LDAP (UID/PWD) using MC

Scenario
In this scenarion we will add an credential validator to login using an Active Directory account and password.
Note. This use case uses Fortified ID Management Center to configure Fortified ID Access.
In this use case Fortified ID Portal will act as an SAML SP and Fortified ID Access as SAML IdP.
Prerequisite
Fortified ID Management Center is already installed
To install Management Center, click following LINK
Fortified ID Portal acting as SAML SP and is added to Fortified ID Access as the SAML IdP
We use the products default configuration as base
To configure Portal (SAML SP) with Access (SAML IdP), click following LINK
We use Fortified ID Portal as an reference SAML SP in this use case, of course you can any SAML SP
Active Directory (e.g. installed in the same machine)
Some users created with known passwords
Make sure all of them a mail attribute populated with an mail address.
Have some of the users configured as manager for others
Some groups created with some user added
Note. All configuration and testing is done on the scenario server.
Overview
If you starts this use case with default installation of Access with Management Center, Access already have four credential validators added to the default selector. See image below.

We will add a fifth credential validator called My Active Directory
Overview of the components to add and configure
Add LDAPClient to communicate with your Active Directory
User Username & Password credential validator to prompt user for username and password
Add to default Selector object on the SAML default IdP
Configure pipe to verify username and password with your LDAPClient
Add EnrichIdentity to fetch user data about user
Add to Default SAML IdP
Configure SAML SP assertion (Portal SP) object to return correct data using data from the EnrichIdentity authenticator
1. Add a LDAPClient module
Login to Management Center for Access
Click Configuration tab
Expand Modules and click + to add new module
Click add LDAPClient
Click JSON button for the LDAPClient module
Copy data below and overwrite all existing data
Only change the three properties below to map your environment:
host
bind_dn
bind_password
We assume that your domain controller has a server certificate to use LDAPS.
Click Update and Deploy
You have now added an LDAP module that can be used by one or several objects like valves. To address this LDAP module you use the value my_active_directory_module.
2. Add a "Username & password" credential validator
Click Configuration tab
Click + to the right of label Authentication Methods
Expand Credential Validators
Scroll down and click Add for validator Username & password
Copy data below and overwrite all existing data
Click on the associated Pipe and update id usernameandpassword_1_pipe before you click update
Click Update and Deploy
2.1 Add a Credential validator to the default Selector
Expand SAML -> Default IdP -> Selector
On selector object, click CREDENTIAL VALIDATOR tab
Click ADD and select the validator you just added, e.g. My Active Directory (UID/PWD)(usernameandpassword_1)
In Display Label type Active Directory (UID/PWD)
In Logo URL, type assets/svg/microsoft.svg
Click Update and Deploy changes
2.2 Update pipe for credential validator
Click Configuration tab
Expand SAML -> Default IdP -> Selector -> My Active Directory (UID/PWD)
Click associated pipe, usernameandpassword_1_pipe
Click the JSON button in upper right corner
Copy and overwrite all existing data with the JSON data below.
Click Update
Deploy changes
3. Add an EnrichIdentity flow control
Add an EnrichIdentity to fetch user data from Active Directory for the user about to login
Click Configuration tab
Click + to the right of label Authentication Methods
Expand Flow Control
Scroll down and click Add for EnrichIdentity
Change display_name to EnrichIdentity from Active Directory
Click the Pipe object for the EnrichIdentity flow control
Copy data below and overwrite all existing data in the pipe Note! We assume that the pipe id is "enrichidentity_1_pipe", if not, verify the EnrichIdentity object and replace id below.
Note! All data received by the LDAP search will be added to Exports, that means it will be available for the SAML Assertion objected.
Click Update
3.1 Add EnrichIdentity to your SAML IdP
Click Configuration tab
Expand SAML and click Default IdP
Click AUTHENTICATION
Click ADD AUTHENTICATOR
Select EnrichIdentity from Active Directory and click Add
Click Update
Deploy changes
4. Configure SAML SP assertion
The SAML SP object on the SAML IdP needs to be configured what nameid and data to return. We use Fortified ID Portal and we will configure nameid tp be sAMAccountName in this scenario and also return display_name used for the avatar in Fortified ID Portal.
Click Application tab
Click to edit the Fortified ID Portal SAML SP object
Click NAMEID SETTINGS tab and select
NameID Format - urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified
From parameter - sAMAccountName
Click ATTRIBUTE SETTINGS tab
Click Add attribut and type
Name* - display_name
Name Format - Unspecified
Value* - displayName
Click Update
Deploy changes
Test the configuration
If you browse to Fortified ID Portal you will be redirected to Fortified ID Access. It should look like screenshot below.

If you login using one of your Active Directory test account is should look like the screenshot below

Last updated