3. Configuration Examples
3.1. OKTA Configuration with SAML2
3.1.1. Configuring OKTA application
To configure OKTA application:
1) Connect to your OKTA account.
2) Go to Admin Portal > Applications: create an application.
3) Select SAML2 sign-in method.
Graphical user interface, text, application, Teams Description automatically generated
4) Click Next.
5) In General Settings:
Enter the App name.
Example: Hopex
Graphical user interface, application, website Description automatically generated
6) Click Next.
7) In Configure SAML:
Enter Single Sign on URL with the following URL syntax:
https://<server name>/UAS/AuthServices/Acs
Enter Audience URI with the following URL syntax:
https://<server name>/UAS
Graphical user interface, application Description automatically generated
In Attribute Statements, add an attribute:
o Name: “sub”
o Value: user.email.
8) Click Finish.
At the end of the App creation, from the View Setup Instructions, write down the following information carefully as you will need it for the UAS configuration:
Identity Provider Issuer
Identity Provider metadata
Graphical user interface, text, application, email Description automatically generated
9) Create users that are allowed to connect to HOPEX with OKTA \ SAML2 authentication:
a. In Directory > People: click Add person.
Graphical user interface, application Description automatically generated
b. Enter the person characteristics and Save.
c. Click the user to access its properties
d. Click Assign Applications and assign the OKTA application (“Hopex”) to the user.
Graphical user interface, text, application Description automatically generated
3.1.2. Configuring UAS with OKTA
To configure UAS with OKTA:
1) Connect to HAS console.
2) Access the Authentication module.
a. In the left pane, expand Modules.
Graphical user interface, text, application Description automatically generated
b. Click Authentication.
3) In UAS Administration, in the Identity providers section, select SAML2.
Graphical user interface, text, application, chat or text message Description automatically generated
4) Click Create.
5) In SAML2 Configuration, to activate SAML2 Identity Provider, select Active and enter the required information:
Entity Identifier
Metadata Location
Graphical user interface, text, application Description automatically generated
3.2. OKTA Configuration with OpenID Connect
3.2.1. Configuring OKTA application
To configure OKTA application:
1) Connect to your OKTA account.
2) Go to Admin Portal > Applications: create an application.
3) Select:
Sign-in method: “OIDC – OpenID Connect“
Application type: “Web Application”.
Graphical user interface, text, application, email Description automatically generated
4) Click Next.
5) In General Settings:
Enter the App integration name.
Example: WebappOpenID
Graphical user interface, application Description automatically generated
Enter the Sign-in redirect URIs with the following URL syntax:
https://<server name>/signin-oktaopenid (in lower case letters)
Graphical user interface, application Description automatically generated
In Assignments: select your Controlled access.
For example: “Allow everyone in your organization to access”
Graphical user interface, text, application Description automatically generated
6) Click Save.
You get Client Credentials information.
7) Write down the following information carefully as you will need it for UAS configuration:
Client ID
Client secret
Graphical user interface, text, application Description automatically generated
3.2.2. Configuring UAS with OKTA
To configure UAS with OKTA:
1) Connect to HAS console.
2) Access the Authentication module.
a. In the left pane, expand Modules.
Graphical user interface, text, application Description automatically generated
b. Click Authentication.
3) In UAS Administration, in the Identity providers section, select OpenID.
Graphical user interface, text, application, chat or text message Description automatically generated
4) Click Create.
5) In OpenId Configuration, to activate OpenId Identity Provider, select Active and enter the required information:
Authority server url
Client Identifier
Client secret
Graphical user interface, application Description automatically generated
Graphical user interface, application, email Description automatically generated
3.3. Pingfederate Configuration with SAML2
3.3.1. Configuring Pingfederate application
To configure Pingfederate application:
1) Connect to your Pingfederate account.
2) Go to Admin Portal > Applications: create a Web application with SAML sign-in method:
WEB APP
SAML
Graphical user interface, application Description automatically generated
3) Click Configure.
4) Enter the Application name.
Example: SAML2Pingfed
Graphical user interface, application Description automatically generated
5) Click Next.
6) Configure SAML Connection as follows:
Graphical user interface, application Description automatically generated
Graphical user interface, application Description automatically generated
Graphical user interface, text, application, email Description automatically generated
Graphical user interface, application Description automatically generated
7) Click Save and Continue.
8) In SAML ATTRIBUTES, add an attribute statement “sub” and select “Email Address” as Outgoing value.
Graphical user interface, application, Teams Description automatically generated
9) Click Save and Close.
10) Write down the following information carefully as you will need it for UAS configuration:
Client ID
Graphical user interface, text, application, email Description automatically generated
3.3.2. Configuring UAS with Pingfederate
To configure UAS with Pingfederate:
1) Connect to HAS console.
2) Access the Authentication module.
a. In the left pane, expand Modules.
Graphical user interface, text, application Description automatically generated
b. Click Authentication.
3) In UAS Administration, in the Identity providers section, select SAML2.
Graphical user interface, text, application, chat or text message Description automatically generated
4) Click Create.
5) In SAML2 Configuration, to activate SAML2 Identity Provider, select Active and enter the required information:
Entity Identifier
Metadata location
Graphical user interface, text, application Description automatically generated
6) Graphical user interface, text, application, email, Teams Description automatically generatedClick Save.
To save and apply your changes, the instance and all related nodes need to be restarted. Any connected user will be disconnected.
7) Click I understand the consequences, restart.
3.4. Pingfederate Configuration with OpenID Connect
3.4.1. Configuring Pingfederate application with OpenID Connect
To configure Pingfederate application:
1) Connect to your Pingfederate account.
8) Go to Admin Portal > Applications: create a Web application with OIDC sign-in method:
WEB APP
OIDC
Graphical user interface, application, website Description automatically generated
9) Click Configure.
10) Enter an Application Name.
Example: Pingidconnect
Graphical user interface, application Description automatically generated
11) Click Next.
12) In Redirect URLS enter the URL in the following format:
Error! Hyperlink reference not valid. name>/uas/signin-ping
Graphical user interface, text, application Description automatically generated
Graphical user interface, application Description automatically generated
13) Click Save and Continue.
Graphical user interface, application, Teams Description automatically generated
14) Click Save and Close.
15) Write down the following information carefully as you will need it for UAS configuration:
Client ID
Client secret
Graphical user interface, text, application Description automatically generated
Graphical user interface, application, Teams Description automatically generated
3.4.2. Configuring UAS with Pingfederate
To configure UAS with OKTA:
1) Connect to HAS console.
2) Access the Authentication module.
a. In the left pane, expand Modules.
Graphical user interface, text, application Description automatically generated
b. Click Authentication.
3) In UAS Administration, in the Identity providers section, select SAML2.
Graphical user interface, text, application, chat or text message Description automatically generated
4) Click Create.
5) In OpenId Configuration, to activate OpenId Identity Provider, select Active and enter the required information:
Authority server url
Client Identifier
Client secret
Graphical user interface, application Description automatically generatedGraphical user interface, text, application Description automatically generated
6) Click Save.
3.5. Azure AD Configuration with SAML2
3.5.1. Configuring Azure AD application
Follow Microsoft documentation for detailed configuration:
To configure Azure AD application:
1) Connect to your Azure AD account.
2) In Enterprise applications create an application (e.g.: “Azure AD SAML Toolkit”).
3) Access the SAML SSO configuration page (e.g.: in the Manage section > Single Sign-On page > SAML)
4) Configure the Azure AD application as follows:
In Basic SAML Configuration:
Reply URL (Assertion Consumer Service URL) enter the reply URL in the following format:
https://<server name>/UAS/AuthServices-Azure/Acs
Graphical user interface, text, application Description automatically generated
In Attributes & Claims, configure at least one attribute and claim.
Example: emailaddress user.mail
Graphical user interface, text, application Description automatically generated
In SAML Certificates, write down the following information carefully as you will need it for UAS configuration:
App Federation Metadata Url
A picture containing table Description automatically generated
In Set up <application name>, write down the following information carefully as you will need it for UAS configuration:
Azure AD identifier
Graphical user interface, text, application, email Description automatically generated
3.5.2. Configuring UAS with Azure AD
To configure UAS with Azure AD:
1) Connect to HAS console.
2) Access the Authentication module.
a. In the left pane, expand Modules.
Graphical user interface, text, application Description automatically generated
b. Click Authentication.
3) In UAS Administration, in the Identity providers section, select SAML2.
Graphical user interface, text, application, chat or text message Description automatically generated
4) Click Create.
5) In SAML2 Configuration, to activate SAML2 Identity Provider, select Active and enter the required information:
Entity Identifier
Metadata location
Graphical user interface, text, application Description automatically generated