Solution14 Policy

Per-Session Policy Walk-Through

This solution requires creation of two access policies. A default allow per-session policy and a per-request policy using two subroutines.

image001

  1. This initial access policy (default allow) is a per-session policy to populate required session variable name and values.

Per-Request Policy Walk-Through

This per-request access policy accepts users request and redirect them to one of the two SAML Auth Subroutines configured for sp.acme.com or sp1.acme.com.

image002

Per-Request Policies are an extension of a per-session policy by enabling fine-grain control over a users session on request by request basis.

  1. This URL Branching action is used to interrogate the service URL and vector it to the appropriate SAML-SP Subroutine.

  2. When a user is directed to a SAML Auth agent they are redirected to the IDP selected by the SP Service(sp.acme.com).

  3. Upon successful authentication at the IDP, the user is redirected back to the SP. The SP service consumes the Assertion. The user is directed to the Success Terminal.

  4. Upon unsuccessful authentication, the user proceeds down the fallback branch and directed to the Fail Terminal.

  5. Pool sp.acme.com-pool is assigned to the request for load balancing. Traitional LTM load balancing rules still apply.

  6. The user is granted access via the Allow Terminal.

  7. User credentials failed the selected authentication and is directed to the Reject Terminal.

  8. When a user is directed to a SAML Auth agent they are redirected to the IDP selected by the SP Service(sp1.acme.com).

  9. Upon successful authentication at the IDP, the user is redirected back to the SP. The SP service consumes the Assertion. The user is directed to the Success Terminal.

  10. Upon unsuccessful authentication, the user proceeds down the fallback branch and directed to the Fail Terminal.

  11. Pool sp1.acme.com-pool is assigned to the request for load balancing. Traitional LTM load balancing rules still apply.

  12. The user is granted access via the Allow Terminal.

  13. User credentials failed the selected authentication and is directed to the Reject Terminal.

  14. Users request did not meet either of Subroutine URI requirements.

Policy Agent Configuration

URL Branch Rules

image003

SAML Auth Agent - SP

image004

Pool Assign - sp_pool

image005

SAML Auth Agent - SP1

image006

Pool Assign - sp1_pool

image007

Profile Settings

All profile settings are left the defaults

Supporting APM Objects

SAML Service Provider List

image008

SP Service (sp.acme.com-serv)

General Settings

image009

Endpoint Settings

image010

Security Settings

image011

Authentication Context

image012

Advanced Settings

image014

SP Service (sp1.acme.com-serv)

General Settings

image015

Endpoint Settings

image016

Security Settings

image017

Authentication Context

image018

Advanced Settings

image020

IdP Connector List

image021

IdP Connector (solution14-1-idp-conn)

General settings

image022

Endpoint Single Sign On Service

image023

Assertion Settings image024

Security Settings

image025

Single Logout Service Settings

image026

IdP Connector (solution14-1-idp-conn)

General settings

image027

Endpoint Single Sign On Service

image028

Assertion Settings

image029

Security Settings

image030

Single Logout Service Settings

image031

User’s Perspective

The user attempting to access https://sp1.acme.com is directed to AzureAD for authentication.

image040

Once the user is authenticated they are transparently redirected back to the resource. In this case, it is sp1.acme.com

image041

Once the user in authenticated at the Identity Provider, they are allowed access to sp.acme.com without need to re-authenticate.

image042