Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 11 Next »

This article describes authentication profiles in Smart ID Identity Manager (PRIME) and how to configure them. Authentication profiles are used to define how users can gain access to Identity Manager and what they gain access to

Authentication is done in two steps:

  1. Authentication: login in with a certain user credential. The user will be extracted from the credential depending on the authentication type.
  2. Authorization: after successful authentication the assigned roles for the user are determined depending on the authentication type.

The following authentication profiles are available: 

Authentication profile

Authentication / Login mechanism

User / Principal

Authorization / Roles / Permissions

Internal

In the runtime system (Identity Manager operator UI and Smart ID Self-Service), this profile type is not recommended for production. Usually, the administrator of Identity Manager Admin has an internal account.

Login with username and password based on internal user table
UsernameRoles from internal roles table
LDAP

External login mechanism based on LDAP

DN from LDAP configurationGroup membership in LDAP directory is mapped to internal roles
LDAP Core ObjectExternal login mechanism based on LDAPDN from LDAP configurationInternal roles mapped to core objects

Client Certificate and LDAP

Client certificate login based on LDAP Configured attribute in certificateGroup membership in LDAP directory is mapped to internal roles

Client Certificate Internal

In the runtime system (Identity Manager operator UI and Smart ID Self-Service), this profile type is not recommended for production.  

Client certificate login based on internal userConfigured attribute in certificateRoles from internal roles table

Client Certificate Core Object

Client certificate login based on Core Objects
Configured attribute in certificate

Internal roles mapped to core objects

Smart Card and Core Object

This authentication profile is deprecated, but can still be used for older versions of Identity Manager. From PRIME 3.9, use Client Certificate Core Object.

Smart card certificateConfigured attribute in certificate

Internal roles mapped to core objects

Username and Password Core ObjectLogin with username and password based on core objectsUsername

Internal roles mapped to core objects

SAML SSO Core Object

External login with SAML SSO

Configured attribute in SAML token


Internal roles mapped to core objects

SAML SSO LDAPExternal login with SAML SSO. 

Configured attribute in SAML token

Group membership in LDAP directory is mapped to internal roles


Prerequisites

 Prerequisites

The following prerequisites apply:

Step-by-step instruction

 Log in to Identity Manager Admin
  1. Log in to Identity Manager Admin as an admin user.
 Set up authentication profile

To set up an authentication profile:

  1. Go to Home > Authentication Profiles.
  2. Click +New to add an authentication profile.
    1. Select a Profile type:

      The Internal profile is not available for selection, since it is created by default in any Identity Manager installation and only one internal profile is allowed.

    2. Enter a unique Priority number.
    3. Click Save + Edit.

      A new tab is displayed where the authentication profile is configured. See the following sections for how to configure the authentication profile you have selected.
  3. To edit an existing identity template, double-click on its name.

Configure profile types

The configuration of authentication profiles differs according to the different profile types.

Find your selected authentication profile type below and follow the instruction to set up the configuration.  

 Configure Internal profile

No further configuration required.

 Configure internal profile with client certificate
  1. In Certificate settings: select the method, which extracts the information from the certificate used to identify the user:
    1. User Principal Name (UPN)
    2. SAN Email (RFC822Name)
    3. Subject CN
    4. Subject Email

 Configure LDAP profile
  1. In Connection settings:
    1. In Connection string, enter the URL of the LDAP server and base address in the directory service, for example:

      Example: Connection string

      where

      ou = organizationalUnitName
      dc = domainComponent

      For more information on LDAP string attributes, see RFC 2253, LDAP (v3): UTF-8 String Representation of Distinguished Names.

    2. In Username and Password, enter the Active Directory domain user name and password. 
  2. In User search:
    1. Select Direct binding or With password comparison. Direct binding attempts to bind to the LDAP with the user entered. With password comparison the data of the LDAP entry is retrieved and the password is compared with the entered password.
    2. Enter a Search pattern. Here are two examples:

      Example: Search pattern

      Search pattern: (userPrincipalName={0})

      Example: Search pattern using Distinguished Name (DN) of user

      Search pattern: cn={0},ou=users

    3. If password comparison was selected, enter the Attribute for password used in LDAP and, if applicable, the mechanism that LDAP uses for Password encryption.
  3. In Group search:
    1. In Basis for group search, enter the subpath to the group information in LDAP.
      For example, if you find the group information under ou = groups, dc = myCompany, dc = de, enter the following:

      Example: Basis for group search
      Basis for group search: ou=groups
    2. In Filter for group search, enter a filter expression, that defines the search starting with the subpath above.

      For example, if the group membership of users is stored in a multi-value attribute member (via the DN), enter the following:

      Example: Filter for group search

      Filter for group search: (member={0})

    3. In Attribute for group, enter an attribute with unique values to define the group belonging. The groups to which the user belongs are compared in the last step with the assignment to the roles in the system and access to the system is assigned based on the assigned roles.

      For example, enter the following:

      Example: Attribute for group

      Attribute for group: cn

  4. Group Permissions
    1. Go to the LDAP Group Permissions tab to map the LDAP groups to internal Identity Manager roles.
    2. Click + to add an LDAP group to the Groups list
    3. Select the roles that should be assigned to that LDAP group in the Roles list.

 Configure LDAP Core Object profile
  1. In Connection settings:
    1. In Connection string, enter the URL of the LDAP server and base address in the directory service, for example:

      Example: Connection string

      where

      ou = organizationalUnitName
      dc = domainComponent

      For more information on LDAP string attributes, see RFC 2253, LDAP (v3): UTF-8 String Representation of Distinguished Names.

    2. In Username and Password, enter the Active Directory domain user name and password. 
  2. In User search:
    1. Select Direct binding or With password comparison. Direct binding attempts to bind to the LDAP with the user entered. With password comparison the data of the LDAP entry is retrieved and the password is compared with the entered password.
    2. Enter a Search pattern. Here are two examples:

      Example: Search pattern

      Search pattern: (userPrincipalName={0})

      Example: Search pattern using Distinguished Name (DN) of user

      Search pattern: cn={0},ou=users

    3. If password comparison was selected, enter the Attribute for password used in LDAP and, if applicable, the mechanism that LDAP uses for Password encryption.
  3. In User identification: enter details to map the userPrincipalName to a core object. 
    1. In Identity template, select one or more core object types, for example, Employee and Contractor, on which the core object search will be performed. The first matching template will be used.
    2. In User name field, select the core object field to match the user principal, for example UPN or Email. Identity Manager will use it to search the core object in the selected identity template.
    3. In User display, enter fields in a comma separated list, for example FirstName, LastName. These fields are used to display the logged in user in Identity Manager operator UI or Smart ID Self-Service.
 Configure Client Certificate and LDAP profile
  1. In Connection settings:
    1. In Connection string, enter the URL of the LDAP server and base address in the directory service, for example:

      Example: Connection string

      where

      ou = organizationalUnitName
      dc = domainComponent

      For more information on LDAP string attributes, see RFC 2253, LDAP (v3): UTF-8 String Representation of Distinguished Names.

    2. In Username and Password, enter the Active Directory domain user name and password. 
  2. In User search:
    1. Enter a Search pattern. Here are two examples:

      Example: Search pattern

      Search pattern: (userPrincipalName={0})

      Example: Search pattern using Distinguished Name (DN) of user

      Search pattern: cn={0},ou=users

    2. If password comparison was selected, enter the Attribute for password used in LDAP and, if applicable, the mechanism that LDAP uses for Password encryption.
  3. In Group search:
    1. In Basis for group search, enter the subpath to the group information in LDAP.
      For example, if you find the group information under ou = groups, dc = myCompany, dc = de, enter the following:

      Example: Basis for group search
      Basis for group search: ou=groups
    2. In Filter for group search, enter a filter expression, that defines the search starting with the subpath above.

      For example, if the group membership of users is stored in a multi-value attribute member (via the DN), enter the following:

      Example: Filter for group search

      Filter for group search: (member={0})

    3. In Attribute for group, enter an attribute with unique values to define the group belonging. The groups to which the user belongs are compared in the last step with the assignment to the roles in the system and access to the system is assigned based on the assigned roles.

      For example, enter the following:

      Example: Attribute for group

      Attribute for group: cn

  4. In Certificate settings: select the method, which extracts the information from the certificate used to identify the user:
    1. User Principal Name (UPN)
    2. SAN Email (RFC822Name)
    3. Subject CN
    4. Subject Email
  5. Group Permissions
    1. Go to the LDAP Group Permissions tab to map the LDAP groups to internal Identity Manager roles.
    2. Click + to add an LDAP group to the Groups list
    3. Select the roles that should be assigned to that LDAP group in the Roles list.
 Configure Client Certificate Core Object profile
  1. In Certificate settings: select the method, which extracts the information from the certificate used to identify the user:
    1. User Principal Name (UPN)
    2. SAN Email (RFC822Name)
    3. Subject CN
    4. Subject Email
  2. In User identification: enter details to map the userPrincipalName to a core object.
    1. In Identity template, select one or more core object types, for example, Employee and Contractor, on which the core object search will be performed. The first matching template will be used.
    2. In User name field, select the core object field to match the user, for example UPN or Email. Identity Manager will use it to search the core object in the selected identity template.
    3. In User display, enter fields in a comma separated list, for example FirstName,LastName. These fields are used to display the logged in user in Identity Manager operator UI or Smart ID Self-Service.
 Configure Smart Card and Core Object profile

This authentication profile is deprecated, but can still be used for older versions of Identity Manager. From PRIME 3.9, use the Client Certificate Core Object profil.

  1. In Certificate settings: select the method, which extracts the information from the certificate used to identify the user:
    1. User Principal Name (UPN)
    2. SAN Email (RFC822Name)
    3. Subject CN
    4. Subject Email
  2. In User identification: enter details to map the userPrincipalName to a core object.
    1. In Identity template, select one or more core object types, for example, Employee and Contractor, on which the core object search will be performed. The first matching template will be used.
    2. In User name field, select the core object field to match the user, for example UPN or Email. Identity Manager will use it to search the core object in the selected identity template.
    3. In User display, enter fields in a comma separated list, for example FirstName,LastName. These fields are used to display the logged in user in Identity Manager operator UI or Smart ID Self-Service.
 Configure Username with Password Core Object profile
  1. In User identification: enter details to map the userPrincipalName to a core object.
    1. In Identity template, select one or more core object types, for example, Employee and Contractor, on which the core object search will be performed. The first matching template will be used.
    2. In User name fieldselect the core object field to match the username, for example UPN or Email. Identity Manager will use it to search the core object in the selected identity template.
    3. In Password field, select the core object field holding the password, for example PasswordHash.
    4. In User display, enter fields in a comma separated list, for example FirstName,LastName. These fields are used to display the logged in user in Identity Manager operator UI or Smart ID Self-Service.
 Configure SAML SSO Core Object profile
  1. Prepare the required SAML configuration files. For file examples, refer to Enable two-factor authentication to Identity Manager clients via SAML federation.
    1. You need one metadata file for each Service Provider, that is, one file for Identity Manager operator UI, one file for Smart ID Self-Service and one file for other Service Providers that you configure.
    2. You also need the metadata file of your Identity Provider and a keystore containing all the keys you would like to use for encryption or signing.
  2. Go to the General tab and do the following settings:

    1. Check Activate SAML Authentication.
      With this switch you decide if SAML authentication should be used or not. This switch is disabled by default.
    2. In User identification, select SAML SSO Core Object.
      1. In Identity template, select one or more core object types, for example, Employee and Contractor, on which the core object search will be performed. The first matching template will be used.
      2. In User name field, select the core object field to match the user principal, for example UPN or Email. Identity Manager will use it to search the core object in the selected identity template.
      3. In User display, enter fields in a comma separated list, for example FirstName, LastName. These fields are used to display the logged in user in Identity Manager operator UI or Smart ID Self-Service.

  3. Go to the SAML Configuration tab and do the following settings:
    1. In Identity Provider Configuration:
      1. Upload a Configuration file 
        Here you can upload and delete the metadata file for an identity provider. The metadata file must contain only one identity provider configuration and no service provider configurations.

      2. Select an Attribute Type
        This is the identifying element of a SAML response. Despite the name, it can contain other elements than attributes. It can have two values, Name ID and Attribute Statement. Name ID refers to the subject of a SAML response, Attribute Statement refers to attributes associated with the subject of a SAML response.

      3. Enter Attribute Name
        This field is only active when Attribute Statement is selected as Attribute Type. It can be any arbitrary value.

    2. In Keystore Configuration:
      1. Upload a Configuration file
        Here you can upload and delete key store file. The key store file must contain the certificates and the private key used for signing and decryption. A key store is mandatory.  When a key store is uploaded, the key store's password must be entered. Objects in the key store, if protected with a password, must have the same password as the key store itself.
      2. Available key aliases
        List of the aliases that mark private keys in the key store.
    3. In Service Provider Configurations:
      1. Click on the + button to add a service provider. 
      2. This view lists the aliases of the service providers. Any arbitrary number of service providers is allowed but at least one service provider is required. An uploaded service provider must use only private keys available in the key store. If you upload a service provider metadata file that violates the SAML metadata schema, this triggers an error message.
    4. In Service Provider Details:
      1. Alias
        In this context, Alias refers to the location and thus the service provider to use when sending the SAML response to the application for processing. An Alias is mandatory.

        This is an example of an excerpt from a typical metadata file that defines the Assertion Consumer Service responsible for processing the SAML response. The Alias in this case is "explorer".

        Example: Excerpt from a metadata file
        ...
        <md:AssertionConsumerService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST" Location="http://hostname:8080/prime_explorer/saml/SSO/alias/explorer" index="0" isDefault="true"/>
        ...


      2. Configuration File
        Click on the upload symbol and select the metadata file. 

        This field is mandatory. The metadata file must contain only one service provider configuration and no identity provider configurations. If the file is deleted and re-uploaded, Alias must be reset according to the metadata file.
      3. Alias for Signing Key
        The alias from the key store for the private key to use for signing. This field is mandatory.
      4. Alias for Encryption Key
        The alias from the key store for the private key to use for encryption purposes. This field is mandatory.
 Configure SAML SSO LDAP profile
  1. Go to the General tab.
    1. Check Activate SAML Authentication.
      With this switch you decide if SAML authentication should be used or not. This switch is disabled by default.
    2. In User identification, select SAML SSO LDAP.
  2. Go to the SAML Configuration tab.
    1. Do the same settings as described above under heading "Configure SAML SSO Core Object profile".
  3. Go to the LDAP Configuration tab.
    1. If you have already a configured LDAP profile, copy the information to here. See heading "65493915" above.

      The Direct binding and With password comparison selection are NOT used for the SAML SSO LDAP profile.

  4. Go to the LDAP Group Permissions tab.
    1. See under heading "65493915" above.

This article is valid from PRIME 3.12.

Related information

  • No labels