This article describes how to set up a Workspace One connector between the VMWare Workspace One ecosystem and Identity Manager Operator. Workspace One is a Mobile Device Management (MDM) solution. The connector forwards notifications from the Workspace One application and exports certificates to the VMWare Escrow Gateway.
Info |
---|
|
In this article, <SMARTIDHOME> refers to /home/nexus, but this can be different depending on the setup. |
Expand |
---|
|
- The Smart ID version must include SCIM export (applicable for versions from 22.04.x and later).
|
Step-by-step
...
instruction
Expand |
---|
title | Subscribe to Workspace One admin events |
---|
|
- Read the official documentation.
- Target URL: Enter /api/events.
- Username and Password: This part is optional. The credentials can be verified by Identity Manager Operator if the idm-operator.test-connection.enabled flag is defined as true in the config/idm-operator.yaml file.
- Format: Make sure to select JSON.
- Select the events you want to subscribe to.
Warning |
---|
| The endpoint /api/events on the Workspace One connector must be secured from the outside when mutual TLS is configured between the connector and Identity Manager Operator. |
|
...
Expand |
---|
title | Event Routing configuration |
---|
|
The Workspace One connector is a Spring Boot application that uses the .yaml format within its configuration files. The "idm-operator.payload.routing" section defines how to route an event from the Workspace One to the Identity Manager Operator API endpoint URL. This URL consists of parameters that need to be adapted according to your configuration (for example, the process definition key, task ID, tenant ID, etc.)
Configure the routing in the config/idm-operator.yaml file. |
Expand |
---|
title | Export certificates to the VMWare Escrow Gateway |
---|
|
The actual export and provisioning of certificates to the VMWare Escrow Gateway is configured via SCIM export in Smart ID Identity Manager. The SCIM export definition will be used to send the certificates to the Workspace One connector, which will forward them to the Escrow Gateway. Configure the "escrow-gateway" section in config/escrow-gateway.yamlin the Workspace One connector. - Log in to Identity Manager Admin and open Export Definitions. You can create a new pre-defined export definition for Workspace One if it is not configured already. For more information, see Set up data export to external data source from Identity Manager.
- Make sure that the SCIM export definition includes these properties:
- the Connection string must end with "/api/scim/v2"
- the Resource must be "/Certificates"
- Configure the Certificates section to set up the mutual TLS between the connector and Identity Manager Operator.
Set upthe field mappings of the SCIM export, see this example:
Internal field | External field |
---|
${deviceUuid} | device_uuid | ${userUuid} | user_uuid | ${signingCertData} | smime_certificates.signing[0].pkcs12 | ${signingCertPassword} | smime_certificates.signing[0].password | ${encryptionCertData} | smime_certificates.encryption[0].pkcs12 | ${encryptionCertPassword} | smime_certificates.encryption[0].password |
This is an example of the result after field mapping: Code Block |
---|
language | js |
---|
title | JSON example |
---|
| {
"device_uuid": "cbe7ecc8-45c5-4156-b212-c563209c2839",
"user_uuid": "3780e878-6955-4d2b-af96-c60837d7cb77",
"smime_certificates": {
"signing": [
{
"pkcs12": "p12 encoded in base64",
"password": "w9TDX3WE"
}
],
"encryption": [
{
"pkcs12": "p12 encoded in base64",
"password": "79iUnpCK"
}
],
"archived": [
{
"pkcs12": "p12 encoded in base64",
"password": "kwGcDX0K"
}
]
}
} |
|
...
Expand |
---|
title | Set up Workspace One |
---|
|
DockerOpen the environment file <SMARTIDHOME>/compose/smartid.env for editing. Set the properties for the following three variables to fit your deployment:
Code Block |
---|
PRIME_CONNECTORS_VERSION=2303.0.0
# -- Workspace One connector properties
WORKSPACE_ONE_CONNECTOR_PORT=7076
WORKSPACE_ONE_CONNECTOR_CERT_RESOLVER=le
WORKSPACE_ONE_CONNECTOR_PREFIX=workspace-one-connector |
- Update the docker/compose/identitymanager/workspace-one-connector/docker-compose.yml
Tomcat (stand-alone)- Adapt the config files in the WEB-INF/classes/config folder.
|