Integrate SafeNet Access Exchange (SAE) with PingFederate - OIDC
Integrating SafeNet Access Exchange (SAE) with PingFederate is a three-step process:
-
Configuring SafeNet Access Exchange as an OIDC authorization server in PingFederate
-
Configuring PingFederate as a client application in SafeNet Access Exchange
Configuring SafeNet Access Exchange as an OIDC authorization server in PingFederate
As prerequisites,
-
Obtain the issuer URL of the SafeNet Access Exchange instance by performing the following steps:
-
Open the SafeNet Access Exchange administrator console.
-
Switch to the respective realm from the top left corner.
-
In the left pane, under Configure, click Realm settings.
-
In the right pane, next to Endpoints, click on the OpenID Endpoint Configuration link to open the well-known endpoints of the SafeNet Access Exchange authorization server.
-
Copy the issuer URL and paste it into a text editor.
-
-
Ensure that the SSL certificate used to secure SafeNet Access Exchange HTTPS traffic is imported into the Trusted CA store in PingFederate. Refer to the steps listed here.
-
Ensure that the SAS User federation is enabled between your SafeNet Access Exchange instance and SAS PCE. Follow the steps listed here.
-
Ensure to have authentication policy contract setup in place. Follow the steps to create policy contract.
Perform the following steps to configure SafeNet Access Exchange as an OIDC authorization server in PingFederate:
-
Open the PingFederate administrative console. Go to the AUTHENTICATION tab.
-
In the right pane, select the IdP Connections tile.
-
Under IdP Connections, Click Create Connection.
-
Under IdP Connection, on the Connection Type tab, ensure that BROWSER SSO PROFILES check box is selected and OpenID Connect is selected as PROTOCOL, and then click Next.
-
On the Connection Options tab, ensure that BROWSER SSO check box is selected, and then click Next.
-
On the General Info tab, perform the following steps:
-
In the ISSUER field, enter the issuer URL that you obtained as a prerequisite, and then click Load Metadata.
-
In the CONNECTION NAME field, enter a name for the connection.
-
In the CLIENT ID field, enter a client ID. It can be an alphanumeric string or a fully qualified domain name (FQDN), depending on your preferred configuration.
-
Scroll down and click Next.
-
-
Under IDP Connection window, on the Browser SSO tab, click on Configure Browser SSO.
-
Under Browser SSO window, on the User-Session Creation tab, click Configure User-Session Creation.
-
Under User-Session Creation window, on the Target Session Mapping tab, click Map New Authentication Policy.
-
Under Authentication Policy Mapping, on the Authentication Policy Contract tab, in the AUTHENTICATION POLICY CONTRACT field, select policy contract, and then click Next.
-
On the Attribute Retrieval tab, ensure that the USE ONLY THE ATTRIBUTES AVAILABLE IN THE PROVIDER CLAIMS option is selected, and then click Next.
-
On the Contract Fulfillment tab, perform the following steps:
-
For each Authentication Policy Contract, in the Source column, select Provider Claims.
-
For each Authentication Policy Contract, in the Value column, select email or any other value as per your preferred configuration.
-
Click Next.
-
-
On the Issuance Criteria tab, click Next.
-
On the Summary tab, review the configuration, and then click Done.
-
Under User-Session Creation, on the Target Session Mapping tab, click Next.
-
On the Summary tab, review the configuration, and then click Done.
-
Under Browser SSO, on the User-Session Creation tab, click Next.
-
Under Browser SSO, on the Protocol Settings tab, review the configurations once. These settings are auto-populated based on the metadata loaded earlier. Click Next.
-
On the Summary tab, review the configuration, scroll down, and then click Done.
-
Under IdP Connection, on the Browser SSO tab, click Next.
-
Under IdP Connection, on the Activation & Summary tab, copy the value of Redirect URI.
-
Review the configuration, scroll down, and click Save.
Configuring PingFederate as a Client Application in SafeNet Access Exchange
After completing the first step of configuring SafeNet Access Exchange in PingFederate, the second step is to activate the PingFederate application in SafeNet Access Exchange by performing the following steps:
-
On the SafeNet Access Exchange console, under Manage, click Clients.
-
Click Create client.
-
On the Create client window, perform the following steps:
-
In the Client type field, select OpenID Connect.
-
In Client ID field, enter the client ID that you added in step 6 while configuring SafeNet Access Exchange an OIDC authorization server in PingFederate.
-
In the Name field, enter a name for the client.
-
Click Next.
-
-
Turn on the Client authentication toggle and click Next.
-
On the Login settings window, in the Valid redirect URIs field, enter the redirect URI that you copied in step 21 while configuring SafeNet Access Exchange as an OIDC authorization server in PingFederate.
-
Click Save.
-
The settings for the client you just created are now displayed. Go to the Credentials tab, copy the value of the Client secret field, and paste it in the text editor.
You need to enter the Client secret in the SafeNet Exchange connection settings in PingFederate. Open the SafeNet Exchange connection on the PingFederate console, paste the value of client secret in the CLIENT SECRET field, and then save the settings.
Verify Authentication
- Navigate to the application login URL (for example, Salesforce) and on the login page, click Log In with a Different Provider.
-
Search and select the identity provider name (for example, pfpce) that you created while configuring Salesforce.
You will be redirected to SAS PCE via PingFederate for authentication as per your selected flow.
If multiple IdP connections are configured in PingFederate, you will need to select the appropriate authentication system, as illustrated in the screen below. After making your selection, you will be redirected to SAS PCE via PingFederate for authentication as per your selected flow.
-
Enter your login credentials and you should be logged into the application after successful authentication.