Solution16 Policy¶
This solution documents all the necessary pieces required to create a Per-Request Policy configured for SAML authentication with Azure AD as IdP client-side with kerberos SSO autentication server-side to the application.
Per-Session Policy Walk-Through¶
Per-Session Policy - SAML Identity Provider with variable assign for extracted kerberos username¶
When a user is directed to a SAML Auth agent they are redirected to the IDP(AzureAD) selected by the SP Service(sp.acme.com).
Upon successful authentication at the IDP, the user is redirected back to the SP. The SP service consumes the Assertion. The SAML assertion APM variable will be mapped for SSO kerberos to consume the username
After Variable Assignment, the user is granted access via the Allow Terminal.
If SAML Authentication is unsuccessful, the user proceeds down the fallback branch to be denied access via the Deny Terminal
Policies Agent Configuration¶
Single Sign On kerberos¶
Kerberos Configuration
Profile Settings¶
The Portal Profile settings have been modified in order to attach allow kerberos SSO.
Supporting APM Objects¶
Configurations settings for Federation Services, (Local SP Services, External IdP Connectors).
IDP Connector - solution16-sso¶
General Settings
- Endpoint Settings
Single Sign On Service
Security Settings
Single Logout Service Settings
User’s Perspective¶
Accessing an Application Directly¶
The user attempting to access https://sp.acme.com is directed to AzureAD for authentication.
Username: user1@f5access.onmicrosoft.com
Password: F5twister$
Once the user is authenticated via SAML a kerberos ticket is granted and they are transparently redirected back to the resource. In this case, it is sp.acme.com