Use Cases
HomeIntegrityControlManagement CenterSolutions
  • Get Started
  • Integrity | Access
    • Auth. methods
      • LDAP (Username/Password)
      • LDAP (Username/Password) + OTP (SMTP)
      • LDAP (Username/Password) + OTP (SMS)
      • Swedish BankID
      • Microsoft Entra ID (SAMLSPBroker)
      • Foregin eID (SAMLSPBroker)
    • Auth. methods (SAML)
      • One-Time Password (OATH)
      • Inera IdP (SITHS) (SAMLSPBroker)
      • ID-porten (Norway) (SAML IdP with OIDC RP)
      • Multiple SAML IdP's configured
        • Multiple JSON files
    • Auth. methods (OIDC)
      • Static values (OIDC) - Test only
      • Swedish BankID (OIDC)
      • UID/PWD (OIDC)
    • Auth. methods (MISC)
      • Selector filtering
      • AuthZ control
      • External links and Cancel location
    • Add a Federation or SAML SP
  • Integrity | Portal
    • Portal
  • Integrity | Enrollment
    • Software token (OATH)
    • Best practice configuration
  • Integrity | Radius
    • UID/OATH token
    • UID/Password/OATH token
    • UID/Password/SMTP
  • Integrity | API
    • Swedish Siths eID
    • Oath Token
  • Control | Applications
    • Password Reset
    • Password Reset for Entra ID
    • Password Reset for Google Workspace
  • OPERATION
    • Rolling upgrade - cluster
  • TROUBLESHOOTING
    • Wrong relaystate
  • Misc
    • Address configuration externally
    • ADFS
      • Protect Fortified ID apps
      • Install and configure Fortified ID ADFS adapter for Siths eID
      • Install and configure Fortified ID ADFS adapter for Oath
    • AWS
      • Protect AWS Cognito with eID MFA
      • Protect AWS IAM Identity Center with eID MFA
    • Customization
      • Overlay - WEB
      • Overlay - Portal
      • Overlay - Password Reset
      • Overlay - Enrollment
      • Logout page
    • Dependency-Track - protect with eID MFA and SSO
    • Digitala Nationella Prov (DNP) / Skolfederation
      • Active Directory Federation Services (ADFS) with BankID as step-up-method
      • Active Directory / LDAP with BankID as step-up-method
      • Entra ID (Azure AD) with BankID as step-up-method
      • Google with BankID as step-up-method
      • Generate eduPersonPrincipalName (eppn) and store in Google
      • Generate eduPersonPrincipalName (eppn) and store in Entra ID
      • Common configuration
    • Encrypt configuration secrets
    • Microsoft Entra
      • Protect Entra ID (Azure AD) with eID MFA
      • Entra External - Support for eID (SAML)
      • Entra External - Support for eID (OIDC)
    • Expressions
    • Google
      • Common configuration for Google Workspace - Directory API
      • Common configuration for Google Workspace - authentication for Fortified ID products
      • Delegated administration for Google Workspace - teacher updates student guardians
      • Delegated administration for Google Workspace - teacher updates student password
      • Protect Google Workspace with eID MFA
    • HTTPS
    • Protect sensitive data, such as social security numbers, through obfuscation
    • Reverse proxy
      • Install Apache Web Server on Windows
      • Add SSL certificate and enable https
      • Add a Fortified ID virtual host
    • Set AuthnContextClassRef
    • Wiki.js - OpenID Connect (OIDC)
Powered by GitBook
On this page
  • Scenario
  • Prerequisite
  • Install and prepare configuration
  • Configure Sweden Connect eIDAS node
  • Login to Sweden Connect eIDAS node
  • Fetch the SAML metadata for your Fortified ID WEB SAML SP
  • Add the metadata of your SAML SP (Fortified ID WEB SAML SP)
  • Verify your addition
  • Test the configuration
  1. Integrity | Access
  2. Auth. methods

Foregin eID (SAMLSPBroker)

eIDAS requires Swedish public authorities to provide their e-service with the option to log in with a foreign e-identification. Fortified ID has a solution for that.

PreviousMicrosoft Entra ID (SAMLSPBroker)NextAuth. methods (SAML)

Last updated 1 month ago

Scenario

In this scenario, we will append the default installation with Foregin eID.

E-services that require electronic identification and that are used in public offices must be connected to the Swedish eIDAS node, Sweden Connect. The purpose of the requirement is to make it easier for EU citizens to use e-services across national borders.

According to the EU regulation eIDAS, each member state needs to provide a so-called country node, a connection point where e-identification traffic is controlled and "translated" to the respective country's identity method. In Sweden, the country node is Sweden Connect. Fortified ID Access can act as a bridge between your applications and the Swedish eIDAS node so your application will support Foreign ID as a login method.

In this use case:

  • Fortified ID Access will act as the bridge/proxy between application and Swedish eIDAS node

    • Fortified ID Access will act as a SAML SP to Sweden Connect eIDAS node

    • Fortified ID Access will act as a SAML IdP to SAML SP application

NOTE: This configuration is an example configuration to be used with the sandbox environment. Please make sure to adjust the configuration to suit your needs, this is extra important for production purposes.

Prerequisite

  • This use case assumes that you have good knowledge of the product in question.

  • Fortified ID Access installed and configured with the default configuration

  • Swedish eIDAS node (SAML IdP) You need an account on the Swedish eIDAS node provided by DIGG and Sweden Connect. In this use case we connect to the development and test environment found on this site, .

Install and prepare configuration

  1. Add files and folders from ZIP-file to the config-folder, ex: C:\Program Files\FortifiedID\mgmt-center\data\customer\access

  2. Append you globals with the following parameters and adjust them according to you needs

{
  "samlspbroker_eidas_metadata_id": "fortifiedid_sp_eidas",
  "samlspbroker_eidas_template": "${system.customer_home}/resources/fortifiedid_samlspbroker_eidas_template.xml",
  "samlspbroker_eidas_spentityid": "${globals.default_saml_entity_id}/eidassp",
  "samlspbroker_encryption_keystore_password": "password",
  "samlspbroker_encryption_keystore_path": "${system.customer_home}/resources/fortifiedid.p12"
}
  1. Append the translations file with the following translation

{
  "samlspbroker_label": "Foregin eID (eIDAS)"
}
  1. Append the selector with at reference to the new authenticator by appending this block to the default selector

{
    "id": "7",
    "target": "eidas",
    "label": "samlspbroker_label",
    "logo": "assets/svg/eidas.svg"
}
  1. Append the SAML Module with the new SAML SP configuration

{
  "id": "${globals.samlspbroker_eidas_metadata_id}",
  "metadata_file_path": "${globals.samlspbroker_eidas_template}",
  "sign_ref": [
    {
      "keystore": {
        "key_password": "${globals.default_keystore_password}",
        "password": "${globals.default_keystore_password}",
        "path": "${globals.default_saml_keystore}"
      }
    }
  ],
  "encryption_ref": [
    {
      "keystore": {
        "key_password": "${globals.samlspbroker_encryption_keystore_password}",
        "password": "${globals.samlspbroker_encryption_keystore_password}",
        "path": "${globals.samlspbroker_encryption_keystore_path}"
      }
    }
  ]
}
  1. Restart the Access service

Configure Sweden Connect eIDAS node

Login to Sweden Connect eIDAS node

  1. Login to access your Sweden Connect configuration

Fetch the SAML metadata for your Fortified ID WEB SAML SP

  1. Make sure Fortified ID WEB is started

  2. Open a browser and browser to https://dev.fortifiedid.se/saml/metadata/fortifiedid_sp_eidas Change dev.fortifiedid.se to your http address

  3. A file named fortifiedid_sp_eidas.xml will be downloaded to your computer

  4. Keep the file for the next step

Add the metadata of your SAML SP (Fortified ID WEB SAML SP)

  1. Click New in the Metadata records

  2. Give the record a name, paste your metadata into the Metadata dialog box from the file in the previous step

  3. Click Save

  4. It can take up to 10 minutes before your addition is active. Go and grab a cup of coffee.

Verify your addition

You can check your addition for warnings and/or errors to fix

  1. Search for the name you give your metadata in the previous step

  2. Look for any Errors and address them

Test the configuration

  1. The selector should now be displayed, including the new option for "Foregin eID (eIDAS)".

  2. Select "Foregin eID (eIDAS)"

  3. You will be redirected to the Sweden Connect authentication

  4. After a successful authentication you will be redirected back to the Access server and finally to the selected application or the Fortified ID test application.

Download

Open a browser and browse to

Browse to

Browse to a site protected by the Access server. Optionally the default login url might be used.

https://eid.svelegtest.se/mdreg/home
this file
https://eid.svelegtest.se/mdreg/home
https://validator.swedenconnect.se/md?federationId=sandbox
https://localhost:8443/access/authn/samllogin