Deployment Overview
You can configure Single Sign-On to use SAML authentication and enable your users to log in through one portal and get access to multiple services.
This document describes how to set up SAML authentication through the WatchGuard Access Portal with OneLogin as the Identity Provider.
Integration Summary
Hardware and Service Versions:
- OneLogin
- Firebox with Fireware v12.7
Test Topology
This integration uses OneLogin Portal to communicate with a WatchGuard Firebox over a public internet connection.
Configure Your Firebox
Because the WatchGuard Access Portal is a subscription service, before you can enable the Access Portal feature and configure it on your Firebox, you must add an Access Portal license to your Firebox feature key.
To configure the Access Portal settings on your Firebox for OneLogin:
- Log in to Fireware Web UI.
- Select Subscription Services > Access Portal.
The Access Portal page appears with the Applications tab selected by default. - Select the Enable Access Portal check box.
- Select the SAML tab.
The SAML tab appears. - Select the Enable SAML check box.
- In the Service Provider (SP) Settings section, type the IdP Name and Host Name.
You add the IdP settings later in this process.- IdP Name — Specify a name for the SAML authentication to appear in other Firebox settings as the server name.
- Host Name — Specify the fully qualified domain name that resolves to the Firebox external interface.
- Select Save.
- Go to https://<host name>/auth/saml.
- Make sure you have this information from the /auth/saml page:
- SAML Entity ID in this format: https://<host name>/auth/saml.
- Assertion Consumer Service (ACS) URL in this format: https://<host name>/auth/saml/acs.
- Single Logout Service (SLS) URL in this format: https://<host name>/auth/saml/sls.
- Copy the certificate.
Configure OneLogin
To import the information from the WatchGuard Web UI and to get the IdP Metadata URL:
- Log in to your OneLogin Administration account.
- Select Applications > Applications > Add App.
- In the search text box, type SAML Test Connector.
A list of connector options appears. - Select SAML Test Connector (Advanced).
- On the Portal page, in the Display Name text box, type a descriptive name.
- To enable your users to see the configuration in the portal, select Visible in portal. Select an icon option and upload the icon:
- Rectangular Icon
- Square Icon
- Click Save.
- From the navigation, select the Configuration tab.
- Specify these settings:
RelayState
Leave blank.
Audience
https://<your host name>/auth/saml
The label in the Access Portal pages is SAML Entity ID.
Recipient
https://<your host name>/auth/saml/acs
The label in the Access Portal pages is Assertion Consumer Service (ACS) URL.
ACS (Consumer) URL Validator
https://<your host name>/auth/saml/acs
The label in the Access Portal pages is Assertion Consumer Service (ACS) URL.
ACS (Consumer) URL:
https://<your host name>/auth/saml/acs
The label in the Access Portal pages is Assertion Consumer Service (ACS) URL.
Single Logout URL
https://<your host name>/auth/saml/sls
- From the SAML signature element drop-down list, select Assertion.
- Select the Encryption assertion check box.
- From the SAML encryption method drop-down list, select AES-256-CBC.
- Keep the default values for all other settings.
- Click Save.
- Select the Configuration tab.
- In the SAML Encryption section, for the Public key, paste the certificate you copied from the WatchGuard SAML 2.0 Configuration for WatchGuard Access Portal.
- Select the Parameters tab.
- In the Credentials are section, select Configured by admin.
- Verify that the NameID value setting is Email.
- Click +, in the Field name text box, type memberOf. In our example, we use group authentication, if you want to use user authentication, skip steps 20–24.
- Select the Include in SAML assertion check box.
- Click Save.
- From the Value drop-down list, select MemberOf.
- Click Save.
- Select the SSO tab.
- From the SAML Signature Algorithm drop-down list, select SHA-256.
- Copy the value of Issuer URL.
You will add this URL in the SAML configuration under the IdP Metadata URL. - To enable assumed sign-in, select the Allow assumed users to sign into this app check box.
- Keep the default values for all other settings.
- Click Save.
- To create a group for users, select Users > Groups > New Group.
- In the Untitled Group text box, type a descriptive name for the group.
- From the Security policy drop-down list, select Default policy.
- Click Save.
- To add a user in OneLogin, select Users > Users > New User.
You can add your own user information.
- Click Save User.
- Select Users > Users and select the user you created.
- Select the Authentication tab, from the User security policy drop-down list, select Default policy.
- Select the Applications tab, in the Applications section, click +.
- From the Select application drop-down list, select SAML Test Connector (Advanced) you created.
- Click Continue.
- Select the Allow the user to sign in check box.
- Verify the value of NameID value is the email address of the user you created.
- In the memberOf text box, type the group name you created.
- Click Save.
- Click Save User.
Complete the WatchGuard SAML Setup
From Fireware Web UI:
- Select Subscription Services > Access Portal.
- Select the SAML tab.
- In the IdP Metadata URL text box, paste the value of Issuer URL you copied from the OneLogin setup.
- Click Save.
- Select Authentication > Users and Groups.
- Click Add.
The Add User or Group page appears. You can add a user or a group. In our example, we add a group. If you want to add a user, the user name must type the user's email address. - For Type, select Group.
- In the Name text box, type a name for the group. The group name must be the same as the group name of memberOf on OneLogin.
- From the Authentication Server drop-down list, select the authentication server where the user or group exists.
- Click OK.
- Click Save.
- To add an application to the access Portal, select Subscription Services > Access Portal.
- In the Applications section, click Add. In our example, select the Web Application.
- In the Name text box, type a description name.
- In the URL text box, type the url address.
- Click OK.
- Click Save.
- Select the User Connection Settins tab.
- In the User Access section, select Specify the applications available to each user and group.
- Click Add.
- From the Authentication Server drop-down list, select the authentication server.
- From the Type drop-down list, select Group.
- In the Name text box, type the group name. The group name must be the same as the group name of memberOf on OneLogin.
- Select the applications that are available to this group.
- Click OK.
- Click Save.
Test the Integration
After you have completed these configuration steps, users in the group you added can sign in to either the OneLogin account or to a resource configured with OneLogin Single Sign-On.
- Type the URL for the portal in this format: https://<host name>.
The Log In page appears with the name of the SAML portal you configured at the top of the page.
- To log in, click the name of the SAML portal. In this example, we click My_OneLogin.
- Complete the authentication process in OneLogin.
After successful authentication, the user can get access to the resource.
Give Us Feedback● Get Support● All Product Documentation● Technical Search
© 2024 WatchGuard Technologies, Inc. All rights reserved. WatchGuard and the WatchGuard logo are registered trademarks or trademarks of WatchGuard Technologies in the United States and other countries. Various other trademarks are held by their respective owners.