Lab 2: Onboard a Second Application(15.1)

Guided Configuration supports more than a single application per Identity Aware Proxy Deployment. In this module you will learn how to modify an existing IAP deployment to onboard new authentication methods, SSO methods, and applications.

This Module also introduces the Application Group (skipped in the previous module) to provide different contextual access controls on parts of a website.

Section 2.1 - Access Guided Configuration

To onboard a new application to the IAP, you will first access the Guided Configuration menu.

Task 1 - Access the Zero Trust IAP guided configuration

  1. From the web browser, click on the Access tab located on the left side.

    image0

  2. Click Guided Configuration

    image1

  3. Click IAP_DEMO

    image2

Section 2.2 - User Identity

Adding an additional User Identity to IAP is just a few simple steps.

Task 1 - Configure Certificate Authentication with OCSP

  1. Click User Identity in the Ribbon

    image3

  2. Click Add to create a new User Identity

    image4

  3. Enter Name ocsp

  4. Select On-Demand Certificate Authentication from the Authentication Type dropdown

  5. Select OCSP Responder from the Authentication Server Type dropdown

  6. Select ocsp-servers from the Authentication Server dropdown

  7. Leave Request selected under Choose Auth Mode

  8. Click Save

    image5

  9. Verify the ocsp object was created

    image6

Section 2.3 - SSO & HTTP Header

In this section, you will create a custom header value to pass to the web server.

Task 1 - Create Custom Header

  1. Click SSO & HTTP Header from the Ribbon.

    image7

  2. Click Add to create a new header object.

    image8

  3. Enter Name header_sso

  4. Change radio button for Type to HTTP Headers

  5. In the SSO Headers section, enter userID in the Header Name Field

  6. Click Save

    image9

  7. Verify the header_sso object was created

    image10

Section 2.4 - Applications

In this section you will define a second application with subpaths.

Task 1 - Configure Application header.acme.com

  1. Click the Applications icon from the ribbon.

    image11

  2. Click Add to create a new application

    image12

  3. Click Show Advanced Setting in the top right corner to see additional properties

  4. Enter Name header.acme.com

  5. Enter FQDN header.acme.com

  6. Enter Subpath Pattern /admin.php

  7. Under Pool Configuration, you will create a node by entering 10.1.20.6 in the IP Address/Node name field. Note This may already exist in the drop down menu.

  8. Verify the pool member properties of Port 443 and Protocol HTTPS

  9. Click Save

    Note

    Subpaths are used in Application Groups to define contextual access on portions of an application (separate from the default contextual Access Policy). If necessary, an application can be split up into multiple Application Groups to meet an organization’s access control needs.

    image13

  10. On the Applications menu, enter Auth Domain iap1.acme.com

  11. Verify header.acme.com was created.

    image14

Section 2.5 - Application Groups

In this section you will configure two Application groups to enforce different policies on parts of the header.acme.com website.

Task 1 - Create header-ad Group

  1. Click Application Groups from the ribbon.

    image15

  2. Check Enable Application Groups

image16
  1. Enter Name header-ad

  2. Under Applications List, select / and click the arrow to move it into the Selected box

  3. Click Save

    image17

Task 2 - Create header-ocsp Group

  1. Click Add to create a second application group

    image18

  2. Enter Name header-ocsp

  3. Under Applications List, select /admin.php and click the arrow to move it into the Selected box

  4. Click Save

    image19

  5. Verify both applications groups have been created.

  6. Click Save & Next

    image20

Section 2.6 - Contextual Access

In this section you will configure Contextual Access for the previously created Application Groups

Task 1 - Configure Contextual Access for header_ad Group

  1. Click Contextual Access from the ribbon

    image21

  2. Click Add

    image22

  3. Enter Name header-ad

  4. Select Application Group from the Resource Type dropdown

  5. Select header-ad from the Resource dropdown

  6. Select ad from the Primary Authentication dropdown

  7. Select header_sso from the HTTP_Header dropdown

  8. Click Save

    image23

Task 2 - Configure Contextual Access for header-ocsp Group

  1. Click Add

    image24

  2. Enter Name header-ocsp

  3. Select Application Group from the Resource Type dropdown

  4. Select header-ocsp from the Resource dropdown

  5. Select ad from the Primary Authentication dropdown

  6. Select header_sso from the HTTP_Header dropdown

  7. Check Enable Additional Checks

    image25

  8. Click Add to add a Trigger Rule

    image26

  9. Enter Name webadmin-group

  10. Check User Group Check

  11. Locate the Website Admin group

    Tip

    Try using the filter field to search

  12. Click Add under the Action column

    image28

  13. Select Step Up from the Match Action dropdown

  14. Select ocsp from the Step Up Authentication dropdown

  15. Click Save

  16. Click Save again to save the Contextual Access Properties for ocsp-header-iap.acme.com

    image29

  17. Click Deploy located under the ribbon. Deployment will take a few moments.

    image27

Section 2.7 - Testing

In this section you will use user1’s credentials to default website header.acme.com. However, when you attempt to access the admin page you will be prompted for certificate based authentication. After a successful login you will close your browser and login to default website using user2’s credentials. User2 will be denied due to not having the correct AD groups.

Task 1 - Login to header.acme.com using user1

  1. Open a new browser tab

  2. Access the site https://header.acme.com

  3. At the logon page enter the Username: user1 and Password: user1

  4. Click Logon

    image30

  5. Notice the custom header UserID has a value of user1

    image31

  6. Access the admin portion of the website https://header.acme.com/admin.php

  7. Select the certificate user1

  8. Click OK

    image33

  9. You should be successfully logged into the admin portion of the site.

    image37

  10. Close the browser completely.

Task 2 - Login to header.acme.com using user2

  1. Open a new browser window.

  2. Access the site https://header.acme.com

  3. At the logon page enter the Username: user2 and Password: user2

  4. Click Logon

    image34

  5. Notice the custom header UserID has a value of user2

    image35

  6. Access the admin portion of the website https://header.acme.com/admin.php

  7. You receive a Access Denied page due to not having the correct group membership

    image36

  8. This concludes lab 2.

    image100