Use this guide to enable Multi-Factor Authentication access via SAML 2.0 to the Apache HTTP Server using Shibboleth SP.
1. Have an Apache HTTP Server running IIS 7.X+
2. Have SecureAuth IdP 7.X+
3. Create a New Realm for the Apache HTTP Server integration
4. Configure the following tabs in the Web Admin before configuring the Post Authentication tab:
- Overview – the description of the realm and SMTP connections must be defined
- Data – an enterprise directory must be integrated with SecureAuth IdP
- Workflow – the way in which users will access this application must be defined
- Multi-Factor Methods – the Multi-Factor Authentication methods that will be used to access this page (if any) must be defined
1. Read the NativeSPWindowsInstall Article
https://wiki.shibboleth.net/confluence/x/K4FC
2. Download the Shibboleth SP .msi file
http://shibboleth.net/downloads/service-provider/2.5.3/win64/shibboleth-sp-2.5.3-win64.msi
3. Install the .msi file on the client (application web server)
Do NOT install the .msi file on the SecureAuth IdP server
4. Reboot
6. Start the Shibboleth Service from the command line
c:\> sc start shibd_default
Shibboleth Service Information
- The filter that is plugged into the web server connects to the
shibd
process which processes the SAML assertion - The primary configuration file for the filter and the Shibboleth daemon,
shibd
, is located at\etc\shibboleth\shibboleth2.xml
(within the directory used to install the SP software) shibd
creates its own log at\var\log\shibboleth\shibd.log
and must have appropriate read and write permissions itself for the entire installation directory
1. Select SAML 2.0 (SP-initiated) Assertion from the Authenticated User Redirect dropdown in the Post Authentication tab in the Web Admin
2. An unalterable URL will be auto-populated in the Redirect To field, which will append to the domain name and realm number in the address bar (Authorized/SAML20SPInit.aspx)
3. Set the SAML Consumer URL to the Fully Qualified Domain Name (FQDN) of the Apache server, followed by /nameofiisapplication/Shibboleth.sso, e.g. https://www.company.com/someiisapplication/Shibboleth.sso
4. Provide the Domain in order to Download the Metadata File to send to Apache (if required)
The SAML Issuer should match the entity ID in shibboleth2.xml and the idpmetadata
file on the client
Ensure the <SSO> entity ID matches in shibboleth2.xml and the SecureAuth IdP metadata file
Click Save once the configurations have been completed and before leaving the Post Authentication page to avoid losing changes