Configuring VMware Identity Manager for Salesforce – Part 1

Now we’ll look at configuring SAML integration between VMware Identity Manager and Salesforce for Workspace ONE.

Definition:  Security Assertion Markup Language (SAML). It is an open standard which enables SSO for many different services and platforms. Authenticating with SAML allows a user to log in once per session.

Here are the defining components of SAML:

  • Service provider (i.e. an application.)
  • Identity provider (who is authenticated, and what authentication methods are used.)
  • End user who is accessing over SAML.

 

idp.png

  1. User starts the SAML Application
  2. Service Provider (SP) sends a request to the Identity Provider (IdP) for authentication
  3. If the user is not authenticated, the IdP requests authentication from the user. (I.e. username and password)
  4. The IdP then sends response to the SP with a token for that user.

 

To go through this guide, you’ll need the following. So load up, and let’s get poppin’

  1. A Salesforce login. First create a trial Salesforce developer account
  2. A VMware Identity Manager tenant at your disposal.

 

Now SAML can be explained as a way of making two parts speak the same language.

So what we are going to do now is:

Export the SAML Metadata from VMware Identity Manager

  1. Log on to your VMware Identity Manager-tenant (URL: mXXXXXX.vmwareidentity.eu/)2017-04-10_10-22-01.png2017-04-10_10-24-39.png2017-04-10_10-26-07.png
  2. 2017-04-10_10-28-36.png
  3. Right-click “Identity Provider (IdP) metadata” and choose “Save link as..chrome_2017-04-10_10-30-17.png
  4. Save the metadata file (idp.xml).

 

Add application from the catalog

 

Import the SAML Metadata File to Salesforce

  1. Now let’s start off by navigating to https://login.salesforce.com
  2. Enter your Salesforce username and password and hit “Login”.
  3. Type in “single” to find the SSO setting we will be configuring.
    chrome_2017-04-10_15-23-54.png
  4. Choose “Edit” and Select “SAML Enabled” to enable SSO with the SAML protocol.2017-04-10_15-28-55.png
  5. Choose “New from Metadate File”

    2017-04-10_15-30-58.png
  6. Now we upload the idp.xml that we downloaded from our VMware Identity Manager tenant. Hit “Create” and the SAML SSO settings will populate.2017-04-10_15-34-15.png
  7. Now we need to update the SAML Settings.  First off Select “Assertion contains the Federation ID from the User object.” and hit “Save”.2017-04-10_15-37-53.png
  8. Hit “Download Metadata”.2017-04-10_15-40-48.png
  9. Save the file it’ll be a .xml with a name similar to SAMLSP-XXDXXXXXXXXQ.xml.

 

Register your domain on Salesforce

Now that we’ve downloaded the SAML metadata file, we need to register our domain.

In the search box on the left, we will enter “my domain” and click “My Domain”.

2017-04-10_15-47-10.png

 

  1. In the field “Choose Your Domain Name”, enter a domain name.
  2. To confirm that it is available, hit “Check Availability.”
  3. Finish with hitting “Register Domain.”

2017-04-10_15-51-20.png

Now we wait for an e-mail from Salesforce, that the domain is ready.

chrome_2017-04-10_15-53-59.png

 

And after a few minutes:

2017-04-10_16-04-00.png

Now we return to “My Domain”, and edit the authentication configuration.

  1. In the search box on the left enter “my domain” and click “My Domain“.
  2. Next to “Authentication Configuration, hit “Edit“. 2017-04-10_16-06-53.png

 

That concludes part one!

If there are any topics or areas you’d like me to focus on, don’t hesitate to let me know! As always you can reach me at @UlvBjornsson, via the comments or by connecting with me on LinkedIn.

 

 

Installing VMware Identity Manager Connector

Hi again, and now we’ll go through how you install a VMware Identity Manager Connector.

First off with the prerequisites and some data you need to have to proceed through this guide:

You will need:

  • VMware Identity Manager-tenant
  • OVA-file (the VMware Identity Manager Connector software)
  • Set up a DNS record
  • Service Accounts: for binding to LDAP and domain joining the Connector
  • Connector activation code (which we gather from our VMware Identity Manager-tenant)

Read More »

Setting up AirWatch for Integration with Identity Manager: Part 2

Configure AirWatch settings in VMware Identity Manager to integrate AirWatch with VMware Identity Manager and enable the AirWatch feature integration options. The AirWatch API key and the certificate are added for VMware Identity Manager authorization with AirWatch.

Now if you are just jumping into this series, you need to know that you require to have this in place to complete the steps outlined here. If you haven’t you can check out Part 1.

  • AirWatch server URL that the admin uses to log in to the AirWatch admin console.
  • AirWatch admin API key that is used to make API requests from VMware Identity Manager to the AirWatch server to setup integration.
  • AirWatch certificate file used to make API calls and the certificate password. The certificate file must be in the .p12 file format.
  • AirWatch enrolled user API key.
  • AirWatch group ID for your tenant, which is the tenant identifier in AirWatch.

 

Read More »

Setting up AirWatch for Intergation with Identity Manager: Part 1

First off ensure you have this in place:

  • The organization group in AirWatch that you are configuring VMware Identity Manager is organization type: Customer.
  • REST API admin key for communication with VMware Identtiy Manager service and a REST enrolled user API key for AirWatch Cloud Connector password authentication are made at the same organization group where VMware Identity Manager is configured.
  • API Admin account settings and the admin auth certificate from AirWatch added to the AirWatch settings in the VMware Identity Manager admin console.
  • Active Directory user accounts set up at the asme organization group where  VMware Identity Manager is configured.
  • If end users are placed into a child organization group from where VMware Identity Manager is configured after registration and enrollment, User Group mapping in the AirWatch enrollment configuration must be used to filter users and their respective devices to the appropriate organization group.

You can find these in your AirWatch Admin console:

  • REST admin API key for communication: System -> Advanced -> API -> REST API
  • API Admin account for VMware Identity Manager and the admin auth certificate that is exported form AirWatch and added to the AirWatch settings in VMware Identity Manager.
  • REST enrolled user API key used for AirWatch Cloud Connector password authentication.

 

Read More »