Add Fortified ID app to Access

Scenario
When installing Management Center, the Fortified ID products Access, Portal, Forms, Password Reset or Enrollment are ready to use out-of-the-box. They ship with an default configuration which is configured to use Fortified ID online IdP. This IdP is only created for demo purposes. This document describes how to configure the application to use Fortified ID Access instead as IdP.
Note. This use case does NOT include how to configure Fortified ID Access as an SAML IdP. In this use case we are using Access as it is configured by default using Management Center (MC).
Prerequisite
Fortified ID Access configured as SAML IdP. In this use case we are using Access as it is configured by default using Management Center (MC).
When writing this use case only Portal and Forms are available as products through MC.
Overview
We will use Fortified ID Portal as an example how to add an Fortified ID app to Fortified ID Access SAML IdP. Change Port and URL in case you are adding another product than Portal. Port and URL in this use case are default installation values. If you have something else change accordingly. To make Portal use Access as SAML IdP, both products must exchange SAML metadata with each other.
Configure Portal to trust Access IdP
There are two files to update to make this happen.
Add the metadata URL parameter for Access IdP to Globals
Browse to Management Center for Portal
Click Configuration tab
Expand Misc settings
Click Globals
Add a new key, se example below.
"saml_idp_metadata_url": "https://localhost:8443/saml/metadata/default",
localhost:8443 is the host name and port of Access
/saml/metadata/ is a hardcoded path
default is id of the SAML IdP we are using on access. In MC for Access, you can find it under Configuration -> Modules -> SAML -> SAML module
Change metadata source from Online IdP to Access IdP
Browse to Management Center for Portal
Click Configuration tab
Expand Misc settings
Click Auth settings
Find key
"path": "${globals.saml_idp_metadata_path}"
Replace that key with (configured in previous section)
"url": "${globals.saml_idp_metadata_url}"
Deploy settings to Portal
Click settings button
Click Deploy
Changes will be saved and service restarted.
Configure Access to trust Portal
You add a trust file to trusted applications för your SAML IdP
Add trust to Portal SAML SP
Browse to Management Center for Access
Click Configuration tab
Expand SAML
Expnad Trusted Applications
Click + to add a new trust application
Change configuration to shown below. Make sure id is unique. Example below is for Portal.
{
"id": "saml_trust_1",
"display_name": "Fortified ID Portal SAML SP",
"description": "Fortified ID Portal SAML SP",
"url": "https://localhost:8445/portal/authn/login/metadata"
}
Test your configuration
Browse to Portal. Default Portal will listen on https://localhost:8445/portal/
You will now be redirected to Access
Click for example Peter Bishop
You will be redirected back to Portal and logged in as Peter Bishop.
Extra
Add some roles to Peter Bishop
Browse to Management Center for Access
Click Configuration -> SAML -> Default IdP -> Selector -> Static SAML 2
Under roles, add 2 more roles. Result should look like:
"roles": [ "Slack", "Office365", "Con artist", "app1", "app3" ]
Deploy changes.
Log out as Peter Bishop and login again in Portal
Last updated