONE Quick Configuration Guide. VMware AirWatch 9.1

REVIEWERS GUIDE NOVEMBER 2017 REVIEWER S GUIDE FOR CLOUD-BASED VMWARE WORKSPACE ONE: MOBILE SINGLE SIGN-ON. VMware Workspace ONE

VMWARE HORIZON CLOUD WITH VMWARE IDENTITY MANAGER QUICK START GUIDE WHITE PAPER MARCH 2018

April Understanding Federated Single Sign-On (SSO) Process

Quick Connection Guide

ForgeRock Access Management Core Concepts AM-400 Course Description. Revision B

Single Sign-On for PCF. User's Guide

Small Contact Center Agent Deployment Model

Identity Provider for SAP Single Sign-On and SAP Identity Management

Advanced Configuration for SAML Authentication

Contents Introduction... 5 Configuring Single Sign-On... 7 Configuring Identity Federation Using SAML 2.0 Authentication... 29

VMware Identity Manager Administration. MAY 2018 VMware Identity Manager 3.2

Cloud Secure Integration with ADFS. Deployment Guide

RSA SecurID Access SAML Configuration for Datadog

The information in this document is based on these software and hardware versions:

CA CloudMinder. SSO Partnership Federation Guide 1.53

Integrating the YuJa Enterprise Video Platform with Dell Cloud Access Manager (SAML)

Oracle Access Manager Configuration Guide

CA SiteMinder Federation

VMware Identity Manager Administration

COURSE OUTLINE MOC : PLANNING AND ADMINISTERING SHAREPOINT 2016

PingOne. How to Set Up a PingFederate Connection to the PingOne Dock. Quick Start Guides. Version 1.1 December Created by: Ping Identity Support

Cisco Unified Intelligence Center for Advanced Users v1.1 (CUICAU)

Setting Up Resources in VMware Identity Manager. VMware Identity Manager 2.8

Przejmij kontrolę nad użytkownikiem, czyli unifikacja dostępu do aplikacji w zróżnicowanym środowisku

Configuring and Delivering Salesforce as a managed application to XenMobile Users with NetScaler as the SAML IDP (Identity Provider)

Setting Up Resources in VMware Identity Manager (SaaS) Modified 15 SEP 2017 VMware Identity Manager

Morningstar ByAllAccounts SAML Connectivity Guide

Integrating Cisco Enterprise Chat & with UCCE (ICCE)

Microsoft ADFS Configuration

Course : Planning and Administering SharePoint 2016

Setting Up Resources in VMware Identity Manager

Introduction to application management

This topic discusses what's required of SAML IdPs in general and provides a step-by-step procedure for setting up a OneLogin IdP.

MyWorkDrive SAML v2.0 Azure AD Integration Guide

Integrating YuJa Active Learning into ADFS via SAML

Troubleshoot CVP Call Server Problems

Configuring the BIG-IP APM as a SAML 2.0 Identity Provider for Microsoft Office 365

IBM Domino WEB Federated Login

Box Connector. Version 2.0. User Guide

Monitor System Status

A: PLANNING AND ADMINISTERING SHAREPOINT 2016

Transcription:

Install and Configure the F5 Identity Provider (IdP) for Cisco Identity Service (IdS) to enable SSO Contents Introduction Prerequisites Requirements Components Used Install Configure Security Assertion Markup Language (SAML) creation SAML Resources Webtops Virtual Policy Editor Service Provider (SP) Metadata Exchange Verify Troubleshoot Common Access Card (CAC) Authentication Failure Related Information Introduction This document describes the configuration on the F5 BIG-IP Identity Provider (IdP) to enable Single Sign On (SSO). Cisco IdS Deployment Models Product Deployment UCCX Co-resident PCCE Co-resident with CUIC (Cisco Unified Intelligence Center) and LD (Live Data) UCCE Co-resident with CUIC and LD for 2k deployments. Standalone for 4k and 12k deployments. Prerequisites Requirements Cisco recommends that you have knowledge of these topics: Cisco Unified Contact Center Express (UCCX) Release 11.6 or Cisco Unified Contact Center Enterprise Release 11.6 or Packaged Contact Center Enterprise (PCCE) Release 11.6 as applicable.

Note: This document references the configuration with respect to the Cisco Identitify Service (IdS) and the Identity Provider (IdP). The document references UCCX in the screenshots and examples, however the configuration is similar with respect to the Cisco Identitify Service (UCCX/UCCE/PCCE) and the IdP. Components Used This document is not restricted to specific software and hardware versions. The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, ensure that you understand the potential impact of any command. Install Big-IP is a packaged solution that has multiple features. Access Policy Manager (APM) which corelates to the Identity Provider service. Big-IP as APM: Version 13.0 Type Virtual Edition(OVA) IPs Two IPs in different subnets. One for the management IP and one for the IdP virtual server Download the virtual edition image from Big-IP website and deploy the OVA to create a Virtual Machine (VM) that is pre-installed. Obtain the license and install with the basic requirements. Note: For installation information, refer to Big-IP Installation guide. Configure Navigate to resource provisioning and enable Access Policy, set provisioning to Nominal

Create a new VLAN under Network -> VLANs Create a new entry for the IP which is used for the IdP under Network -> Self IPs

Create a profile under Access -> Profile/Policies -> Access profiles

Create a virtual server

Add Active Directory (AD) details under Access -> Authentication -> Active Directory

Create a new IdP service under Access -> Federation -> SAML Identity Provider -> Local IdP Services

Note: If a Common Access Card (CAC) is used for authentication, these attributes need to be added in the SAML Attributes configuration section: Step 1. Create the uid attribute. Name: uid Value: %{session.ldap.last.attr.samaccountname} Step 2. Create the user_principal attribute. Name: user_principal Value: %{session.ldap.last.attr.userprincipalname}

Note: Once the IdP service is created, there is an option to download the metadata with a button Export Metadata under Access -> Federation -> SAML Identity Provider -> Local IdP Services Security Assertion Markup Language (SAML) creation SAML Resources Navigate to Access -> Federation -> SAML Resources and create a saml resource to associate with the IdP service that was created earlier

Webtops Create a webtop under Access -> Webtops

Virtual Policy Editor Navigate to the policy created earlier and click on edit link

The virtual policy editor opens Click on the icon and add elements as described Step 1. Logon page element - Leave all elements to default. Step 2. AD Auth -> Choose the ADFS configuration created earlier.

Step 3. AD Query element - Assign the necessary details.

Step 4. Advance Resource Assign - Associate the saml resource and the webtop created earlier.

Service Provider (SP) Metadata Exchange Manually import the certificate of the IdS to Big-IP through System -> Certificate Management -> Traffic Management Note: Ensure that the certificate consists of BEGIN CERTIFICATE and END CERTIFICATE tags.

Create a new entry from sp.xml under Access -> Federation -> SAML Identity Provider -> External SP Connectors Bind the SP connector to the IdP service under Access -> Federation -> SAML Identity Provider -> Local IdP Services Verify There is currently no verification procedure available for this configuration. Troubleshoot Common Access Card (CAC) Authentication Failure If SSO authentication fails for CAC users, check the UCCX ids.log to verify the SAML Attributes were set properly.

If there is a configuration issue, a SAML failure occurs. For example, in this log snippet, the user_principal SAML attribute is not configured on the IdP. YYYY-MM-DD hh:mm:ss.sss GMT(-0000) [IdSEndPoints-SAML-59] ERROR com.cisco.ccbu.ids IdSSAMLAsyncServlet.java:465 - Could not retrieve from attributes map: user_principal YYYY-MM-DD hh:mm:ss.sss GMT(-0000) [IdSEndPoints-SAML-59] ERROR com.cisco.ccbu.ids IdSSAMLAsyncServlet.java:298 - SAML response processing failed with exception com.sun.identity.saml.common.samlexception: Could not retrieve user_principal from saml response at com.cisco.ccbu.ids.auth.api.idssamlasyncservlet.getattributefromattributesmap(idssamlasyncservlet.java:4 66) at com.cisco.ccbu.ids.auth.api.idssamlasyncservlet.processsamlpostresponse(idssamlasyncservlet.java:263 ) at com.cisco.ccbu.ids.auth.api.idssamlasyncservlet.processidsendpointrequest(idssamlasyncservlet.java:17 6) at com.cisco.ccbu.ids.auth.api.idsendpoint$1.run(idsendpoint.java:269) at java.util.concurrent.threadpoolexecutor.runworker(threadpoolexecutor.java:1145) at java.util.concurrent.threadpoolexecutor$worker.run(threadpoolexecutor.java:615) at java.lang.thread.run(thread.java:745) Related Information Technical Support & Documentation - Cisco Systems