RSA Secured Implementation Guide For VPN Products: 1. Partner Information
RSA Secured Implementation Guide For VPN Products: 1. Partner Information
1. Partner Information
2. Contact Information
Page: 1
3. Solution Summary
Feature Details
Integration Overview
Juniper Networks NetScreen-SA IVE version 4.1 can provide Single-Sign-On (SSO) to RSA ClearTrust
via the RSA Federated Identity Manager (FIM) version 2.5. Juniper IVE can act as a SAML Asserting
Party (AP) for the RSA FIM by passing SAML authentication assertions to the RSA FIM for processing.
Users are then automatically provided with a ClearTrust Single Sign-On session cookie via the FIMs
RSA ClearTrust ticket plug-in. This prevents the need to perform additional authentication(s) to
ClearTrust-protected resources once a user has successfully authenticated to the SSL VPN.
Juniper Networks NetScreen-SA 3000 version 4.1 supports SAML 1.1 and the BAP and BPP Web SSO
profiles.
4. Product Requirements
Page: 2
5. Product Configuration
4. In the Resources section, specify the resources to which this policy applies. See the IVE
Administration Guide for more information.
Page: 3
Policy applies to ALL roles
To apply this policy to all users.
Policy applies to SELECTED roles
To apply this policy only to users who are mapped to roles in the Selected roles
list. Make sure to add roles to this list from the Available roles list.
Policy applies to all roles OTHER THAN those selected below
To apply this policy to all users except for those who map to the roles in the
Selected roles list. Make sure to add roles to this list from the Available roles list.
The IVE performs a single-sign on (SSO) request to the specified URL using the
data specified in the SAML SSO details section. The IVE makes the SSO request
when a user tries to access to a SAML resource specified in the Resources list.
Do NOT use SAML
The IVE does not perform a SSO request.
Use Detailed Rules
To specify one or more detailed rules for this policy. See IVE Administration Guide
for more information.
7. In the SAML SSO Details section, specify:
SAML Assertion Consumer Service URL
Page: 4
Enter the URL that the IVE should use to contact the assertion consumer service
(that is, the access management server). For example: https://hostname/acs.
(Note that the IVE also uses this field to determine the SAML recipient for its
assertions.)
Important: If you enter a URL that begins with HTTPS, you must install the
assertion consumer services root CA on the IVE (as explained in the
Certificates section of the IVE Administration Guide).
Profile
Select POST to indicate that the IVE should push information to the assertion
consumer service during SSO transactions. You must also select the certificate
you will be using to sign assertions, as this is required in the Browser POST
Profile.
Select Artifact to indicate that the assertion consumer service should pull
information from the IVE during SSO transactions.
Source ID
Enter the Source ID for the IVE. If you enter a:
Plain text stringThe IVE converts, pads, or truncates it to a 20-byte string.
Base-64 encoded stringThe IVE unencodes it and ensures that it is 20 bytes.
If your access management system requires base-64 encoded source IDs, you can
create a 20 byte string and then use a tool such as OpenSSL to base-64 encode it.
Important: The IVE identifier (that is, the source ID) must map to the following
URL on the assertion consumer service (as explained in Trusted application
URLs on page 3):
https://<IVEhostname>/dana-ws/saml.ws
Issuer
Page: 5
Enter a unique string that the IVE can use to identify itself when it generates
assertions (typically its hostname).
Important: You must send a username or attribute that the assertion consumer
service will recognize (as explained in User Identity in the IVE Administration
Guide). For a default ClearTrust installation, the name format would be
uid=<USER>. If you are using a different Name Format for ClearTrust/FIM
mapping, you must enter the appropriate value.
9. In the Web Service Authentication section, specify the authentication method that the IVE
should use to authenticate the assertion consumer service:
None
Do not authenticate the assertion consumer service.
Username
Authenticate the assertion consumer service using a username and password.
Enter the username and password that the assertion consumer service must send
the IVE.
Page: 6
Certificate Attribute
Authenticate the assertion consumer service using certificate attributes. Enter the
attributes that the assertion consumer service must send the IVE (one attribute per
line). For example, cn=sales. You must use values that match the values contained
in the assertion consumer services certificate.
Important: If you select this option, you must install the assertion consumer
services root CA on the IVE (as explained in Certificates in the IVE
Administration Guide).
10. Cookie DomainEnter a comma-separated list of domains to which we send the SSO
cookie.
Note: The session timeouts on the IVE and your access management system may not
coordinate with one another. If a users RSA ClearTrust session cookie times out before his
IVE cookie (DSIDcookie) times out, then single sign-on between the two systems is lost.
The user is forced to sign in again when he times out of the access management system.
Page: 7
1. Configure the Asserting Party Settings:
Note the SOAP Binding Service URL and SourceID obtained from the IVE.
2. Configure settings for Web SSO
Important: It is required that you select MUST NOT contain a subject namespace in
this section. Then select the RSA_ClearTrust_X.509_Subject_Plug-in from the drop-
down box.
The IVE will also send the IP Address and DNS address if available, so set these two
parameters to MAY.
3. Configure settings for Digital Signatures:
Note that for BPP the IVE only signs SAML responses, not the assertions themselves, so if
signatures are required, set the responses to MUST be signed and the assertions MUST
NOT be signed.
Note also that for BAP, the IVE does not sign responses. Signing of responses is only
supported with BPP.
Page: 8
6. Certification Checklist for VPN Products
Date Tested: 05/18/04
Note: All VPN test cases assume that Partner Product is configured as the
Asserting Party (AP) and the RSA Federated Identity Manager (FIM) is
configured as the Relying Party (RP).
SAML SAML
SAML Asserting Party (AP)
1.0 1.1
Partner Product produces valid authentication assertion in response to valid
P
authentication query from FIM
RSA FIM consumes valid authentication assertion, requested in valid
P
authentication query to Partner Product
Partner Product produces valid attribute assertion in valid response to attribute
N/A
query from FIM
RSA FIM consumes valid attribute assertion, requested in valid attribute query
N/A
to Partner Product
Partner Product produces valid assertions in valid response to
N/A
AssertionIDReference request from FIM
RSA FIM consumes valid assertions, requested in valid AssertionIDReference
N/A
request to Partner Product
Page: 9
7. Notes
The session timeouts on the IVE and your access management system may not
coordinate with one another. If a users RSA ClearTrust session cookie times out before his
IVE cookie (DSIDcookie) times out, then single sign-on between the two systems is lost.
The user is forced to sign in again when he times out of the access management system.
The IVE does not support attribute statements, which declare specific details about the
user (such as John Smith is a member of the gold group).
The IVE can consume and enforce an authorization decision statement however; these
types of SAML statements are not currently supported by RSA FIM.
8. Known Issues
Important: The IVE has been tested and does not work with FIM 2.0.
Page: 10