SAS - IntegrationGuide Apache HTTP Server SAML
SAS - IntegrationGuide Apache HTTP Server SAML
Integration Guide
Description
SafeNet Authentication Service delivers a fully automated, versatile, and strong authentication-as-a-service
solution.
With no infrastructure required, SafeNet Authentication Service provides smooth management processes and
highly flexible security policies, token choice, and integration APIs.
The Apache HTTP Server, colloquially called Apache, is the world's most widely-used web server software.
Apache is developed and maintained by an open community of developers under the auspices of the Apache
Software Foundation. Most commonly used on a UNIX-like system, the software is available for a wide variety of
operating systems, including UNIX, FreeBSD, Linux, Solaris, Novell NetWare, OS X, Microsoft Windows, OS/2,
TPF, OpenVMS, and eComStation.
This document describes how to:
Deploy multi-factor authentication (MFA) options in Apache HTTP Server using SafeNet OTP authenticators
managed by SafeNet Authentication Service.
Configure SAML authentication in Apache HTTP Server using SafeNet Authentication Service as an identity
provider.
It is assumed that the Apache HTTP Server environment is already configured and working with static
passwords prior to implementing multi-factor authentication using SafeNet Authentication Service.
Apache HTTP Server can be configured to support multi-factor authentication in several modes. The SAML
authentication will be used for the purpose of working with SafeNet Authentication Service.
Applicability
The information in this document applies to:
SafeNet Authentication Service (SAS)SafeNets cloud-based authentication service
SafeNet Authentication Service Service Provider Edition (SAS-SPE)A server version that is used by
Service providers to deploy instances of SafeNet Authentication Service
SafeNet Authentication Service Private Cloud Edition (SAS-PCE)A server version that is used to
deploy the solution on-premises in the organization
Audience
This document is targeted to system administrators who are familiar with Apache HTTP Server, and are
interested in adding multi-factor authentication capabilities using SafeNet Authentication Service.
SAML Protocol
SAML Protocol
SAML Protocol
2
1. A user attempts to log on to Apache HTTP Server. The user is redirected to SafeNet Authentication Service.
SAS collects and evaluates the user's credentials.
2. SAS returns a response to Apache HTTP Server, accepting or rejecting the user`s authentication request.
SAML Prerequisites
To enable SafeNet Authentication Service (SAS) to receive SAML authentication requests from Apache HTTP
Server, ensure that the end users can authenticate from the Apache HTTP Server environment with a static
password.
where, in <Location /secure>, secure is the location of the web page (including the filename) on which
SAML authentication is applied. For example, if /var/www/html is the location where the website is
hosted, and you replaced secure with my_secure/my_website.html, the resultant path will be
/var/www/html/my_secure/my_website.html on which SAML authentication will be applied. In this case,
my_website.html is the name of the web page.
2. From the /etc/selinux location, edit the config file, and set the following:
SELINUX=permissive
3. Save and close the config file, and then run the following command:
setenforce 0
a. Update the ApplicationDefaults element as below. Replace DNS or IP of Apache with the DNS
or IP address of the Apache HTTP Server. Configure the REMOTE_USER field with the uid
created previously in section 4:
<SSO entityID="https://idp1.cryptocard.com/idp/shibboleth">
SAML2 SAML1
</SSO>
7. Run the following commands to restart the Apache and Shibboleth services:
All SafeNet Authentication Service documentation can be found on the SafeNet Knowledge Base site.
Replace DNS or IP of Apache with the DNS or IP address of the Apache HTTP Server. The metadata will get
downloaded automatically. Save it with the .xml extension (for example, metadata.xml).
2. Click the COMMS tab, and then click SAML Service Providers.
3. In the SAML Service Providers module, click the SAML 2.0 Settings link.
4. Click Add.
NOTE: The remaining options are used to customize the appearance of the logon
page presented to the user. For more information on logon page customization,
refer Configure SAML Service in the SAML Configuration Guide:
http://www2.safenet-inc.com/sas/implementation-guides/sas-on-prem/SAS-QS-
SAML.pdf
Name Value
http://schemas.microsoft.com/ws/2008/06/identity/claims/uid According to ThirdParty
Product Requirements
http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccount According to ThirdParty
name Product Requirements
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress According to ThirdParty
Product Requirements
http://schemas.xmlsoap.org/claims/EmailAddress According to ThirdParty
Product Requirements
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name According to ThirdParty
Product Requirements
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname According to ThirdParty
Product Requirements
http://schemas.xmlsoap.org/claims/CommonName According to ThirdParty
Product Requirements
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier According to ThirdParty
Product Requirements
principal According to ThirdParty
Product Requirements
2. Click the ASSIGNMENT tab, and then search for the required user.
5. Click Add.
International 1-410-931-7520