Improved SAML Authentication server configuration experience
When integrating SMA 1000 with SAML IdP like Azure/ OKTA for authenticating users, Administrators has to rely on the instructions provided by IdP about its endpoints to configure SMA. This is a challenge for Administrators to integrate popular IdPs with SMA, especially when IdPs change their user interface. To overcome this scenario, SMA being a standard compliant SAML service provider is enhanced to provide a standard protocol called metadata, containing configuration details of endpoint which can be used to solve the difficulties associated in manually configuring the SAML endpoints. This helps the Administrators to configure any SAML IdP as authentication server.
To configure SAML IDP authentication in AMC
Download the SAML IDP metadata.
In the AMC, navigate to System Configuration > Authentication Servers page, click New and select SAML 2.0 Identity Provider as Authentication directory to create a Authentication server and click Continue.
In the Identity Provider Configuration group, click Choose File and select the downloaded metadata.xml from step 1.
All the IDP configuration fields are filled with the respective values including IDP certificate.
When you are importing the metadata file under authentication server, the CA certificate for SAML verification is enabled by default. In addition, the imported CA certificates under SSL Settings > CA Certificate with SAML verification enabled will be displayed.
You can also download appliance configuration as XML file and can import in Identity Provider Configuration.
Follow the same procedure to configure SAML IDP authentication in CMS.
Was This Article Helpful?
Help us to improve our support portal