[ZTA] How to work with IIJ ID SAML

This article will guide you on how to integrate IIJ ID into Safous ZTA service as the external Identity Provider for authentication.

Prerequisites

Before continuing the steps in this article, please ensure you:

  • Have an account in IIJ ID with ID Administrator Management privilege

Configuring Application in IIJ ID

  1. Login to your IIJ ID portal.
  2. Once logged-in, navigate to Application > Application Management

  3. In Application Management click "Add Application" > "Add Custom Application"
  4. In type selection, please select SAML Application option and click "Next"
  5. The next page will be open, which prompts you to fill the form that is being provided. Once filled, click "Add Application".
    • Application Name is a mandatory field used to distinguish one application from another.
    • Application description is an optional field used to provide a description of the application.
    • Application logo is an optional feature to add custom logo for your application 
    • For Select an ID provider, please make sure to select "Use application-specific entity ID"
  6. Now, your newly created application can be seen on Application Management, then click "edit" on the application which will redirect you to the setting page of the application.
  7. Click on the Federation tab. Configure the settings below:

    1. On SAML Basic Information, click on the Enter SAML information radio button.

    2. Enter the callback URL generated on Safous admin portal in the Single sign-on URL field.

      This callback URL is automatically generated when the admin has added a new IdP on the Safous Admin portal

      (e.g https://login.<tenant>.ztna.safous.com/v1/auth/saml/1/callback).

      As currently we have not yet configured anything on the Safous Admin portal, we will re-check it later and continue for now.

    3. Enter a value to be used for the application's Entity ID. Please take a note of this value as we will use it later.

    4. Click on the NameID format and choose urn:oasis:names:tc:SAML:2.0:nameid-format:persistent.

    5. Choose RSA-SHA1 for the Assertion signing algorithm.

  8. Still on the Federation tab, scroll down to the Specifying User Identifier (NameID) section.
    1. For Mapped user attribute, choose "ID" from the dropdown.
    2. For Attribute Mapping (User Attribute) click "Add Mapping".
    3. Once done,click "Update".
  9. Go to Application User tab, then click "Add Application user"
  10. In the Add Application User page, you can choose to add the Application User based on users or groups
  11. Once you add the necessary users and/or groups, you need to choose "Display the icon" on Display on my Application option. Then click "Add Application user"
  12. Every users that you added will be shown in the Application User details
  13. Click on the ID Provider tab and take note or copy of all the values displayed. We will use it later to do IdP configuration on Safous Admin portal.
  14. The table below lists and mapped out all the information needed from IIJ ID to configure it as external IdP on the Safous Admin portal.
    IIJ ID Safous
    (Federation) Entity ID Entity Issuer
    (ID Provider) Entity ID SSO Issuer
    SSO Endpoint URL (POST binding) SSO URL
    PEM CA Trusted Certificate

Configuring IdP in Safous Admin Portal

  1. Go to Settings > ZTNA > Configurations > Identity Providers and click on the New IdP button.
  2. Enter the IdP name and ensure the status is enabled (green). In this example, we named it to IIJ ID - Example.
  3. Ensure you are choosing SAML for the identity provider setting.
  4. Paste your copied (Federation) Entity ID value in Entity Issuer field.

  5. Paste your copied (ID Provider) Entity ID value in SSO Issuer field.
  6. Paste your copied SSO Endpoint URL (POST binding) value in SSO URL field.
  7. Paste your copied PEM value in CA TrustedCertificate field.
  8. For Attribute Mapping, input email in Username and Email fields.
  9. Please refer to this article for the rest of Safous ZTNA SAML configurations.
  10. Once you are done with the configuration, click on the "Save" button.
  11. Recheck the generated "Redirect URI", does it match the one you configured in IIJ ID or not.

  12. If the "Redirect URI" matches, you can leave it as is, but if it is not, you need to change the one in IIJ ID to match the generated Redirect URI in Safous Admin portal.
  13. After everything has been configured correctly, you can try to log in to the user portal at https://login.<tenant>.ztna.safous.com. Select "With IdP" and notice that now there is an option to "Continue with IIJ ID".