Once you have at least one data store added on the New Experience, click Add an Application to integrate an app with SecureAuth IdP.
Make a selection from the application template library to start creating your app. The generic SAML Application template is used in this example.
NOTE: Prior to SecureAuth IdP version 9.3, the Web Admin was organized by realms you created. These realms contained applications you integrated with SecureAuth IdP, and included the configuration made on the following Web Admin tabs: Overview, Data, Workflow, Adaptive Authentication, Multi-Factor Methods, Post Authentication, API, Logs, and System Info.
In the New Experience, you configure equivalent portions of the Overview and Post Authentication tabs when adding an application to your Application Manager library.
Create the Application Name to be used to access the application in the Application Manager list – "Initech" in this example.
The Application Name appears in the Application Manager list.
The Application Name also appears in the title on the browser tab of the application login page.
Provide the Application Description – "Initech SAML Application" in this example.
The Application Description appears beneath the Application Name ("Initech" in this example) on the Summary page.
|
The Application Description appears beneath the "Page Header" of the realm tile on the Web Admin home page.
The Application Description also appears beneath the "Page Header" name in the realm list on the Web Admin realm page.
Upload a logo.
The logo precedes the Application Name on the Application Manager page.
The logo also appears on the login page beneath the "Page Header" name configured on the Classic Experience.
Begin typing the Data Store name, and then select the data store when it appears in the list.
Repeat this step to add all Data Stores to be associated with this application.
Enter the name of each group to be given access to this application, or toggle the switch to enable access to all Groups.
Look and Feel section
Details section
|
Select the Connection Type to specify how the service provider will send the authentication request to SecureAuth IdP – SP Initiated or IdP Initiated.
For SP Initiated, if required, specify if the connection should be made "By Redirect" (sending the authentication request with the related signature), or "By Post" (sending the authentication request with the signature embedded).
Post Authentication sectionCONFIGURE CONNECTION
The selection made in this field auto-populates the Redirect To field below. NOTE: This configuration can't be modified in the Classic Experience. |
Select the User ID Profile Field that is mapped to the data store property containing the end-user's identification from the application.
Select the Name ID Format to use in the assertion when submitting the end-user's identity profile.
User ID Mapping sectionUSER ID MAPPING
|
If you have a pre-configured metadata file, you can upload it by clicking Upload Metadata at the bottom right of the page.
The uploaded metadata file pre-populates fields on this page so you don't have to make individual entries. This functionality is new in SecureAuth IdP version 9.3 when using the generic SAML Application template.
Set a unique name for the IdP Issuer – this will be shared with the service provider.
Make the following entries, if required:
Set the Hours and Minutes for which the Assertion will be valid – this should be at least one hour.
Configure the Offset Minutes to accommodate time differences between devices being used.
Enable these functions if required:
SAML Assertion / WS Federation sectionSAML ASSERTION
|
If additional information from the directory is required in the SAML assertion, click Add SAML Attribute and configure settings for:
SAML Attributes / WS Federation sectionSAML ATTRIBUTES
|
Click Add Application to save the configuration.
In the Classic Experience, you click Save on each tab you configure on the Web Admin.
You can copy and paste this information in the service provider user interface:
If you specified an IdP Signing Certificate, you can click the link to Download it.
Click Download Metadata at the bottom right of the Information for Service Providers page.
Enter the Domain name in the popup window and click Download.
SAML Assertion / WS Federation sectionInformation for Service Providers / Download Metadata File
|
Click Continue to Summary at the bottom left of the Information for Service Providers page.
You can make edits to your configuration by clicking the pencil icon to the far right in each section of the Summary page.
NOTE: The link to the login page you created for the application appears beneath the Application Description ("Initech SAML Application" in this example). This link includes the realm number for the application. Use this link to test the application.
To modify the default Workflow, Two-Factor Authentication method, and Adaptive Authentication modules enabled for this application, go to the Classic Experience.