HMSyncTOC("index.html", "cloud_auth_netiq.htm");

SAML configuration with NetIQ for the Work Portal

<< Click to Display Table of Contents >>

SAML configuration with NetIQ for the Work Portal

 

SAML configuration with NetIQ for the Work Portal

  •     Overview
  •     1. Generate certificates to sign assertions (mandatory)
  •     2. Configure your IdP in Bizagi
  •     3. Download the Bizagi metadata file
  •     4. Configure Bizagi as Service Provider in NetIQ Access Manager
  • Overview

    Bizagi supports integration with Identity and Access Management systems (i.e, Identity Managers or Identity Providers) which are SAML 2.0 compliant, such as NetIQ Access Manager.

    This section is a step-by-step guide to the configuration you need to do, both in NetIQ and in Bizagi, to have an integrated authentication in Bizagi against NetIQ Access Manager.

     

    SAML_NetIQ_OV

     

    SAML 2.0, requires that both your Identity Provider and your Bizagi project are set up to support HTTPS.

    For introductory information about SAML 2.0, refer to Authentication via SAML.

     

    1. Generate certificates to sign assertions (mandatory)

    This step is not bound to Bizagi nor restricted by any special requirement of Bizagi (you normally do it yourself).

    If you need some guidance or an example on this step, refer to Certificates for SAML 2.0 authentication.

     

    To proceed with these guided steps, you need to have:

    One certificate to sign assertions (mandatory) in .P12 or .PFX  file format. You need The password for the certificate file, as defined by you when you exported the public and private keys.

    One certificate to encrypt messages (optional) in .P12 or .PFX  file format. You need The password for the certificate file, as defined by you when you exported the public and private keys.

     

    note_pin

    You will need to be in charge of managing your installed certificates (keep track of its expiration date and other relevant maintenance aspects such as changes in your Identity Provider's endpoints).

     

    2. Configure your IdP in Bizagi

    After you configure the application in Azure AD, now you must access the Bizagi Studio or the Management Console and register the Identity Provider. Follow the steps in Configure a SAML 2.0 IdP in Bizagi.

     

    3. Download the Bizagi metadata file

    After you configure the identity provider in Bizagi, you must generate the metadata file. Refer to Download the metadata file.

     

    4. Configure Bizagi as Service Provider in NetIQ Access Manager

    You do this in the NetIQ Access Manager admin options.

     

    4.1. Log in to the NetIQ Access Manager Access Manager.

     

    4.2. From the menu select Devices -> Identity Servers -> <YOUR_SERVER>.

    Replace <YOUR_SERVER> with the name of your configured NetIQ Access Manager server/cluster.

     

    4.3. Enable the SAML 2.0 protocol for your NetIQ Access Manager server (or servers/clusters).

    Check the SAML 2.0 checkbox found in Enabled protocols:

     

    NetIQ_1

     

    Click OK when done.

     

    4.4. Click new on the enabled SAML 2.0 tab menu.

    Select Service Provider from the drop-down options to register Bizagi so that its connection is trusted:

     

    NetIQ_2

     

    4.5. Fill in:

    Provider type: General

    Source: Metadata Text

    Name: Provide a unique identifier that is clear and describes the purpose of the service. Using Bizagi's URL is good.

    Text: Paste the content of Bizagi's metadata.xml file as produced in step #3.

     

    NetIQ_3

     

    Click Next when done.

     

    2.6. Confirm the certificate.

    Review the certificate's details to make sure they are accurate (the metadata.xml file has the certificate employed by Bizagi). Then click Finish.

     

    NetIQ_4

     

    4.7. Locate the recently-added Service Provider (Bizagi), and click it.

    You can specify which information (attributes) is returned within a response (assertion).

     

    NetIQ_5

     

    4.8. Locate the Attributes tab. For its Attribute set, select Email.

    Use the arrow icons to pass this attribute into the Available list on the right:

     

    NetIQ_6

     

    Click Apply when done.

     

    4.9. In the Authentication Response tab, select POST for Binding.

    Check the Email checkbox and confirm that its Value shows the corresponding email attribute configuration you selected.

     

    NetIQ_7

     

    Click Apply when done.

     

    4.10. In the upper menu, select the Security -> Trusted Roots tab.

    In that tab, import the certificate so that these are localizable at NetIQ Access Manager's trusted key store.

    These steps are not always needed if you are not working with self-signed certificates. If this is you case, then you may skip or simply review steps 2.10 through 2.15.

     

    4.11. Click Import... to install the certificate (.cer, or .crt file):

     

    NetIQ_8

     

    4.12. Use the Choose File button to locate the certificate. Give it a meaningful name in the Certificate name field:

     

    NetIQ_9

     

    Click OK when done.

     

    4.13. Click Add Trusted Roots to Trusted Store... and select the certificate you just imported to add it to the root trusted store:

     

    NetIQ_10

     

    4.14. Select your certificate and trusted stores:

     

    NetIQ_11

     

    4.15. Click OK when done.

    You may need to restart your NetIQ Access Manager services.

     

    NetIQ_12

     

    4.16. In the upper menu, select Devices -> Identity servers -> <YOUR_SERVER>.

    You should replace <YOUR_SERVER> with the name of your configured NetIQ Access Manager server/cluster.

     

    NetIQ_13

     

    4.17. In the SAML 2.0 tab, check the Encrypt assertions checkbox to have NetIQ Access Manager encrypt messages it sends to Bizagi.

     

    NetIQ_14

     

    Do not check the Encrypt name identifiers checkbox.

    Save your changes and exit when done.

    You have now configured your NetIQ Access Manager Access Manager to rely on SAML 2.0 for an integrated authentication with Bizagi!

     

    Now when you run the Work Portal, Bizagi displays the IdP log-in page and users can be authenticated with your Identity Provider.

     

    note_pin

    Remember to do this configuration in all your environments, or to deploy security configurations in your target environments, for example, test or production environments.

    In this article