Configuring SAML authentication
You can configure HTTP access services such as HCL Nomad to use Security Assertion Markup Language (SAML) authentication rather than LDAP authentication or local authentication.
Before you begin
Configure the HTTP access service you will enable for SAML. For HCL Nomad instructions, see Nomad server in the Nomad administration documentation.
About this task
SAML authentication delegates user authentication to a SAML identity provider (IdP) such as Active Directory Federation Services (ADFS). When SAML is configured, users log on to an HTTP access service with their SAML IdP identities.
To configure SAML authentication for an HTTP access service, complete the following steps.
Procedure
-
(Linux only) Install SAML Service Provider support for SafeLinx. On Linux, you
can choose to install SafeLinx SAML support by selecting "y"
(yes) at the prompt Install SAML Service Provider
support? To install support for SAML after SafeLinx installation
from the installer archive, run the following command:
sudo rpm -ivh HCLSafeLinx-saml-<safelinxversion>.rpm.For example: sudo rpm -ivh HCLSafeLinx-saml-1.2.1.0.rpmNote: SAML Service Provider support is installed automatically on Windows.
-
To enable SAML, complete the following steps to start a local SAML service
provider on the SafeLinx server.
-
Modify the LDAP-bind Authentication profile:
- Open the SafeLinx Administrator and connect to the SafeLinx server.
- Select .
- Open the SafeLinx Authentication Profile used for the service your are enabling for SAML, for example HCL Nomad.
- On the LDAP page, select Disable password verification. When SAML is used, no password is provided to SafeLinx so you must disable password verification.
-
Configure SAML authentication:
-
To make the config.yml changes take effect, restart the
SAML service. To do so, stop and then restart the SafeLinx server using the
following commands:
- Windows:
wgstop
wgstart
- Linux:
sudo systemctl stop safelinx
sudo systemctl start safelinx
- Windows:
-
Create a corresponding Relying Party Trust on your IdP. The following steps
provide an example of creating a trust using ADFS 5.0:
Results
If the SAML configuration is working correctly, when a user goes to the SafeLinx service URL (the issuer value), they are challenged for their IdP credentials.