IdP Proxy - Generic (SAMLSPBroker)

Scenario

If you have an authentication selector in Fortified ID Access that already integrates with methods such as Swedish BankID, Active Directory, or other identity providers, and you want to add authentication methods from an external IdP as an additional option, this use case will guide you through the process.

When a user selects The external IdP during sign-in, they will be redirected for authentication and then returned to Fortified ID Access upon successful login. In this scenario, we will append the default installation with the authentication method provided by the external IdP.

In this use case:

  • Fortified ID Access will act as the bridge/proxy between application and External IdP

    • Fortified ID Access will act as a SAML SP to External SAML IdP

    • Fortified ID Access will act as a SAML IdP to SAML SP application

Prerequisite

  • This use case assumes that you have good knowledge of the product in question.

  • Fortified ID Access installed and configured with the default configuration

  • You need access to the External IdP

Install and prepare configuration

  1. Add a Trusted Application to the external IdP, by referring the url or file-path. Note, the server might not start if not performed correctly.

  2. Upload the following metadata template as a resource.

  3. Add an authenticator with the following configuration.

  1. Append you globals with the following parameters and adjust them according to you needs

  1. Append the translations file with the following translation

  1. Append the selector with at reference to the new authenticator by appending this block to the default selector

  1. Append the SAML Module with the new SAML SP configuration

  1. Restart the Access service

  2. Download the metadata for the SAML-SP from https://<hostname>/saml/metadata/samlspbroker and configure the external IdP to trust it.

Test the configuration

  1. Browse to a site protected by the Access server. Optionally the default login url https://localhost:8443/access/authn/samllogin might be used.

  2. The selector should now be displayed, including the new option for "External IdP".

  3. Select "External IdP"

  4. You will be redirected to the external IdP for authentication

  5. After a successful authentication you will be redirected back to the Access server and finally to the selected application or the Fortified ID test application.

Last updated