This article describes authentication profiles in Smart ID Identity Manager (PRIME) and how to configure them. Authentication profiles are used to define how users can gain access to Identity Manager and what they gain access to.
Authentication is done in two steps:
- Authentication: login in with a certain user credential. The user will be extracted from the credential depending on the authentication type.
- Authorization: after successful authentication the assigned roles for the user are determined depending on the authentication type.
The following authentication profiles are available:
Authentication / Login mechanism
Authorization / Roles / Permissions
Internal
In the runtime system (Identity Manager operator UI and Smart ID Self-Service), this profile type is not recommended for production. Usually, the administrator of Identity Manager Admin has an internal account.
External login mechanism based on LDAP
Client Certificate and LDAP
Client Certificate Internal
In the runtime system (Identity Manager operator UI and Smart ID Self-Service), this profile type is not recommended for production.
Client Certificate Core Object
Internal roles mapped to core objects
Smart Card and Core Object
This authentication profile is deprecated, but can still be used for older versions of Identity Manager. From PRIME 3.9, use Client Certificate Core Object.
Internal roles mapped to core objects
Internal roles mapped to core objects
SAML SSO Core Object
Configured attribute in SAML token
Internal roles mapped to core objects
Configured attribute in SAML token
Prerequisites
title | Prerequisites |
---|
The following prerequisites apply:
For SAML authentication, it is required to have an identity provider, such as Smart ID Digital Access component (Hybrid Access Gateway), with the correct configuration for Identity Manager authentication. For information and examples with Digital Access, see Enable two-factor authentication to Identity Manager clients via SAML federation.
Step-by-step instruction
Expand | ||
---|---|---|
| ||
|
title | Set up authentication profile |
---|
To set up an authentication profile:
Select a Profile type:
Note |
---|
The Internal profile is not available for selection, since it is created by default in any Identity Manager installation and only one internal profile is allowed. |
A new tab is displayed where the authentication profile is configured. See the following sections for how to configure the authentication profile you have selected.
Configure profile types
The configuration of authentication profiles differs according to the different profile types.
Find your selected authentication profile type below and follow the instruction to set up the configuration.
Expand | ||
---|---|---|
| ||
No further configuration required. |
Expand | ||
---|---|---|
| ||
|
title | Configure LDAP profile |
---|
In Connection string, enter the URL of the LDAP server and base address in the directory service, for example:
Panel | ||
---|---|---|
| ||
Connection string: ldap://localhost:389/ou=NexusEmployees,dc=nexus,dc=local |
where
ou = organizationalUnitNamedc = domainComponent
For more information on LDAP string attributes, see RFC 2253, LDAP (v3): UTF-8 String Representation of Distinguished Names.
Enter a Search pattern. Here are two examples:
Panel | ||
---|---|---|
| ||
Search pattern: (userPrincipalName={0}) |
Panel | ||
---|---|---|
| ||
Search pattern: cn={0},ou=users |
In Basis for group search, enter the subpath to the group information in LDAP.
For example, if you find the group information under ou = groups, dc = myCompany, dc = de, enter the following:
Panel | ||
---|---|---|
| ||
Basis for group search: ou=groups |
For example, if the group membership of users is stored in a multi-value attribute member
(via the DN), enter the following:
Panel | ||
---|---|---|
| ||
Filter for group search: (member={0}) |
For example, enter the following:
Panel | ||
---|---|---|
| ||
Attribute for group: cn |