Lab 1.1 - Create an Access Security Policy ########################################## Creating a security policy with signed SAML assertion ***************************************************** 1. Access **BIG-IP Next Central Manager** if you're not already logged in. .. image:: images/lab2-cmlogin.png :width: 600 px 2. Click on the Workspace icon and select Security .. image:: images/lab1-securitybtn.png :width: 600 px 3. Under Security you will find all the security modules such as Access, WAF, and SSLO for example. The module may need to be enabled for the feature menu to show up on the Security list. For this lab we have already enabled Access module. Click on **Access** from the Security menu, this should default to Policies. .. image:: images/lab1-accessbtn.png :width: 600 px 4. Click **Start Creating** button to create a new Access policy, or click **create** on top right .. image:: images/lab1-createapbtn.png :width: 600 px 5. This will open Access Visual Policy Design screen. Select **Per-Session** and **using a policy template**. Select template **SAML as Service Provider** .. image:: images/lab1-selecttemplate.png :width: 600 px 6. In the **Create Per-Session Policy** screen, this is where you set the different properties of the policy, such as, logging, language, Single Sign On, etc… Let’s start configuring the policy by setting a policy name and policy parameters. In the **General Properties** screen set the following parameters, for the rest of the settings you may leave it as default. - **Policy Name:** okta_signed_policy - **Cookie Option:** check the **Secure** box - Click **Continue** .. note:: As you continue the rest of the policy creation process, see the screen shot in each section for a visual example of the configuration. .. image:: images/lab1-oktageneral.png :width: 600 px 7. **Session Properties** screen, you can specify session specific settings in this screen. For this lab we will keep the default settings. Click **Continue**. .. image:: images/lab1-oktasession.png :width: 600 px 8. **Logging screen** you can adjust the logging level to help with debugging or troubleshooting. For this lab we will keep the default settings. Click **Continue**. .. image:: images/lab1-oktalogging.png :width: 600 px 9. **Single Sign On** screen, you can set the Single Sign On configuration with an IDP. For this lab we will not use any SSO. Click **Continue**. .. image:: images/lab1-oktasso.png :width: 600 px 10. **Endpoint Security** screen, you can setup Endpoint Security such as ensuring firewall is enabled on a client workstation before access is granted. For this lab we will not use this feature. Click **Continue**. .. image:: images/lab1-oktaendpoint.png :width: 600 px 11. **Resources** screen, you can set additional capabilities and features such as Network Access, and Webtops in this screen. For this lab we will not use these capabilities. Click **Continue**. .. image:: images/lab1-oktaresources.png :width: 600 px 12. **Connectivity** you can set the SSL VPN (Network Access) connectivity settings. Keep as default and click **Continue** 13. **Policy Endings** screen, you can define additional policy ending logic as needed for your use case here. For this lab we will accept the default settings. Click **Finish**. .. image:: images/lab1-oktapolicyendings.png :width: 600 px After clicking on **Finish** it should bring you back to the Create Policy screen. Now, we will use the Visual Policy Designer (VPD) to build the policy. In Next Access we have two terms in the Visual Policy Designer (VPD); **Flows** and **Rules**. We set the Flows in the Visual Policy Designer (VPD) and within each Flow we can define multiple Rules. .. image:: images/lab1-vpd-flow.png :width: 600 px 14. As we use a template, the **flow** is already there. We must configure it now. 15. Click on the **Collapse** button to see the content of the **flow**. You can see 2 rules. .. image:: images/lab1-flowrules.png :width: 600 px 16. Edit inside the **SAML-Federation** Rule box .. image:: images/lab1-oktasamlrule1.png :width: 600 px This will open the SAML Federation Rule properties screen. Please follow the images below for each section. 17. In the **Rule Configuration**, **Rule Properties** screen, add **SAML-Federation-Okta-Rule** as the name of the rule, leave the rest as default. Click **Continue**. .. image:: images/lab1-oktasamlrule2.png :width: 600 px 18. In the **Rule Configuration**, **Providers** screen, this is where you can configure Service Provider and Identity Provider. A generic SP is already set. **Edit** it .. image:: images/lab1-saml-provider.png :width: 600 px - **EntityID:** https://signed.example.com - **Host:** https://signed.example.com - **Check Want Signed Assertion** box - Click **Save** .. image:: images/lab1-oktasamlrule4.png :width: 600 px 19. In the **Identity Provider** section, click on the **Start Creating** button. .. image:: images/lab1-oktasamlidentity.png :width: 600 px 20. In the **Add Idnentity Provider** screen add the following parameters: - **EntityID:** http://www.okta.com/exk93cs4on3gGVej44x7 - **SSO URL:** https://dev-818899.okta.com/app/dev-818899_signedexamplecom_1/exk93cs4on3gGVej44x7/sso/saml - **Identity Provider’s Assertion Verification Certificate:** select the *okta_signed_cert* - Click **Save** 21. Below is a summary of the completed Providers screen confirm you have both a Service Provider and Identity Provider configured, then Click **Continue**. .. image:: images/lab1-oktasamlconfirm.png :width: 600 px 22. In the **Branches** screen, keep the default. Click **Finish**. .. image:: images/lab1-oktasamlrule6.png 23. Click **Save** button at the top right hand corner to save the policy. After the policy is saved, click **Exit** to close the policy. You have completed creating a security policy. Next we will deploy an Application and assigned the access policy.