Software as a service (SaaS) is a software distribution model in which a third-party provider hosts applications and makes them available to customers over the Internet. SaaS is one of three main categories of cloud computing, alongside infrastructure as a service (IaaS) and platform as a service (PaaS).
Now we’ll look at configuring SAML integration between VMware Identity Manager and Salesforce for Workspace ONE.
Definition: Security Assertion Markup Language (SAML). It is an open standard which enables SSO for many different services and platforms. Authenticating with SAML allows a user to log in once per session.
Here are the defining components of SAML:
Service provider (i.e. an application.)
Identity provider (who is authenticated, and what authentication methods are used.)
End user who is accessing over SAML.
User starts the SAML Application
Service Provider (SP) sends a request to the Identity Provider (IdP) for authentication
If the user is not authenticated, the IdP requests authentication from the user. (I.e. username and password)
The IdP then sends response to the SP with a token for that user.
So if you were used to installing the ACC (AirWatch Cloud Connector) or the Linux appliance vIDM (VMware Identity Manager Connector), you should know that these two products have now been tied into one and have been branded VMware Enterprise Systems Connector.
Which I think is great, as editing a Linux appliance and bash, sudo, cat, vi. Yeah, it was fun.
I’ll walk you through the installation of the VMware Enterprise Systems Connector and enterprise integration.
In this article I’ll walk you through the steps needed to connecting to your Microsoft Azure environment, as well as giving you a glimpse of how you can manage it by starting up a IaaS virtual machine.
There is endless potential, to what you can manage and automate of Azure resources with PowerShell, but from here to there, first step is connecting it!
The organization group in AirWatch that you are configuring VMware Identity Manager is organization type: Customer.
REST API admin key for communication with VMware Identtiy Manager service and a REST enrolled user API key for AirWatch Cloud Connector password authentication are made at the same organization group where VMware Identity Manager is configured.
API Admin account settings and the admin auth certificate from AirWatch added to the AirWatch settings in the VMware Identity Manager admin console.
Active Directory user accounts set up at the asme organization group where VMware Identity Manager is configured.
If end users are placed into a child organization group from where VMware Identity Manager is configured after registration and enrollment, User Group mapping in the AirWatch enrollment configuration must be used to filter users and their respective devices to the appropriate organization group.
You can find these in your AirWatch Admin console:
REST admin API key for communication: System -> Advanced -> API -> REST API
API Admin account for VMware Identity Manager and the admin auth certificate that is exported form AirWatch and added to the AirWatch settings in VMware Identity Manager.
REST enrolled user API key used for AirWatch Cloud Connector password authentication.
We are going to connect your AirWatch environment with your Active Directory. We will be using the Directory Services page to configure the settings that let you integrate your AirWatch server with your organization’s domain controller (the server hosting your directory services system).
The scenario outlined in this tutorial assumes that you already have the following items: