In this scenario, a web resource, Fortified ID Portal, will use an external SAML IdP for authentication.
The web resource Fortified ID Portal will act as an SAML SP.
The external SAML IdP is Fortified ID WEB.
On the SAML IdP their will be one authentication method which is username and password. Username and password will be authenticated against an Active Directory.
Prerequisite
This use case assumes that you have good knowledge of the product in question.
Fortified ID WEB installed and configured
LDAP directory. Location are the users to authenticate.
The example code is configured using an Active Directory.
We are using mail attribute of the Active Directory user.
Fortified ID Portal installed and configured. (you can use any SAML SP connected to Fortified ID WEB SAML IdP of course).
Note. All configuration and testing is done on the scenario server.
Basic configuration of Fortified ID Web and Portal
Install and prepare configuration
Download and install Fortified ID Web and Fortified ID Portal
To install Integrity Web and Integrity Portal, see documentation and installation.
Add files and folders from ZIP-file to Fortified ID Web and Fortified ID Portal.
Replace the customer folders for your installations with the ones from the zip-file.
Note. This use case was initially done on a Windows server, if you run Container/Docker or Linux you might have to changes something to work in your environments like file paths e.g..
Open the globals.json in both customer folders and update to match your environment.
Start services
Start Fortified ID WEB
Start Fortified ID Portal
Test the configuration
Verify services are started
Verify Fortified ID WEB is started
Verify Fortified ID Portal is started
Login to Fortified ID Portal using Fortified ID WEB as IdP
You should be redirected to the Fortified ID WEB acting as SAML IdP and see the following:
Click Username & Password (LDAP), you should now see
Click Sign in, you should now be redirected back to Fortified ID Portal and see:
What you see can differ depending on configuration and values on the logged in object.