Configuring Service Provider Metadata in IdP
Aruba Central supports SAMLSecurity Assertion Markup Language. SAML is an XML-based framework for communicating user authentication, entitlement, and attribute information. SAML enables single sign-on by allowing users to authenticate at an identity provider and then access service providers without additional authentication. SSOSingle Sign-On. SSO is an access-control property that allows the users to log in once to access multiple related, but independent applications or systems to which they have privileges. The process authenticates the user across all allowed resources during their session, eliminating additional login prompts. authentication framework with various Identity Management vendors such as ADFS, PingFederate, Aruba ClearPass Policy Manager, and so on.
Aruba recommends that you look up the instructions provided by your organization for adding service provider metadata to the IdP server in your setup.
Some of the generic and necessary attributes required to be configured on the IdP server for SAML integration with Aruba Central are described in the following list:
URLUniform Resource Locator. URL is a global address used for locating web resources on the Internet. that provides service provider metadata.
——A unique string that identifies the service provider that issues a SAML SSO request. According to the SAML specification, the string should be a URL, although not required as URL by all providers.
—The URL that sends SAML SSO login requests and receives authentication response from the IdP.
—The attribute must include the email address of the user.
<NameID>johnnyadmin1@adfsaruba.com</NameID>
If the
attribute does not return the email address of the user, you can use the attribute. Ensure that you configure the or the attribute for each user.—The following example shows the syntax structure for SAML attributes:
#customer 1 # app1, scope1 aruba_1_app_1 = central aruba_1_app_1_role_1 = <readonly> aruba_1_app_1_group_1 = [groupx, groupy] aruba_1_app_2 = account_setting aruba_1_app_2_role_1 = <readonly>
#customer 2 # app1, scope1 aruba_2_app_1 = central aruba_2_app_1_role_1 = <readonly> aruba_2_app_1_group_1 = groupx, groupy aruba_2_app_2 = account_setting aruba_2_app_2_role_1 = <readonly>
Note the following points when defining SAML attributes in the IdP server:
—Customer ID. If you have multiple customers, define attributes separately for each customer ID.
—Application. Set the value to as per the following:
—central
—account_setting
Aruba Central assigns read-only role to the user.
—User role. Specify the user role. If no role is defined,Aruba Central. When a group is specified in the attribute, the user is allowed to access only the devices in that group. If the attribute does not include any group, Aruba Central allows SAML SSO users to access all groups. You can also configure custom attributes to add multiple groups if the user requires access to multiple groups.
—Group in
|
Aruba Central recommends you to configure the . However, If you do not return the application from the Idp, then the role is applied by default. |