Versions Compared
Key
- This line was added.
- This line was removed.
- Formatting was changed.
Through the Remote Windows Identity Provider application, EmpowerID allows organizations to extend authentication to partner organizations without requiring that partner to have a Federation server or be licensed to use EmpowerID. The EmpowerID Remote Identity Provider is a small lightweight component that can be installed on a remote IIS server in AD domains where EmpowerID is not installed. The Remote IdP works by allowing users in external domains to browse to a page on a local Web server that authenticates them against their on-premise Active Directory and then redirects them to an external EmpowerID site with a SAML claim containing their Active Directory username. The external EmpowerID site validates that the information was signed with the appropriate trusted certificate and then authenticates the user as the Person owning the Active Directory user account. Once authenticated, EmpowerID seamlessly forwards the user to the requested destination Service Provider application they requested when browsing their local Web page for authentication. This Service Provider application could be the EmpowerID Web site or another SSO application, such as SalesForce.com, depending on how the SSO connection is configured. If the Service Provider application specified is not EmpowerID, the necessary method for performing single sign-on into that system will be invoked.
Info |
---|
When setting up the IdP connection, you have two SSO flow options: IdP-initiated or SP-initiated. The end result is the same with the difference being how EmpowerID initiates the SSO session.
|
This topic describes how to configure an IDP connection for the Remote Windows Identity Provider and is divided into the following activities:
- Creating an IDP Connection IdP connection for the Remote Windows Identity Provider
- Installing the Remote Windows Remote Identity Provider Application on the Remote Server
- Testing the Remote Windows Remote IDP ConnectionIdentity Provider
Anchor | ||||
---|---|---|---|---|
|
Create an
IDPIdP Connection for the Remote Windows
Identity ProviderIdP
- From the Navigation Sidebar of the EmpowerID Web interfacenavigation sidebar, navigate to the Application Management page by expanding Applications and clicking Manage Applications.
- From the Actions pane, click the Create SAML Connection action link.
- From the General tab of the Connection Details form that appears, do the following:
- Select Identity Provider as the SAML Connection Type.
- Select Default IdP Connection Settings from the SAML Application Template drop-down.
- Leave the External Identity Provider URL field set to about:blank.
Image Removed - Type an appropriate name (without spaces), display name, and optionally a description for the connection in the Name, Display Name and Description fields, respectively.
Type the connection information in thethe User Entered URLURL field. The value you enter depends on how you want the SSO session to be initiated. For IdP-initiated SSO, enter a URL formatted as follows:
Span style color: #c7254e; background-color: #f9f2f4; https://YourRemoteIdPServer.com/EmpowerIDRemoteIDP/Login/YourSPNameSPName/YourRemoteIdPName
If you want the SSO session to be SP-initiated, enter a URL formatted in the following way:Span style color: #c7254e; background-color: #f9f2f4; https://YourEmpowerIDServer.com/WebIdPForms/Login/YourSPNameSPName/YourRemoteIdPName
Info In the below image, the User Entered URL is IdP-initiated.
Image ModifiedInfo If you are using EmpowerID as the identity provider for a third-party service provider, such as Salesforce, the third-party service provider application must be registered in EmpowerID.
- Scroll to the Account Information section of the form and tick Create a New Account Directory. This tells EmpowerID to create a special type of account store for the connector that is internal to EmpowerID, known as a "tracking-only" account store. A tracking-only account store account exists as a container within EmpowerID for storing user and group records for SSO or attestation without making a connection to the external directory associated with the application. In this way, when users in the external domain attempt to access a service provider via EmpowerID, EmpowerID checks to see if that user has an account in the associated tracking-only account store.
- Scroll to the Certificates section of the form and from the Verifying Certificate drop-down select the certificate for verifying the SAML assertion sent to EmpowerID by the EmpowerID Remote IdP. This certificate must have the public key for the certificate used by the remote server to sign the SAML assertions being sent to EmpowerID.
- Leave all other fields as is and click Save.
Anchor | ||||
---|---|---|---|---|
|
Install the Remote Windows Identity Provider
- On the remote server (not the EmpowerID server), open the installer for the Remote Windows Identity Provider you received from EmpowerID and click Next.
- Accept the terms of the License Agreement and click Next.
- Choose your installation path and click Next.
- Click Install.
- When the command window appears, press any key to continue.
- Once the installation completes, click Finish.
- From the EmpowerID Remote IDP Configuration window that appears, do the following:
- In the Remote EmpowerID Web Site URL field, type the URL to the EmpowerID Web server hosting the Remote Identity Provider connection, being sure to use Hypertext Transfer Protocol over Secure Socket Layer. The URL should look similar to "https://sso.empoweriam.com," where sso.empoweriam.com is the FQDN or resolvable DNS alias of your EmpowerID Web server.
Type the appropriate information for the Application Identity in the Username, Password and Web Site fields.
Info No special permissions are needed for the application identityThe application identity needs to be a local admin or a registry denial error will occur when running the IDP.
- Select SAML as the Response Type.
Click the ellipses (...) button to the right of the Signing Certificate field and select the certificate that will be used to sign the SAML assertions sent to the EmpowerID Web server. The verification certificate set for the Remote Identity Provider SSO connection on the EmpowerID server must have the public key for this certificate, as it is used to verify that the assertions are coming from the remote server.
Info In order for the Remote IDP Configurator to locate the certificate, it must be in the Personal certificate store on the local server.
When you have completed the above, the EmpowerID Remote IDP Configuration window should look similar to the following:- Click Apply and then click OK to close the Success message box.
- Close the EmpowerID Remote IDP Configuration window.
Anchor | ||||
---|---|---|---|---|
|
Test the Remote Windows IdP connection
- On the remote machine, prompt for Windows credentials by opening a browser and navigating to the URL you specified for the Remote Identity Provider connection on the EmpowerID server.
- Type the credentials of a remote user in the Windows Authentication dialog and click OK.
- This starts the Login workflow and directs your browser to the EmpowerID login check, which asks if you already have an EmpowerID login. Since this is your first login as the remote user click No.
- In the Create User Account Form that appears, fill in the required First Name and Last Name fields, as well as any other fields for which you have information and click Submit.
- Click OK to close the submission confirmation message.
- Log in to the EmpowerID Web application as an administrator and from your dashboard click the link from an anonymous user requesting an EmpowerID Person account.
- From the Task Details page that appears, select Approve.
- Type a comment for the approval and then click OK.
- Once the process completes log out of the Web application.
- From the remote server, navigate your browser to the URL for the Remote Identity Provider connection on the EmpowerID server and when prompted enter the Windows credential for that person and click OK.
- Answer the Password Self-Service Reset questions and click Submit.
Div | |||||||
---|---|---|---|---|---|---|---|
| |||||||
|
Div | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
| |||||||||||
Div | |||||||||||
| |||||||||||
Live Search | |||||||||||
spaceKey | E2D | ||||||||||
placeholder | Search the documentation | type | page|||||||||
|