OneWelcome as an external IDP
You can integrate STA with an external identity provider (IDP) to redirect network traffic from STA to the external IDP for user authentication. STA remains the primary IDP while orchestrating with an external or secondary IDP.
Here, OneWelcome is used as an external IDP.
Integrating STA with OneWelcome requires the following steps:
As a prerequisite, obtain the STA Redirect URI. Perform the following steps:
-
On the STA Management Console, click on the settings icon .
-
Under SETTINGS > AUTHENTICATION, click External Identity Provider , and click Setup.
-
On the External Identity Provider window, click Set up new IDP.
-
Under Redirect URI, click Copy to copy the redirect URI, and paste it into a text editor. You will need it while adding STA as a web client in OneWelcome.
Adding STA as a Web Client in OneWelcome
Perform the following steps to add STA as a web client in OneWelcome:
-
Log in to the OneWelcome administrator dashboard.
-
Go to the Configuration tab, and then the Web clients tab.
-
Under Web clients, click Add Web client.
-
Under Add Web client, in the Name field, enter a name for the application (for example, SafeNet Trusted Access). Do not change values of rest of the fields.
-
Under Credentials, perform the following steps:
-
In the Client ID field, click Generate to generate a unique client ID. Copy the ID and paste it in a text editor. You will need the client ID while adding OneWelcome as an external IDP in STA.
-
Under Authentication method, select the Client secret (basic authentication) option.
-
In the Client secret field, click Generate to generate a secret corresponding to the client ID that you generated in step a. Copy the client secret and paste it into the text editor. You will need the client secret while adding OneWelcome as an external IDP in STA.
-
-
Under OAuth settings, perform the following steps:
-
In the Grant types field, select Authorization code.
-
Ensure that JSON Web Token (JWT) is selected as Access token format.
-
In the Redirect URL field, enter the redirect URL that you obtained as a prerequisite.
-
Enter values in the rest of the fields as per your preferred configuration.
-
-
Scroll down, under Scopes, under Default Scopes, select email, openid, and profile.
-
Under User registration, in the Identity provider field, select an IDP as per your choice.
-
Do not change values in the rest of the fields.
-
Click Save.
-
On the Configuration tab, go to the System tab, and in the left pane, select JWT Key Configuration.
-
In the right pane, under JWT Key Configuration, copy the Discovery URL and paste it in the text editor. You will need it while adding OneWelcome as an external IDP in STA.
Adding OneWelcome as an External Identity Provider in STA
Perform the following steps to add OneWelcome as an external IDP in STA:
-
On the STA Management Console, on the External Identity Provider window, on the top-right side, click Edit.
-
Under Display Names, perform the following steps:
-
In the IDENTITY PROVIDER NAME field, enter a name for your IDP (for example, OneWelcome).
-
In the CREDENTIALS NAME field, enter the authentication method that the external IDP uses (for example, Password).
In policies, such names are used to identify the external IDP in the format, [Identity Provider Name] ([Credentials Name]) (for example, OneWelcome (Password)).
-
-
Under Server Details, perform the following steps:
-
In the CLIENT ID field, enter the client identifier that you copied earlier in step 5 (a) of Adding STA as a Web Client in OneWelcome. This is the OIDC application (client) ID that is used to identify OneWelcome.
-
In the CLIENT SECRET field, enter the shared secret that you copied earlier in step 5 (c) of Adding STA as a Web Client in OneWelcome. STA sends the OIDC shared secret to authenticate the redirection request using OneWelcome.
-
In the WELL-KNOWN CONFIGURATION ENDPOINT field, enter the Discovery URL of OneWelcome that you copied earlier in step 12 of Adding STA as a Web Client in OneWelcome.
-
Click Load to populate the Endpoint URLs and the Issuer fields.
-
-
Under User Mapping, perform the following steps:
-
In the REQUEST USER IDENTIFIER field, ensure that E-mail address is selected. This is the STA user attribute that is sent in the authentication request to the external IDP.
-
In the VERIFICATION USER IDENTIFIER field, ensure that the E-mail address is selected. The identifier is generally identical to the request user identifiers. This is the STA user attribute that is used to match with the content of the specified ID token claim.
-
In the VERIFICATION CLAIM NAME field, enter the name of your claim (for example, email.). This is the claim present in the returned ID token that contains the user identifier to be verified.
For demonstration purposes in this documentation, E-mail Address is used as a user attribute for user mapping. You can configure user mapping as per your preferred configuration.
-
-
Under Scope, in the SCOPE VALUE field, enter the scope values as openid, profile and email.
-
Click Save.
Adding OneWelcome as an authentication method in a STA policy
The external IDP OneWelcome is now an authentication method that you can add to STA policies and authentication scenarios.
-
On the STA Management console, select the Policies tab.
-
Select the icon to add a new policy or a scenario.
-
Enter a name and a description for the policy.
-
Under Scope, select the users and the applications, on which you want to apply the policy.
-
Under Decision, under Primary authentication requirements, click Change to select the authentication methods as per your preferred configuration.
-
If you want to keep OneWelcome as a mandatory authentication method, select External IDP as one of the Primary authentication requirements and select the OneWelcome (Password), which you have added in the above steps.
-
If you want to keep OneWelcome as optional or secondary authentication method, select External IDP as one of the Secondary authentication requirements and select the OneWelcome (Password), which you have added in the above steps.
It depends on the administrators how they choose to authenticate the organization's employees.
-
Click Save.
For more information, refer to the Add a Policy section in the STA Online Documentation.
Verify Authentication
Using the STA console
Navigate to the end application SSO URL.
You will be redirected to your STA sign-in page. Enter your primary directory login information, approve the two-factor authentication, and you should be redirected to the OneWelcome sign-in page. Enter your OneWelcome login credentials and you should be redirected to the application dashboard.
Using the STA user portal
Navigate to the user portal URL to log in to the STA user portal dashboard. On the dashboard, you will see a list of applications to which you have access. Click on the end application icon, you should be redirected to the OneWelcome sign-in page. Enter your OneWelcome login credentials and you should be redirected to the application dashboard.
Appendix: OneWelcome as an Identity Broker
Identity Brokers allow Service Providers to offer a selection of Identity Providers (authentication methods) to their customers via a single integration. An Identity Broker is an intermediary service that connects Service Providers (SPs) with multiple Identity Providers (IDPs).
Here, OneWelcome functions as an identity broker, redirecting any incoming requests to another IDP based on the configuration. This happens based on the scope parameter. Depending on the scope, OneWelcome decides which identity provider to redirect the authentication request.
This integration enables IDP flow orchestration between STA, OneWelcome ID Broker, and configured third-party IDP. In this external IDP integration, any request coming to STA will be redirected to the OneWelcome ID Broker, and from there, the flow is redirected to another IDP for authentication. Refer to the below workflow:
To configure a third-party IDP within the OneWelcome ID broker, refer to the OneWelcome documentation.