Enabling encryption for SAML based SSO in AppScan Enterprise
When a user login to SP, in this case AppScan Enterprise, a request is sent to IdP for authenticating the user. You can encrypt this process of authentication and approval requests that occur between the SP and IdP by installing a self-signed certificate in the AppScan Enterprise Server.
Before you begin
- You must be an AppScan Enterprise administrator to enable encryption for SAML.
- You must have configured SAML SSO service provider in AppScan Enterprise.
About this task
This section explains about enabling encryption for SAML based SSO in AppScan Enterprise.
Procedure
- Download openssl-1.0.2j-fips-x86_64 to the computer where you have installed the AppScan Enterprise application.
- Stop the HCL Appscan Enterprise Server Service.
- Open the terminal and change the directory from root to the locate <openssl directory>\ openssl-1.0.2j-fips-x86_64\OpenSSL\bin where you have downloaded the file.
-
Run the following commands to generate a self-signed certificate and private key for the
application.
- set OPENSSL_CONF=D:\Downloads\openssl-1.0.2j-fips-x86_64\OpenSSL\bin\openssl.cnf
- openssl req -newkey rsa:2048 -x509 -keyout cakey.pem -out cacert.pem -days 3650 - This command generates the certificate value.
- openssl pkcs12 -export -in cacert.pem -inkey cakey.pem -out identity.p12 -name "<password provided during certification generation>"
- openssl pkcs8 -topk8 -inform pem -nocrypt -in cakey.pem -outform pem -out sp.pem - This command generates the sp.pem file containing the private key value.
The certificate and private key values are generated. - Convert the certificate and private key values into single line strings using the https://www.samltool.com/format_x509cert.php tool.
- Copy the converted certificate string value and the private key to a notepad.
- Go to the server where you have installed the AppScan Enterprise application.
- Navigate to the configuration files folder in the installation directory where the AppScan Enterprise software package is installed. For example: <installation directory>\AppScan Enterprise\Liberty\usr\servers\ase\config.
- Locate and open the SAML configuration properties, onelogin.saml.properties, file in a text editor.
-
Update the generated values of the custom properties value as mentioned in the following
table:
SAML property Property values to update onelogin.saml2.sp.x509cert Update the value with the generated and converted self-signed certificate value. onelogin.saml2.sp.privatekey Update with the converted private key value. onelogin.saml2.strict Set the value to true onelogin.saml2.security.nameid_encrypted Set the value to true onelogin.saml2.security.authnrequest_signed Set the value to true onelogin.saml2.security.want_assertions_signed Set the value to true onelogin.saml2.security.want_xml_validation Set the value to true - After updating the onelogin.saml.properties file, save and close the file.
- Run Configuration wizard and select the self-signed certificate that was generated to be used by the Liberty Server.
- Restart HCL Appscan Enterprise Server Service.