Working with User Authentication


Introduction

After you have logged into the Controller for the first time (see Logging in as a Tenant Administrator), you can create authentication methods and apply them to the authentication policies you define in your Ivanti Neurons for Zero Trust Access (nZTA) deployment. You then apply an authentication policy, together with user rules, to a user group. A user group forms part of a Secure Access Policy.

Note

To learn more about secure access policies, see Creating/Editing Secure Access Policies.

To view user authentication methods currently defined on the Controller, see Viewing User Authentication Methods. To view user authentication policies, see Viewing User Authentication Policies.

This chapter includes workflows for configuring user authentication according to each supported authentication type. nZTA supports the following types:

After you have created the required authentication methods and updated your user authentication policies, you create user rules and user groups, see Creating User Rules and User Groups.

Optionally, you can associate each user group with an admin role, see Associating User Groups with Admin Roles.

Viewing User Authentication Methods

To view the user authentication methods defined on the Controller, select the Secure Access icon in the nZTA menu, then select Manage Users > Authentication Servers.

The Authentication Servers page appears, showing all user authentication methods:

userauthmethods

FIGURE 35 User Authentication Methods

From this page, you can:

  • Add a new authentication method by selecting Create Authentication Server.

  • Edit an existing authentication method by clicking the adjacent three dots, then selecting Edit. Make any required updates and save the changes.

  • Delete an unused authentication method by clicking the adjacent three dots, then selecting Delete. You must confirm the deletion.

  • View the configured attributes for a SAML authentication method, where that method is configured for use with an authentication policy. To do this, select the arrow indicator to the left of the method name, where shown.

Viewing User Authentication Policies

To view the user authentication policies defined on the Controller, select the Secure Access icon in the nZTA menu, then select Manage Users > User Policies.

The User Policies page appears, showing all user authentication policies.

userpoliciesdefaults1

FIGURE 36 User Authentication Policies

nZTA provides three default/built-in authentication policies, indicated by a tick in the Default column, suitable for the primary use-cases of administrative sign-in, user enrollment, and user sign-in:

  • Admin SignIn. This policy is used whenever admin users log in. That is, for connection requests to the */login/admin/ URL. It is referenced by the ALLADMINUSERS user rule, which associates it with the ADMINISTRATORS user rule group.

  • Enrollment SignIn. This policy can be used for enrolling a desktop/mobile client device. That is, for connection requests to the */login/enroll/ URL. It is referenced by the ALLENROLLMENTUSERS user rule, which associates it with the ENROLLMENT user rule group. You typically do not invite your users to connect directly to this endpoint, and instead link the policy to an equivalent user sign-in policy (such that users connecting an un-enrolled device to the sign-in policy are automatically redirected here).

  • User SignIn. This policy can be used as the primary connection endpoint for all user device sign-in and enrollment requests. That is, for connection requests to the */login/ URL. It is referenced by the ALLUSERS user rule, which associates it with the USERS user rule group. As mentioned above, users connecting an un-enrolled device to this policy are automatically redirected to the Enrollment SignIn policy.

These policies are fixed and cannot be deleted. However, you can edit them to reference specific authentication methods.

Furthermore, you can create additional custom authentication policies to enable bespoke authentication for specific groups of users or parts of your organization. Each policy should contain a unique access URL to which your users connect, and each should then be configured to link to authentication methods applicable for that purpose (for more information, see Adding Custom Authentication Policies).

To learn more about how user authentication policies are used in a nZTA service, see Defining User Authentication.

From this page, you can:

  • (For SAML authentication) Download policy metadata files that are required for external SAML enrollment or sign-in apps. To do this, select the check box for the required policy and select Download. Save the file to your local workstation.

  • View the configured attributes for a SAML-authenticated policy, where that policy is configured with a valid SAML authentication method. To do this, select the arrow indicator to the left of the policy name, where shown.

  • Add an authentication policy by selecting Create User Policy.

  • Edit an existing authentication policy by clicking the adjacent three dots, then selecting Edit. Make any required updates and save the changes.

  • Delete an unused authentication policy by clicking the adjacent three dots, then selecting Delete. You must confirm the deletion.

Creating User Rules and User Groups

After your authentication method is established and associated with an authentication policy, you can set up any required user rules and user groups. A user rule identifies one or more users based on a test against a selected attribute present in a user credential or profile, checked against either a local authentication record or from a SAML authentication service. For information about creating user rules, see Creating User Rules.

usergrouprules

FIGURE 37 Performing authentication through a User Group

You associate one or more user rules with an authentication policy to form a user group (see Creating User Groups). Users requesting authorization for a service controlled by a Secure Access Policy must pass all the rules contained in the User Group attached to the policy.

A user group is required when defining a secure access policy. The user group identifies the users and the authentication policy to which a secure access policy applies, see Creating/Editing Secure Access Policies.

Optionally, you can associate each user group with an admin role, see Associating User Groups with Admin Roles.

Creating User Rules

Through user rules, an admin can construct a test to provide authorization to only those users of a particular name, role, group, or some other stored attribute. In the rule configuration, you select the user attribute on which you want a test to be performed.

nZTA includes three default user rules:

  • ALLADMINUSERS. This matches all users, and is referenced by the default ADMINISTRATORS user group, which associates it with the built-in Admin Signin authentication policy.

  • ALLENROLLMENTUSERS. This matches all users, and is referenced by the default ENROLLMENT user group, which associates it with the built-in Enrollment Signin authentication policy.

  • ALLUSERS. This matches all users, and is referenced by the default USERS user group, which associates it with the built-in User Signin authentication policy.

Note

To read more about default user groups, see Creating User Groups. To read more about built-in authentication policies, see Viewing User Authentication Policies.

This preset configuration of rules, groups, and policies is suitable for typical use cases involving whole-organization authorization needs. In other words, where you require only a single user authorization path that matches all users. For scenarios where you require more specific user authorization checks, you can create additional rules to match specific types of users.

When you create a rule, you select the user attribute with which you want this rule to test. nZTA provides the following rule attribute types:

  • username: For local authentication methods, choose this attribute type to match against locally-defined user names.

  • SAML (Azure AD): For SAML authentication methods, choose this attribute type to match against user names or groups provided by the SAML service.

  • Custom: For SAML authentication methods, choose this attribute type to match against a custom SAML attribute expression.

To create a user rule:

  1. From the nZTA menu, select the Secure Access icon, then select Manage Users > User Rules.

    The User Rules page appears. This page lists all user rules.

  2. Click Create User Rule.

    The Create User Rule form appears.

    adduserrules

    FIGURE 38 Create User Rule

    Note

    At any point during this process, you can reset the form data by clicking Reset Fields.

  3. Enter a Rule Name.

  4. Select Select Attribute Type and select one of the available options:

    • Username: Matches user names in a local authentication method. When you select this option, you must then:

      • Select an Expression type, either Matching or Not Matching.

      • For the User value, enter a match expression for the selected Expression type. For the value:

        • A comma-separated list of items is supported where required.

        • Wildcard matches are supported.

        • Special characters are supported.

        • Single and double quotes are not supported.

      Note

      Ivanti recommends that a basic asterisk wildcard is not used when you intend to associate admin roles with user groups. Instead, a more-specific wildcard that only includes admin users is required in this case to prevent all users having total access rights.

    • SAML (Azure AD): Matches user names or groups in a SAML authentication method. When you select this option, you must then:

      • Select a SAML Attribute Type, either Username or Group.

      • For Attribute Value, enter a single-value match expression for the selected SAML Attribute Type as a SAML expression. For matches against username, *-wildcard values are accepted. For matches against Group, specify either a Group Name or GroupID based on the configuration in your Azure AD service.

      Note

      If you select an attribute type of Group, an authenticated user must be a part of only the matching group. If the user is a part of multiple groups, authentication will fail.

    • Custom. Matches against a custom SAML attribute expression. When you select this option, use the Type or Create an Expression property to enter an attribute expression. Supported formats include:

      • For simple user attribute key-value matching, use the syntax userAttr.<attr-key> [=|!=] <attr-value>. For example:

        - userAttr.memberOf = "CN=sales,DC=example,DC=com"
        - userAttr.mail = "[email protected]"
        - userAttr.realm = "Users"
        - userAttr.department != "example_department"
        
      • To match against attributes that can have multiple values associated with a single attribute key, use the syntax samlMultiValAttr.<attr-key> [=|!=] (<list>). For example:

        - samlMultiValAttr.memberOf = ("CN=Employee,CN=Users,DC=example_demo,DC=com")
        - samlMultiValAttr.memberOf = ("CN=Users,DC=example_demo,DC=com")
        
      • Use brackets and AND/OR operators to construct logical compound expressions:

        - userAttr.groups = ("Group1" or "Group2")
        - userAttr.realm = ("ztaqa") and samlMultiValAttr.memberOf = ("CN=sales,DC=uisdp,DC=com")
        - userAttr.realm = ("ztaqa") or samlMultiValAttr.memberOf = ("CN=sales,DC=uisdp,DC=com")
        - userAttr.realm != ("ztaqa") and samlMultiValAttr.memberOf = ("CN=sales,DC=uisdp,DC=com")
        

      Note

      For samlMultiValAttr expressions containing multiple groups (for example, samlMultiValAttr.groups = ("Group1" or "Group2")), your matching users must be a part of both groups in the expression to obtain authorization.

  5. To create the user rule with the displayed settings, click Create User Rule.

    The new user rule is added to the list of user rules.

  6. Repeat steps 3-6 for each required user rule.

  7. (Optional) Edit an existing user rule by clicking the adjacent three dots, and then selecting Edit. Make any required updates and save the changes.

  8. (Optional) Delete an unused user rule by clicking the adjacent three dots, and then selecting Delete. You must confirm the deletion.

After you have created all required user rules, you can create user groups, see Creating User Groups.

Creating User Groups

After you have created user rules (see Creating User Rules), you associate one or more user rules with an authentication policy to form a user group.

Note

User groups are one of the four dimensions of a Secure Access Policy, see Creating/Editing Secure Access Policies.

nZTA includes three default user groups:

  • ADMINISTRATORS. This user group associates the default ALLADMINUSERS user rule with the built-in Admin Signin authentication policy.

  • ENROLLMENT. This user group associates the default ALLENROLLNMENTUSERS user rule with the built-in Enrollment Signin authentication policy.

  • USERS. This user group associates the default ALLUSERS user rule with the built-in User Signin authentication policy.

Note

To read more about built-in authentication policies, see Viewing User Authentication Policies.

This preset configuration of rules, groups, and policies is suitable for typical use cases involving whole-organization authorization needs. In other words, where you require only a single user authorization path that matches all users. For scenarios where you require more specific user authorization checks, you can create additional user groups to make different associations of user rules and custom authentication policies.

To create a user group:

  1. From the nZTA menu, select the Secure Access icon, then select Manage Users > User Groups.

    The User Groups page appears. This page lists all user groups.

  2. Click Create User Group.

    A form appears to enable you to create the user group.

    addusergroups

    FIGURE 39 Create User Groups

  3. Enter a User Group Name and an optional Description, then click Next.

  4. Select each of the listed User Rules that are required in the user group, then click Next.

  5. Select required authentication policy from the list, then click Next.

  6. Review the summary and click Create.

    The new user group appears in the User Groups list.

  7. Repeat steps 2-7 to create all required user groups.

  8. (Optional) To edit a listed user group, click the adjacent three dots, then select Edit and make any required updates.

  9. (Optional) To delete an unused user group, click the adjacent three dots, then select Delete and confirm the deletion.

After you have created user groups, you can optionally assign the user group to an admin role, see Associating User Groups with Admin Roles.

Associating User Groups with Admin Roles

An admin role defines the elements of the user interface that an associated user group can access.

The current user can only access an individual user interface page/workflow if their user group is associated with an admin role that permits it. The tasks they can perform within that displayed element depends on the permissions set within the admin role.

Note

When you are using admin roles, Ivanti recommends that any user rules for administrators does not use a basic asterisk wildcard, see Creating User Rules. Instead, a more-specific wildcard that only includes admin users is required in this case to prevent all users having total access rights.

Note

Admin roles are not created by the tenant admin using the nZTA user interface. Rather, they are set up by the Ivanti DevOps team.

For example, the DevOps team might define the following admin roles:

  • The .Administrators admin role has access to all user interface elements (full read, create, update, delete rights).

  • The .Read-Only Administrators admin role has access to all user interface elements except workflows (read only).

  • The .Network Administrators admin role has access to ZTA Gateways and Insights (read only).

  • The .CxOs admin role has access to Insights only (read only).

Note

For more information about your assigned admin roles, please contact Ivanti DevOps.

The Tenant Admin can view admin roles in the Administration > Admin Roles page, and associate each role with a single user group.

To associate a user group with an admin role:

  1. Log into the Controller as a Tenant Admin, see Logging in as a Tenant Administrator.

  2. From the nZTA menu, select the Administration icon, then select Admin Roles.

    A list of Admin Roles appears. For example:

    adminempty

    FIGURE 40 Admin Roles

  3. Click the three dots adjacent to the role you want to update, then select Edit Role.

    A dialog appears. For example:

    adminedit

    FIGURE 41 Edit Admin Roles

  4. Under Choose group, select the user group that you want the admin group to be associated with.

  5. Select Save Changes.

  6. (Optional) Repeat steps 3 to 5 for each admin role.

Workflow: Creating a Local Authentication Policy

This process involves creating a local user authentication method and defining within it all user credentials necessary to identify and authenticate your end-users. You then configure this method as the primary authentication method in your authentication policies. If you are configuring Multi-Factor Authentication (MFA) in your deployment, you can configure local user authentication as either the primary or secondary authentication method.

Before you begin, make sure you have all user details (name and password) ready.

To configure a new local authentication method:

  1. Log into the Controller as a Tenant Admin, see Logging in as a Tenant Administrator.

  2. From the nZTA menu, select the Secure Access icon, then select Manage Users > Authentication Servers.

    The Authentication Servers page appears. This page lists all existing user authentication methods. For example:

    usermethodsdefaults1

    FIGURE 42 User Authentication Methods

  3. Select Create Authentication Server.

    A form appears that enables you to define the authentication method.

    addusermethods1

    FIGURE 43 Adding a new local user authentication method

    Note

    At any point during this process, you can reset the form data by selecting Reset Fields.

  4. Under Choose name and type:

    • Specify an Authentication Server Name.

    • Select the Authorization Type of Local.

  5. Click Create User. The Create Local User dialog appears to show additional local authentication settings:

    addusermethodlocalusers

    FIGURE 44 Adding local users to a new authentication method

  6. Enter the following settings:

    • Specify a User Name, Full Name, and Email for the user.

    • Specify a Password and Confirm Password for the user.

    • (Optional) Select the Temporary Password check box if you want the user to change their password when they first log in.

    • Click Create User.

    The user is added to the list of users.

  7. Repeat the previous step for each required user.

  8. Click Create Authentication Server.

    The new local user authentication method is added to the list of methods and the process is complete.

After you have created your local authentication method, create or update your authentication policies with the new authentication method. In most end-user sign-in scenarios, you need a minimum of two policies:

  • user enrollment

  • user sign-in

nZTA provides built-in policies to cover both basic cases. In addition, nZTA allows for the definition of custom policies to facilitate separate authentication endpoints for specific groups of users. To learn more, see Using User Authentication Policies.

Repeat the following steps for each policy, starting with enrollment:

  1. From the nZTA menu, select the Secure Access icon, then select Manage Users > User Policies.

    The User Policies page appears. This page lists all existing user authentication policies.

    userpoliciesdefaults1

    FIGURE 45 User Authentication Policies

    To learn more about the policies on this page, see Viewing User Authentication Policies.

    From this page, either create a new custom policy or edit an existing policy.

  2. To add a new custom policy, click Create User Policy.

    The Create Authentication Policy form appears.

    adduserpolicies1

    FIGURE 46 Create Authentication Policy

    Note

    To learn more about how custom policies are used for user login and enrollment, see Adding Custom Authentication Policies.

  3. Enter a Policy Name.

  4. Enter a Login URL using the format */login/<path>/.

    The URL must start with “*/login/” and cannot contain any special characters. <path> should be set to a unique value reflecting the endpoint URL you want to define for this authentication policy (appended with a backslash):

    • In the case of user sign-in policies, this is the URL endpoint (appended to the tenant FQDN) to which new users are invited to connect to enroll or sign-in a device with the Controller. Example value: “*/login/saleslogin/”.

    • In the case of user enrollment policies, this endpoint identifies the enrollment URL to which users are redirected if they attempt to connect to the equivalent sign-in policy with an un-enrolled device. In most cases, you do not advertise this endpoint to your users. Example value: “*/login/salesenroll/”.

    Note

    In some enrollment circumstances, such as when using a device pre-installed with an older version of Ivanti Secure Access Client, you connect directly to the enrollment policy endpoint to enroll the device. For more details, see Using User Authentication Policies.

  5. (Optional) Enter a description for the authentication policy.

  6. Select a User Type based on the intended authentication activity for this policy. Choose from:

    • Enrollment Users: Select this option to define the authentication endpoint for enrollment of new end-user devices. This endpoint is reserved for enrollment and not normally provided directly to users.

    • Users: Select this option to define the user sign-in endpoint for enrolled devices. This is the endpoint that you provide to your users to access the service (regardless of enrollment status).

    • Administrators: Select this option to define the authentication endpoint for administrator-level sign-in. This endpoint is used for administrator login to the Controller only.

  7. (for policies with a User Type of “Users” only): Select an Enrollment Policy from the drop-down list to be linked to this sign-in policy (as indicated):

    addpoliciessetusertype

    FIGURE 47 Linking an enrollment policy to a user sign-in policy

    This is the enrollment policy to which a user is redirected if it is determined that the device is not yet enrolled. To learn more, see Using User Authentication Policies.

  8. Under Policy Server Details, select Primary Auth Server and choose the required authentication method from the drop-down list:

    addpoliciessetauthserver

    FIGURE 48 Selecting a primary authentication method for this policy

    Alternatively, select Add New Server and create a new authentication method as per the steps described earlier in this section.

  9. (Optional) Where a secondary method is required for Multi-Factor Authentication, repeat the previous step for Secondary Auth Server.

    Note

    Secondary authentication methods do not apply to Enrollment User type policies. The relevant field is hidden in this case.

  10. Click Create User Policy to create the new policy.

    The new policy is added to the list of authentication policies.

If you instead elect to update an existing custom or built-in policy:

  1. Click the three dots adjacent to the relevant policy, then select Edit.

    The Edit authentication policy form appears.

    Note

    For built-in authentication policies, all properties except Primary Auth Server and Secondary Auth Server (where applicable) are read-only.

  2. Configure the primary and/or secondary authentication methods, as required:

    • Set the Primary Auth Server to be the new local user authentication method (indicated):

      userpoliciesserveredit

      FIGURE 49 Editing the primary auth server

    • If you are configuring a policy for MFA, set the Secondary Auth Server to be the new local user authentication method (indicated):

      userpoliciessecserveredit

      FIGURE 50 Editing the Secondary auth server

      Note

      If you configure a secondary authentication method in a policy that is currently in use, any active user sessions must be disconnected and reconnected for the changes to take effect.

  3. Select Save.

    The list of authentication policies updates.

  4. Repeat until all required authentication policies are updated.

To ensure that your users can access the authentication mechanism defined in the policies you configure through this process, make sure your Secure Access Policies are configured with a User Group in which these authentication policies are defined. To learn more, see Creating/Editing Secure Access Policies.

Workflow: Creating a SAML Authentication Policy With Azure AD

nZTA supports the use of a cloud-based Active Directory (AD) SAML service to provide authentication for your users.

If you choose to use AD as a SAML Identity Provider (IdP), you do not create any users locally on the Controller. All users will already be present in your remote SAML service.

Configuring nZTA to use SAML authentication requires you to create separate SAML apps on the Azure AD platform for the following primary activities:

  • User enrollment

  • User sign-in

The Controller includes built-in default authentication policies for each of these purposes, and also includes the ability to create your own custom policies for separate authentication of specific user groups. You create an authentication method referencing one of the Azure AD SAML apps described above and then assign the method to an authentication policy of the same type (either the built-in policy, or one you create). Begin with enrollment, and then repeat the process for user sign-in.

Before you begin configuring the Controller, you must first perform the following steps in Azure AD:

  1. Create a SAML app for the required activity (enrollment or sign-in) and define at least the following Basic SAML Configuration fields:

    • Identifier (Entity ID). This is the URL of the SAML endpoint on the Controller. This is the audience of the SAML response for IdP-initiated SSO. This cannot be left blank.

    • Reply URL (Assertion Consumer Service URL). This is the URL of the SAML consumer on the Controller. This is the destination URL in the SAML response for IdP-initiated SSO. This cannot be left blank.

    aznongallapps

    FIGURE 51 Setting Basic SAML Configuration in Azure AD applications

  2. Download the Federation metadata XML definition for the SAML app to your local workstation. Retain this file for later use.

    azdlmetadata

    FIGURE 52 Downloading Federation Metadata XML files for user enrollment and user sign-in SAML applications

  3. Repeat these steps for each activity.

Note

For details on how to create SAML apps in Azure AD, see the Azure AD SAML documentation.

After you have completed the above prerequisite steps, you can proceed to configure the Controller. For each SAML app you just created, perform the following steps:

  1. Log into the Controller as a Tenant Admin, see Logging in as a Tenant Administrator.

  2. From the nZTA menu, select the Secure Access icon, then select Manage Users > Authentication Servers.

    The Authentication Servers page appears. This page lists all existing user authentication methods:

    usermethodsdefaults2

    FIGURE 53 User Authentication Methods

  3. Click Create Authentication Server.

    A form appears that enables you to define the authentication method:

    addusermethods2

    FIGURE 54 Adding a user authentication method

    Note

    At any point during this process, you can reset the form data by selecting Reset Fields.

  4. Under Choose name and type:

    • Specify an Authentication Server Name. For example: Enrollment or SignIn.

    • Select the Authorization Type of SAML (Azure AD).

    The form expands to show additional settings:

    addusermethodsamlauth

    FIGURE 55 Configuring SAML (Azure AD) authentication settings

  5. (Optional) Specify a Single Logout URL. For more information, see Using SAML Single Logout to Force User Authentication.

  6. To provide your SAML IdP settings, select one of the following:

    • Select Upload to upload a digitally-signed (or unsigned) federation metadata XML definition file downloaded for this SAML activity from Azure AD. That is, for either user enrollment or user sign-in.

      Note

      By default, the Controller expects a signed metadata definition file. To allow an unsigned metadata file, select Allow Unsigned Metadata.

      Then, upload your metadata file by selecting Upload a file here.

    • Select Enter Manually to manually enter the required IdP SAML settings. Use this option in scenarios where a SAML federation metadata file is not available or incomplete.

      Then, enter the following details:

      addusermethodsamlmanual

      FIGURE 56 Configuring SAML (Azure AD) IdP settings manually

      The following minimum settings are required for your SAML authentication service to function correctly. Each setting relates to a value configured in the SAML application on your IdP. Contact your IdP administrator to obtain the relevant details:

      • IDP Entity ID: The entity ID is sent as the Issuer value in the SAML assertion generated by the IdP. Specify the Issuer value in assertions generated by the SAML identity provider.

      • IDP SSO URL: A URL provisioned by the SAML IdP to support service-provider-initiated Single Sign-On. Use the format https://<FQDN>.

      • IDP Slo Service: (Optional) A URL to specify the Single Log-Out/sign out endpoint if you want to force re-authentication for increased security. Use the format https://<FQDN>. For more information, see Using SAML Single Logout to Force User Authentication.

      • User Name Template: Specify how the system is to derive the username from the SAML assertion. The default value can be used, or replaced with an alternative specifier that the Controller uses from the incoming assertion. For example: <assertionNameDN.uid>, the NameID value where ICS is the IdP, the UID from X509SubjectName, <userAttr.attr>, attr from AttributeStatement attributes.

      • IDP Signing Certificate: The signing certificate to be used with the SAML app on the IdP. Type or paste in the contents of your Base-64 encoded public key.

    Note

    If, at a later date, you need to modify the metadata definition file, edit the authentication method through the User Authentication page and repeat this step. However, note that federation metadata files from Azure AD are digitally-signed and so cannot be manually edited prior to upload back into nZTA. This process supports replacing a definition file only with another digitally-signed and validated definition file.

  7. Confirm that your settings are correct, then select Add to create the authentication method.

    The new SAML user authentication method is added to the list of methods displayed in the User Authentication page, and the process completes.

After you have created your SAML authentication method, create or update your authentication policies with the new authentication method:

  1. From the nZTA menu, select the Secure Access icon, then select Manage Users > User Policies.

    The User Policies page appears. This page lists all existing user authentication policies.

    userpoliciesdefaults1

    FIGURE 57 User Authentication Policies

    To learn more about the policies on this page, see Viewing User Authentication Policies.

    From this page, either create a new custom policy or edit an existing policy.

  2. To add a new custom policy, select Add.

    The Add Authentication Policy form appears.

    adduserpolicies1

    FIGURE 58 Add User Authentication

    Note

    At any point during this process, you can reset the form data by selecting Reset Fields.

    Note

    To learn more about how custom policies are used for user login and enrollment, see Adding Custom Authentication Policies.

  3. Enter a Policy Name.

  4. Enter a Login URL using the format */login/<path>/.

    The URL must start with “*/login/” and cannot contain any special characters. <path> should be set to a unique value reflecting the endpoint URL you want to define for this authentication policy (appended with a backslash):

    • In the case of user sign-in policies, this is the URL endpoint (appended to the tenant FQDN) to which new users are invited to connect to enroll or sign-in a device with the Controller. Example value: “*/login/saleslogin/”.

    • In the case of user enrollment policies, this endpoint identifies the enrollment URL to which users are redirected if they attempt to connect to the equivalent sign-in policy with an un-enrolled device. In most cases, you do not advertise this endpoint to your users. Example value: “*/login/salesenroll/”.

    Note

    In some enrollment circumstances, such as when using a device pre-installed with an older version of Ivanti Secure Access Client, you connect directly to the enrollment policy endpoint to enroll the device. For more details, see Using User Authentication Policies.

  5. (Optional) Enter a description for the authentication policy.

  6. Select a User Type based on the intended authentication activity for this policy. Choose from:

    • Enrollment Users: Select this option to define the authentication endpoint for enrollment of new end-user devices. This endpoint is reserved for enrollment and not normally provided directly to users.

    • Users: Select this option to define the user sign-in endpoint for enrolled devices. This is the endpoint that you provide to your users to access the service (regardless of enrollment status).

    • Administrators: Select this option to define the authentication endpoint for administrator-level sign-in. This endpoint is used for administrator login to the Controller only.

  7. (for policies with a User Type of “Users” only): Select an Enrollment Policy from the drop-down list to be linked to this sign-in policy (as indicated):

    addpoliciessetusertype

    FIGURE 59 Linking an enrollment policy to a user sign-in policy

    This is the enrollment policy to which a user is redirected if it is determined that the device is not yet enrolled. To learn more, see Using User Authentication Policies.

  8. Under Policy Server Details, select Primary Auth Server and choose the required authentication method from the drop-down list:

    addpoliciessetauthserver

    FIGURE 60 Selecting a primary authentication method for this policy

    Alternatively, select Add New Server and create a new authentication method as per the steps described earlier in this section.

  9. (Optional) Where a secondary method is required for Multi-Factor Authentication, repeat the previous step for Secondary Auth Server.

    Note

    Secondary authentication methods do not apply to Enrollment User type policies. The relevant field is hidden in this case.

  10. Click Create User Policy to create the new policy.

    The new policy is added to the list of authentication policies.

If you instead elect to update an existing custom or built-in policy:

  1. Click the three dots adjacent to the relevant policy, then select Edit.

    The Edit authentication policy form appears.

    Note

    For built-in authentication policies, all properties except Primary Auth Server and Secondary Auth Server (where applicable) are read-only.

  2. Set the Primary Auth Server to be the new SAML user authentication method (indicated):

    userpoliciesserveredit

    FIGURE 61 Editing the primary auth server

    Note

    SAML authentication can be used only as a Primary Auth Server. If you are using MFA, specify either a local authentiction or TOTP method as the Secondary Auth Server.

    Note

    If you configure a secondary authentication method in a policy that is currently in use, any active user sessions must be disconnected and reconnected for the changes to take effect.

  3. Select Save.

    The list of authentication policies updates.

  4. Repeat until all required authentication policies are updated.

At this point, the Controller uses the uploaded Federation Metadata to contact the SAML service. After this process completes, a Download function becomes available for each relevant policy. This metadata file is required to configure trusted communication with the remote SAML service.

  1. Refresh your browser until the Download action is visible for the relevant policies.

  2. Select the check box for the policy metadata you want to download and clear all other check boxes.

  3. Select Download and save the metadata file.

Note

As mentioned previously, make sure you repeat this procedure for each required SAML app on your Azure AD platform. That is, you require separate XML metadata files for the enrollment authentication policy and the login authentication policy.

After the User Authentication workflow is complete, you can configure the Azure AD platform with the XML configuration of the Controller. For details on how to configure Azure AD, see Configuring Azure AD with Service Provider Metadata from the Controller.

Finally, to ensure that your users can access the authentication mechanism defined in the policies you configure through this process, make sure your Secure Access Policies are configured with a User Group in which these authentication policies are defined. To learn more, see Creating/Editing Secure Access Policies.

Configuring Azure AD with Service Provider Metadata from the Controller

Before the Controller can use a SAML application in Azure AD, you must establish a secure connection between the Controller and each SAML application on the Azure AD platform. To do this, you must configure the Azure AD platform with the Service Provider (SP) metadata configuration XML file for the matching authentication method on the Controller.

Note

You download the Controller metadata configuration file when you selected an authentication policy. Alternatively, select the policy, then select Download on the User authentication policies page, see Viewing User Authentication Policies.

To configure a SAML app on Azure AD with SP metadata from the Controller:

  1. Log into your Azure AD platform.

  2. Access Enterprise applications and then locate your SAML application.

  3. Access the single sign-on (SSO) configuration for this application.

  4. Ensure that the SAML single sign-on method is in use.

  5. Upload the SP metadata XML configuration file that you downloaded earlier:

    azuploadmetadata

    FIGURE 62 Uploading the IdP metadata to your Azure AD applications

  6. Confirm the uploaded configuration and save the changes.

    After the file uploads, communications between the Controller and the SAML application are enabled after a few minutes.

Note

You will need to repeat this process for each required SAML application on your Azure AD platform.

After the SAML application on Azure AD is configured to connect to the Controller, you can then create user rules and user rule groups, see Creating User Rules and User Groups.

Configuring MFA with Azure AD (Optional)

Note

This section describes an optional configuration activity for SAML User Authentication on Azure AD.

Multi-Factor Authentication (MFA) is an authentication method by which a user is granted access only after successfully presenting two (or more) pieces of evidence (or factors) to an authentication mechanism.

The Azure AD platform supports MFA internally, and this can be configured so that two authentication factors are required by users for a single user authentication method.

After you have configured the Azure AD platform for SAML User Authentication, you can optionally add MFA support.

Note

For full details of this activity, consult the Azure AD documentation for Azure AD Conditional Access and Multi-Factor Authentication.

An overview of the general process is given below:

  1. On Azure AD, locate the Azure AD Conditional Access page.

  2. Create a New Policy with the following details:

    • Add a Name for the policy.

    • Under Assignments > Users and Groups:

      • Select Select Users and Groups.

      • Check the Users and Groups option, and select the required users and groups from the list.

      • Select Done.

    • Under Assignments > Cloud Apps and Actions:

      • Select Select apps.

      • Select (for example) the zta-enroll and zta-auth apps.

      • Select Done.

    • Under Access Controls > Grant:

      • Select Require multi-factor authentication.

    • Under Enable Policy:

      • Turn the policy On.

    • Select Create.

  3. Locate the Multi-Factor Authentication page.

  4. On the right-side panel, under Configure:

    • Select the Additional cloud-based MFA settings.

      A new tab appears.

    • Enable the following MFA methods as per the requirement.

      • Call to phone.

      • Text message to phone.

    • Select Save.

Configuration of MFA on Azure AD is complete.

Mobile end users will be asked for secondary authentication information from their next login.

You can then create user rules and user groups, see Creating User Rules and User Groups.

Configuring nZTA to use Azure AD Security Groups (Optional)

Note

This section describes an optional configuration activity for SAML User Authentication on Azure AD.

You can configure nZTA to retrieve Azure AD-based user security group information through SAML attributes applied to your User Rules.

You can create users and security groups directly in Azure AD portal. This means that Azure AD group information can be retrieved by the Controller through SAML attributes containing only the group’s Object ID. To instead retrieve Azure AD group information via the sAMAccountName attribute, create an Azure AD group in the local Active Directory and synchronize it to the cloud using Azure AD Connect.

To create users and groups directly in the Azure AD portal:

Note

This process is applicable only if you are creating users or groups directly in Azure AD. For scenarios that involve synchronizing local Active Directory users or groups to the cloud, continue to the procedure that follows this.

  1. Log in to the Azure AD portal

  2. Navigate to your SAML SSO application, and select the Users page.

  3. Add a new user for your organization by selecting Create User:

    azadduser

    FIGURE 63 Adding a new user

    Enter the following details:

    • User name: Enter a username for the new user, appended by the domain applicable to your organization.

    • Name: Enter the user’s full display name.

    • (Optional) First Name: Enter the user’s first name.

    • (Optional) Last Name: Enter the user’s last name.

    • Password: Select either an auto-generated or admin supplied password.

    To create the user, select Create.

  4. Add a new security group for your organization by navigating to the Groups page and selecting New Group:

    azaddsecgrp

    FIGURE 64 Adding a new security group

    Enter the following details:

    • Group type: Select Security.

    • Group name: Enter a name for the new security group.

    • (Optional) Group description: Enter a description for the group.

    • (Optional) Azure AD roles can be assigned to the group: Use the default setting.

    • Membership type: Select Assigned.

    To create the group, select Create.

  5. In the list of groups, make a note of the Object ID for the newly created group:

    azlistgrps

    FIGURE 65 Viewing the Object ID for the new group

    You use the Object ID property when configuring your nZTA User Rules.

  6. Assign the new user to your new security group:

    azassignuser

    FIGURE 66 Assigning the new user to your new security group

To create Azure AD applications that facilitate retrieval of Security Group information:

  1. Create two non-gallery applications under Enterprise applications, one for user enrollment and another for user sign-in, and configure Single Sign-On. Then, for each application, obtain the Federation Metadata XML file.

    For more details on this procedure, see Workflow: Creating a SAML Authentication Policy With Azure AD or follow the Azure AD user documentation.

  2. Assign your applications to the required users or security groups:

    azassignapps

    FIGURE 67 Assigning applications to users and security groups

  3. Create two new SAML (Azure AD) user authentication methods (user enrollment and user sign-in) in the nZTA Tenant Admin portal that correspond to the SAML applications created in the Azure AD portal. Upload the Federation Metadata XML file from each application to the matching method.

  4. Create corresponding authentication policies and assign each Azure AD authentication method as the Primary Auth Server.

  5. Obtain the IdP metadata files for both authentication policies and upload this data to the Azure AD portal under the respective applications. For more details, see Configuring Azure AD with Service Provider Metadata from the Controller.

  6. For each Azure AD application, in the User Attributes and Claims section, select Edit.

    azeditattsclaims

    FIGURE 68 Editing the user attributes and claims for an Azure AD application

  7. Add a new group claim to your application by selecting Add a group claim:

    azaddgrpclaim

    FIGURE 69 Adding a new group claim to your Azure AD application

    In the Group Claims panel, enter the following details:

    • Which groups associated with the user should be returned in the claim?: Select “Security groups”.

    • Source attribute:

      • To retrieve Azure AD security group details based on the group object ID, select “Group ID”.

      • To retrieve Azure AD security group details based on the group name, select “sAMAccountName”. This option is available only for groups synchronized from Active Directory.

      By default, Azure AD populates SAML attributes for group claims in the format:

      userAttr.http://schemas.microsoft.com/ws/2008/06/identity/claims/groups
      
      samlMultiVarAttr.http://schemas.microsoft.com/ws/2008/06/identity/claims/groups
      

      To specify a different claim type for group claims, select Customize the name of the group claim and specify the claim type in the Name field. For example, if you specify “ADgroup”, the group claim is emitted as userAttr.ADgroup or samlMultiValAttr.ADgroup.

    To add the new group claim, select Save.

  8. Return to the nZTA Tenant Admin portal and navigate to the Secure Access > Manage Users > User Groups and Rules > User Rules page. Create a new user rule to access the Azure AD group attribute.

    Configure the following settings:

    • Rule name: Enter a descriptive name for the rule

    • Select Attribute Type: Select “SAML (Azure AD)”.

    • SAML Attribute Type: Select “Group”.

    • Attribute value: Use one of the following options:

      • If you created the security group in Azure AD, use the group Object ID as noted earlier in the process:

        azuserruleoid

        FIGURE 70 Specifying an Object ID as the group attribute value

      • If you synchronized your security group to Azure AD from a local Active Directory, use the Group Name.

        azuserrulenm

        FIGURE 71 Specifying an Object Name as the group attribute value

    The following expressions are examples of Azure AD group attribute values:

    • Users that are members of only the identified group:

      userAttr.{http://schemas.microsoft.com/ws/2008/06/identity/claims/groups} = "<Group Object ID>"
      
    • Users that are members of only the named group (for AD groups synchronized from a local Active Directory):

      userAttr.{http://schemas\.microsoft\.com/ws/2008/06/identity/claims/groups} = "<Group Name>"
      
    • Users that are members of only the identified group:

      userAttr.<Customized Group Claim Name> = "<Group Object ID>"
      
    • Users that are members of only the named group (for AD groups synchronized from a local Active Directory):

      userAttr.<Customized Group Claim Name> = "<Group Name>"
      

    Note

    To add SAML multi-valued attributes (samlMultiValAttr.<claim>) in Azure AD User Rules, you must set Select Attribute Type to “SAML (Custom)”. This applies to the following examples:

    • Users that are members of either identified group:

      samlMultiValAttr.{http://schemas\.microsoft\.com/ws/2008/06/identity/claims/groups} = ("<Group OID A>" or "<Group OID B>")
      
    • Users that are members of both identified groups:

      samlMultiValAttr.{http://schemas\.microsoft\.com/ws/2008/06/identity/claims/groups} = ("<Group OID A>" and "<Group OID B>")
      
    • Users that are members of either named group (for AD groups synchronized from a local Active Directory):

      samlMultiValAttr.{http://schemas\.microsoft\.com/ws/2008/06/identity/claims/groups} = ("<Group A>" or "<Group B>")
      
    • Users that are members of both named groups (for AD groups synchronized from a local Active Directory):

      samlMultiValAttr.{http://schemas\.microsoft\.com/ws/2008/06/identity/claims/groups} = ("<Group A>" and "<Group B>")
      
    • Users that are members of either named group (for AD groups synchronized from a local Active Directory):

      samlMultiValAttr.<Customized Group Claim Name> = ("<Group A>" or "<Group B>")
      
    • Users that are members of both named groups (for AD groups synchronized from a local Active Directory):

      samlMultiValAttr.<Customized Group Claim Name> = ("<Group A>" and "<Group B>")
      
  9. To create the User Rule, select Create.

  10. Create a new User Rule Group and select the User Authentication Policy (Enrollment or Sign-in) that is applicable to this service. Then, in the list of User Rules, select the rule you created in the previous step:

    azaddrulegrp

    FIGURE 72 Configuring a User Rule Group with a User Authentication Policy and User Rule

  11. To create the User Rule Group, select Create.

  12. Proceed to create your Secure Access Policy, selecting the applicable Application, Gateway, Device Policy and the User Rule Group created during this procedure.

Workflow: Creating an Authentication Policy for On-Premises ICS SAML

You can choose to use a configured ICS server (either remote or local) as an on-premises SAML AD authentication server for your Controller.

Note

If you choose to use SAML authentication on your Controller, you do not create any users manually. All users will already be present on your remote SAML server.

Configuring nZTA to use SAML authentication requires you to create separate SAML apps on the on-premises ICS server for the following primary activities:

  • User enrollment

  • User sign-in

The Controller includes built-in default authentication policies for each of these purposes and includes the ability to create your own custom policies for separate authentication of specific groups. You create an authentication method referencing one of the SAML apps described above and then assign the method to an authentication policy of the same type (either the built-in policy, or one you create). Begin with enrollment, and then repeat the process for user sign-in.

To configure nZTA to use SAML authentication through ICS, perform the following steps:

  1. Configure your on-premises ICS to act as a SAML AD authentication server:

  2. Define an on-premises SAML authentication method, see Defining an On-Premises SAML Authentication Method.

  3. Configure an on-premises SAML authentication policy, see Defining Authentication Policies for On-Premises SAML Authentication.

  4. After you complete the User Authentication workflow, configure the SAML apps on the on-premises ICS server with the XML metadata configuration from the matching nZTA authentication policy, see Configuring ICS with Controller Metadata.

Note

You will need to repeat this process for each required SAML app on your ICS server.

To ensure that your users can access the authentication mechanism defined in the policies you configure through this process, make sure your Secure Access Policies are configured with a User Group in which these authentication policies are defined. To learn more, see Creating/Editing Secure Access Policies.

Configuring Secondary Authentication for On-Premises ICS (Optional)

Note

This section describes an optional configuration activity for SAML User Authentication on an on-premises ICS server.

Multi-Factor Authentication (MFA) is an authentication method by which a computer user is granted access only after successfully presenting two (or more) pieces of evidence (or factors) to an authentication mechanism. The ICS platform supports a number of secondary authentication solutions, and can be configured so that two authentication factors are required by users using a single nZTA user authentication method. Before you configure the on-premises ICS server and Controller for SAML User Authentication, you can choose to configure MFA (secondary) support to ICS.

Note

Before you start this procedure, you must have fully configured a secondary authentication server. For example, Google OTP (One Time Password) or NAS OTP. For the purposes of this example, an existing local Google OTP server is used, but different established secondary authentication methods are also supported.

To configure ICS for secondary authentication:

  1. Log in to the on-premises Ivanti Connect Secure server.

  2. On the Authentication menu, select Auth. Servers.

    The Authentication Servers page appears.

  3. Under New, select the required authentication server type. For example, select Time based One Time Password (TOTP) Server.

  4. Select New Server.

    The New Time based One Time Password (TOTP) Server page appears.

  5. Enter the following parameters for the new server:

    • Add a Name for the server, for example Google OTP.

    • Select the Allow Auto Unlock check box, and set Auto unlock period. For example, 10 minutes.

    • Select the Allow new TOTP user registration to happen via External Port check box.

    • Select the Allow TOTP authentication from Remote Pulse Secure Devices check box.

    • Leave all other parameters as their default settings.

  6. Select Save Changes.

    The new server (Google OTP) is added to the list of Authentication Servers.

  7. You must now add a new user to the local system. To do this:

    • In the Authentication Servers list, select the hyperlink for the System Local entry.

    • The Settings page for System Local appears.

    • Select the Users tab.

    • Select New to create a user.

    • The New Local User page appears.

    • Enter details for the user, and ensure that the Enabled check box is selected, and that other check boxes are clear.

    • Select Save Changes to create the user.

  8. Select the Users menu, then select User Realms.

    The User Authentication Realms page appears.

  9. You must now enable secondary authentication. To do this:

    • In the User Authentication Realms list, select the hyperlink for the Users entry.

      The General page for the Users realm appears.

    • Under Additional authentication server, select the Enable additional authentication server check box.

    • Set Authentication #2 to Google OTP.

    • At the bottom of the page, select Save Changes.

You can now configure an Identity Provider in ICS, see Configuring a SAML Identity Provider in Ivanti Connect Secure.

Configuring a SAML Identity Provider in Ivanti Connect Secure

This section describes the steps to configure a SAML Identity Provider (IdP) on an on-premises Ivanti Connect Secure (ICS) server. The metadata for the IdP is required by each SAML user method on nZTA.

To configure SAML IdP on the Ivanti Connect Secure server:

  1. Log in to the on-premises Ivanti Connect Secure server that is identified as an Identity Provider.

  2. Navigate to System > Configuration > SAML > Settings.

  3. Configure the following Metadata Server Configuration:

    • Timeout value for metadata fetch request to 300.

    • Host FQDN for SAML to the Fully Qualified Domain Name, noting the host FQDN guidance below.

    The host FQDN specified here is used in the SAML entity ID, used by browsers to connect to ICS, and used in the URLs for SAML services. Typically:

    • If the ICS is standalone, the FQDN should resolve to the IP address of the external interface / internal interface, whichever is chosen.

    • If the ICS is an Active-Passive cluster, the FQDN should resolve to the external VIP / Internal VIP, whichever is chosen.

    • If the ICS is an Active-Active cluster behind an in-line load balancer, the FQDN should resolve to the load balancer’s external VIP / Internal VIP, whichever is chosen.

  4. Select Save Changes.

  5. Select Update Entity IDs and confirm this action on the warning page by selecting Update Entity IDs.

  6. Navigate to System > Configuration > Certificates > Device Certificate, create a new CSR, and import certificate and keys. Skip this step if the ICS external interface / internal interface (whichever is chosen) already provides a certificate that matches the host’s Fully Qualified Domain Name.

  7. Navigate to Authentication > Signing In > Sign In SAML > Identity Provider.

  8. Locate the the Basic Identity Provider (IdP) Configuration section.

  9. Under Protocol Binding to use for SAML Response:

    • Select the Post check box.

    • Clear the Artifact check box.

    • Select the required Signing Certificate.

  10. Under Other Configurations:

    • Select the Accept unsigned AuthnRequest check box.

  11. Under Service-Provider-related IDP Configuration:

    • For SignIn Policy, select the */ policy.

  12. Under User Identity:

    • For Subject Name Format, select Email Address.

    • For Subject Name, enter <USERNAME>.

    • At the bottom of the page, select Save Changes.

You can now configure a Metadata Provider in ICS, see Configuring a Metadata Provider in Ivanti Connect Secure.

Configuring a Metadata Provider in Ivanti Connect Secure

This section describes the steps to configure Ivanti Connect Secure to be a Metadata Provider, and to download metadata for use on the Controller.

To configure a Metadata Provider in the on-premises ICS server:

  1. Log in to Ivanti Connect Secure server.

  2. Navigate to Authentication > Signing-In > Sign In SAML > Metadata Provider.

    The SAML Metadata Provider Entity Id property is pre-populated. It is generated by the system, based on the value for the Host FQDN for SAML setting on the System > Configuration > SAML > Settings page.

  3. Set Metadata Validity to 365 days.

  4. Clear the Do Not Publish IdP in Metadata check box.

  5. Select Save Metadata Provider.

  6. Select Download Metadata and save the file to your computer.

    This definition file is required to enable on-premises SAML apps on the Controller.

You can then configure the Controller to use an on-premises SAML Server, see Defining an On-Premises SAML Authentication Method.

Defining an On-Premises SAML Authentication Method

A minimum of two authentication methods are required:

  • An authentication method for a SAML enrollment sign-in app.

  • An authentication method for a SAML user sign-in app.

To create an on-premises SAML server authentication method for a specific activity, for example, device enrollment:

  1. Log into the Controller as a Tenant Admin, see Logging in as a Tenant Administrator.

  2. From the nZTA menu, select the Secure Access icon, then select Manage Users > Authentication Servers.

    The Authentication Servers page appears. This page lists all existing user authentication methods:

    usermethodsdefaults2

    FIGURE 73 User Authentication Methods

  3. Select Create Authentication Server.

    A form appears that enables you to define the authentication method:

    addusermethods2

    FIGURE 74 Creating a user authentication method

    Note

    At any point during this process, you can reset the form data by selecting Reset Vields.

  4. Under Choose name and type:

    • Specify an Authentication Server Name. For example: Enrollment or SignIn.

    • Select the Authentication Type of SAML (Custom).

    The form expands to show additional settings:

    addusermethodsamlcustom

    FIGURE 75 Configuring SAML (Custom) authentication settings

  5. (Optional) Specify a Single Logout URL. For more information, see Using SAML Single Logout to Force User Authentication.

  6. To provide your SAML IdP settings, select one of the following:

    • Select Upload to upload a digitally-signed (or unsigned) federation metadata XML definition file downloaded for this SAML activity from your IdP. That is, for either user enrollment or user sign-in.

      Note

      By default, the Controller expects a signed metadata definition file. To allow an unsigned metadata file, select Allow Unsigned Metadata.

      Then, upload your metadata file by selecting Upload a file here.

    • Select Enter Manually to manually enter the required IdP SAML settings. Use this option in scenarios where a SAML federation metadata file is not available or incomplete.

      Then, enter the following details:

      addusermethodsamlmanual

      FIGURE 76 Configuring SAML (Azure AD) IdP settings manually

      The following minimum settings are required for your SAML authentication service to function correctly. Each setting relates to a value configured in the SAML application on your IdP. Contact your IdP administrator to obtain the relevant details:

      • IDP Entity ID: The entity ID is sent as the Issuer value in the SAML assertion generated by the IdP. Specify the Issuer value in assertions generated by the SAML identity provider.

      • IDP SSO URL: A URL provisioned by the SAML IdP to support service-provider-initiated Single Sign-On. Use the format https://<FQDN>.

      • IDP Slo Service: (Optional) A URL to specify the Single Log-Out/sign out endpoint if you want to force re-authentication for increased security. Use the format https://<FQDN>. For more information, see Using SAML Single Logout to Force User Authentication.

      • User Name Template: Specify how the system is to derive the username from the SAML assertion. The default value can be used, or replaced with an alternative specifier that the Controller uses from the incoming assertion. For example: <assertionNameDN.uid>, the NameID value where ICS is the IdP, the UID from X509SubjectName, <userAttr.attr>, attr from AttributeStatement attributes.

      • IDP Signing Certificate: The signing certificate to be used with the SAML app on the IdP. Type or paste in the contents of your Base-64 encoded public key.

    Note

    If, at a later date, you need to replace the metadata definition file with a modified version, edit the authentication method through the User Authentication page and repeat this step. Either edit the existing metadata file and re-upload, or replace it completely with a new version. In both cases, however, make sure your metadata file is valid before uploading it through this process.

  7. Confirm that your settings are correct, then select Add to create the authentication method.

    The new SAML authentication method is added to the list of methods and the process is complete.

  8. (Optional) To edit a listed authentication method, click the adjacent three dots, then select Edit. Make any required updates and confirm.

  9. (Optional) To delete one (or more) an unused authentication methods, select the check box for each, then select Delete. You must confirm the deletion.

You can now proceed to update the required authentication policy, see Defining Authentication Policies for On-Premises SAML Authentication.

Defining Authentication Policies for On-Premises SAML Authentication

After you have created your SAML authentication method, create or update your authentication policies with the new authentication method.

From the nZTA menu, select the Secure Access icon, then select Manage Users > User Policies.

The User Policies page appears. This page lists all existing user authentication policies.

userpoliciesdefaults1

FIGURE 77 User Authentication Policies

To learn more about the policies on this page, see Viewing User Authentication Policies.

From this page, either create a new custom policy or edit an existing policy. To add a new custom policy:

  1. Select Add.

    The Add Authentication Policy form appears.

    adduserpolicies1

    FIGURE 78 Add User Authentication

    Note

    At any point during this process, you can reset the form data by selecting Reset Fields.

    Note

    To learn more about how custom policies are used for user login and enrollment, see Adding Custom Authentication Policies.

  2. Enter a Policy Name.

  3. Enter a Login URL using the format */login/<path>/.

    The URL must start with “*/login/” and cannot contain any special characters. <path> should be set to a unique value reflecting the endpoint URL you want to define for this authentication policy (appended with a backslash):

    • In the case of user sign-in policies, this is the URL endpoint (appended to the tenant FQDN) to which new users are invited to connect to enroll or sign-in a device with the Controller. Example value: “*/login/saleslogin/”.

    • In the case of user enrollment policies, this endpoint identifies the enrollment URL to which users are redirected if they attempt to connect to the equivalent sign-in policy with an un-enrolled device. In most cases, you do not advertise this endpoint to your users. Example value: “*/login/salesenroll/”.

    Note

    In some enrollment circumstances, such as when using a device pre-installed with an older version of Ivanti Secure Access Client, you connect directly to the enrollment policy endpoint to enroll the device. For more details, see Using User Authentication Policies.

  4. (Optional) Enter a description for the authentication policy.

  5. Select a User Type based on the intended authentication activity for this policy. Choose from:

    • Enrollment Users: Select this option to define the authentication endpoint for enrollment of new end-user devices. This endpoint is reserved for enrollment and not normally provided directly to users.

    • Users: Select this option to define the user sign-in endpoint for enrolled devices. This is the endpoint that you provide to your users to access the service (regardless of enrollment status).

    • Administrators: Select this option to define the authentication endpoint for administrator-level sign-in. This endpoint is used for administrator login to the Controller only.

  6. (for policies with a User Type of “Users” only): Select an Enrollment Policy from the drop-down list to be linked to this sign-in policy (as indicated):

    addpoliciessetusertype

    FIGURE 79 Linking an enrollment policy to a user sign-in policy

    This is the enrollment policy to which a user is redirected if it is determined that the device is not yet enrolled. To learn more, see Using User Authentication Policies.

  7. Under Policy Server Details, select Primary Auth Server and choose the required authentication method from the drop-down list:

    addpoliciessetauthserver

    FIGURE 80 Selecting a primary authentication method for this policy

    Alternatively, select Add New Server and create a new authentication method as per the steps described earlier in this section.

  8. (Optional) Where a secondary method is required for Multi-Factor Authentication, repeat the previous step for Secondary Auth Server.

    Note

    Secondary authentication methods do not apply to Enrollment User type policies. The relevant field is hidden in this case.

  9. Select Add to create the new policy.

    The new policy is added to the list of authentication policies.

If you instead elect to update an existing custom or built-in policy:

  1. Click the three dots adjacent to the relevant policy, then select Edit.

    The Edit authentication policy form appears.

    Note

    For built-in authentication policies, all properties except Primary Auth Server and Secondary Auth Server (where applicable) are read-only.

  2. Set the Primary Auth Server to be the new SAML user authentication method (indicated):

    userpoliciesserveredit

    FIGURE 81 Editing the primary auth server

    Note

    SAML authentication can be used only as a Primary Auth Server. If you are using MFA, specify either a local authentication or TOTP method as the Secondary Auth Server.

    Note

    If you configure a secondary authentication method in a policy that is currently in use, any active user sessions must be disconnected and reconnected for the changes to take effect.

  3. Select Save.

    The list of authentication policies updates.

At this point, the Controller uses the uploaded metadata to contact the SAML service. After this process completes, a Download function becomes available for the policy. This metadata file is required to configure trusted communication with the remote SAML service. Perform the following steps:

  1. Refresh your browser until the Download action is visible for the relevant policy.

  2. Select the check box for the policy and clear all other check boxes.

  3. Select Download and save the metadata file.

Note

Repeat these procedures for each required SAML app on your On-Prem ICS server. That is, you require separate XML metadata files for your enrollment authentication policy and your sign-in authentication policy.

After you have configured a user authentication policy, you can configure your ICS SAML app with the SP Metadata configuration of the Controller, see Configuring ICS with Controller Metadata.

Configuring ICS with Controller Metadata

Before the Controller can use a SAML server on an on-premises ICS server, you must enable communication between each separate SAML app on the ICS server and the Controller.

To do this, you must configure the SAML apps on the on-premises ICS server with the XML metadata configuration file for the Controller.

There are a minimum of two SAML apps:

  • A SAML app for user enrollment. For example, called Enrollment.

  • A SAML app during user sign-in. For example, called Signin.

Note

You download the Controller XML configuration file when you selected an authentication policy. Alternatively, select the policy, then select Download on the User authentication policies page, see Viewing User Authentication Policies.

To configure a SAML app on ICS with XML from the Controller:

  1. Log into your ICS platform.

  2. Navigate to System > Configuration > SAML.

  3. Select New Metadata Provider.

  4. Enter a Name for the metadata provider.

  5. Under Metadata Provider Location Configuration:

    • For Location, select Local.

    • For Upload Metadata File, select Browse and select the metadata that you saved on your computer in the previous process (see above).

  6. Under Metadata Provider Verification Configuration:

    • Select the Accept Unsigned Metadata check box.

  7. Under Metadata Provider Filter Configuration:

    • For Roles, select the Service Provider check box.

  8. Select Save Changes.

  9. Navigate to Authentication > Signing In > Sign-In SAML > Identity Provider.

  10. In the Configuration section, select Add SP.

    The New Peer Service Provider page appears.

  11. In the Service Provider Configuration and Certificate Status Checking Configuration sections, make the necessary service provider specific settings. For more details, refer to the “Configuring Sign-in SAML Identity Provider Settings” section in the “Ivanti Connect Secure Administration Guide”.

  12. In the Customize IdP Behavior section, select the Override Default Configuration check box.

  13. Clear the Reuse Existing NC (Pulse) Session check box.

  14. Select the Accept unsigned AuthnRequest check box.

  15. At the bottom of the page, select Save Changes.

After the on-premises ICS SAML service is configured to connect to the Controller, you can then create a user group to apply the newly created authentication policy to your secure applications, see Creating User Rules and User Groups.

Workflow: Creating a SAML Authentication Policy for Okta

nZTA supports the use of Okta as a SAML service to provide authentication for your users.

If you choose to use Okta as a SAML Identity Provider (IdP), you do not create any users locally on the Controller. All users will already be present in your remote SAML service.

The process to configure Okta as a custom SAML authentication method within nZTA involves the following steps:

  1. Create your Okta application and obtain the SAML IdP metadata, see Creating an Okta SAML Application.

  2. Define an Okta SAML authentication method in nZTA and associate it with your authentication policies, see Defining and Applying Okta Authentication in nZTA.

Configuring nZTA to use Okta SAML authentication requires configuration of two separate authentication policies on the Controller, user enrollment and user sign-in. The Controller includes built-in default authentication policies for each of these purposes, and also includes the ability to create your own custom policies should you require this authentication mechanism to apply only to a sub-set of your users. Therefore, complete the above steps for each of these policies in turn. Begin with enrollment, and then repeat the process for user sign-in.

To ensure that your users can access the authentication mechanism defined in the policies you configure through this process, make sure your Secure Access Policies are configured with a User Group in which these authentication policies are defined. To learn more, see Creating/Editing Secure Access Policies.

Before you start, make sure you know the following information:

  • The default Assertion Consumer Service (ACS) URL:

    • For the user enrollment policy, the ACS URL uses the form: https://<tenant FQDN>/dana-na/auth/saml-consumer.cgi

      (For example, https://zta1.example.com/dana-na/auth/saml-consumer.cgi)

    • For the user sign-in policy, the ACS URL uses the form: https://<tenant MTLS FQDN>/dana-na/auth/saml-consumer.cgi

      (For example, https://zta1.e.example.com/dana-na/auth/saml-consumer.cgi)

  • The SP Entity ID of nZTA for your integration:

    • For the user enrollment policy, the SP Entity ID uses the form: https://<tenant FQDN>/dana-na/auth/saml-endpoint.cgi?p=sp1

      (For example, https://zta1.example.com/dana-na/auth/saml-endpoint.cgi?p=sp1)

    • For the user sign-in policy, the SP Entity ID uses the form: https://<tenant MTLS FQDN>/dana-na/auth/saml-endpoint.cgi?p=sp2

      (For example, https://zta1.e.example.com/dana-na/auth/saml-endpoint.cgi?p=sp2)

Creating an Okta SAML Application

Note

To fully configure Okta as a SAML authenticator in nZTA, complete these steps for each of your user enrollment and user sign-in policies in turn.

To create a new Okta application and obtain the SAML IdP Metadata file:

  1. Log in to your Okta account and select Classic UI mode.

  2. In the Admin Console, navigate to Applications > Applications.

  3. Select Add Application.

  4. Start the Application Integration Wizard by selecting Create New App.

  5. For Platform, select “Web”.

  6. For Sign-on method, select “SAML 2.0”.

  7. Select Create.

  8. In the General Settings tab, enter an application name.

    Note

    Ivanti advises using a descriptive name that relates to the user authentication policy this application is created for.

  9. (Optional) Upload a logo for the application.

  10. In the Configure SAML tab, enter the following information corresponding to the authentication policy for which you are creating this application.

    • Single sign on URL: Enter your ACS URL

    • Audience URI (SP Entity ID): Enter your nZTA Entity ID

    • Name ID Format: Select “Email Address”

    • Application username: Select “Okta username”.

    • (Optional) If you want to use Okta group membership policies to categorize users, complete the Fill in Group Attribute Statements section to filter users by group membership in the SAML assertion.

      For example, to set a filter that returns all groups to which the user is assigned, you might enter the following details:

      • Name: ZTAGroups

      • Filter: Matches Regex

      • Value: .*

      For more information, see Using Okta Group Attribute Statements to Categorize Users.

    • For all other fields, use the default values.

  11. Select Next to continue.

  12. For Are you a customer or partner?, select the option that is most applicable.

  13. Select Finish.

    The Settings page for your application appears.

  14. In the Sign On tab, download the Identity Provider metadata file. Save this file to your local workstation.

  15. In the Applications tab, select Assign Applications. Then select Assign to People or Assign to Groups as per your requirements.

    • For each user or group you want to assign to your application, select Assign against the respective item.

    • After you have completed your assignments, select Done.

  16. Proceed to define a new authentication method in nZTA, see Defining and Applying Okta Authentication in nZTA.

Using Okta Group Attribute Statements to Categorize Users

Note

This section is applicable only to scenarios where Okta SAML authentication is augmented with user categorization through group attribute policies.

To configure Okta with group membership policies, and to enable nZTA to query these policies when authenticating access requests, add Group Attribute Statements to your Okta user enrollment and user sign-in applications. Then, update your enrollment and sign-in User Rules within nZTA to use the corresponding Custom SAML attributes.

The following table lists common Okta Group Attribute Statements, designed to return matching user groups in a SAML assertion:

Note

The attribute name “ZTAGroups” is used here as an example. Use the attribute tag which corresponds to your Okta group configuration.

Okta Group Attribute Name

Okta Group Attribute Filter

Groups Returned

ZTAGroups

Contains: ZTA

All groups containing “ZTA” (ignores case)

ZTAGroups

StartsWith: ZTA

All groups starting with “ZTA” (ignores case)

ZTAGroups

Equals: ZTAUsers

The “ZTAUsers” group only

ZTAGroups

Matches regex: .*

All groups to which the user is assigned


The following are examples of Okta custom SAML expressions for use within nZTA User Rules:

  • Users that are members of only the named group:

    userAttr.ZTAGroups = "ZTAGroup1"
    
  • Users that are members of either named group:

    userAttr.ZTAGroups = ("ZTAGroup1" or "ZTAGroup2")
    
  • Users that are members of either named group, or both groups:

    samlMultiValAttr.ZTAGroups = ("ZTAGroup1" or "ZTAGroup2")
    
  • Users that are only members of both named groups:

    samlMultiValAttr.ZTAGroups = ("ZTAGroup1" and "ZTAGroup2")
    
  • Users that are members of “ZTAGroup1”, but not members of “ZTAGroup2”:

    samlMultiValAttr.ZTAGroups = "ZTAGroup1" and samlMultiValAttr.ZTAGroups != "ZTAGroup2"
    
  • Users that are members of either “ZTAGroup1” or “ZTAGroup2”, or both groups, and also a member of “ZTAGroup3”:

    samlMultiValAttr.ZTAGroups = ("ZTAGroup1" or "ZTAGroup2") and samlMultiValAttr.ZTAGroups = "ZTAGroup3"
    

To learn more about adding custom SAML user rules, see Creating User Rules.

Defining and Applying Okta Authentication in nZTA

Note

To fully configure Okta as a SAML authenticator in nZTA, complete these steps for each of your user enrollment and user sign-in policies in turn.

To define a new authentication method using Okta as the SAML IdP:

  1. Log into the Controller as a Tenant Admin, see Logging in as a Tenant Administrator.

    The Network Overview page appears.

  2. From the nZTA menu, select the Secure Access icon, then select Users > User Authentication.

    The User Authentication page appears. This page lists all existing user authentication methods.

  3. To add a new custom SAML authentication method, select Add.

    The Add Authentication Method form appears:

    addusermethods2

    FIGURE 82 Adding a user authentication method

    Note

    At any point during this process, you can reset the form data by selecting Reset Fields.

  4. Under Choose name and type:

    • Specify an Authentication Server Name. For example: SAML_Okta_Enroll or SAML_Okta_SignIn.

    • Select the Authorization Type of SAML (Custom).

    The form expands to show additional settings:

    oktaaddauthmethod

    FIGURE 83 Configuring Okta SAML authentication settings

  5. (Optional) Specify a Single Logout URL. For more information, see Using SAML Single Logout to Force User Authentication.

  6. To provide your SAML IdP settings, select one of the following:

    • Select Upload to upload a digitally-signed (or unsigned) Okta Identity Provider (IdP) metadata file, as obtained while creating a new Okta SAML application for this activity. That is, for either user enrollment or user sign-in. See Creating an Okta SAML Application.

      Note

      By default, the Controller expects a signed metadata definition file. To allow an unsigned metadata file, select Allow Unsigned Metadata.

      Then, upload your metadata file by selecting Upload a file here.

    • Select Enter Manually to manually enter the required IdP SAML settings. Use this option in scenarios where a SAML metadata file is not available or incomplete.

      Then, enter the following details:

      addusermethodsamlmanual

      FIGURE 84 Configuring SAML IdP settings manually

      The following minimum settings are required for your SAML authentication service to function correctly. Each setting relates to a value configured in the SAML application on your IdP. Contact your IdP administrator to obtain the relevant details:

      • IDP Entity ID: The entity ID is sent as the Issuer value in the SAML assertion generated by the IdP. Specify the Issuer value in assertions generated by the SAML identity provider.

      • IDP SSO URL: A URL provisioned by the SAML IdP to support service-provider-initiated Single Sign-On. Use the format https://<FQDN>.

      • IDP Slo Service: (Optional) A URL to specify the Single Log-Out/sign out endpoint if you want to force re-authentication for increased security. Use the format https://<FQDN>. For more information, see Using SAML Single Logout to Force User Authentication.

      • User Name Template: Specify how the system is to derive the username from the SAML assertion. The default value can be used, or replaced with an alternative specifier that the Controller uses from the incoming assertion. For example: <assertionNameDN.uid>, the NameID value where ICS is the IdP, the UID from X509SubjectName, <userAttr.attr>, attr from AttributeStatement attributes.

      • IDP Signing Certificate: The signing certificate to be used with the SAML app on the IdP. Type or paste in the contents of your Base-64 encoded public key.

    Note

    If, at a later date, you need to replace the metadata definition file with a modified version, edit the authentication method through the User Authentication page and repeat this step. Either edit the existing metadata file and re-upload, or replace it completely with a new version. In both cases, however, make sure your metadata file is valid before uploading it through this process.

  7. Confirm that your settings are correct, then select Add to create the authentication method.

    The User Authentication page lists the new Okta authentication method.

After you have created your Okta authentication method, create or update your authentication policies with the new authentication method:

  1. From the nZTA menu, select the Secure Access icon, then select Manage Users > User Policies.

    The User Policies page appears. This page lists all existing user authentication policies.

    userpoliciesdefaults1

    FIGURE 85 User Authentication Policies

    To learn more about the policies on this page, see Viewing User Authentication Policies.

    From this page, either create a new custom policy or edit an existing policy.

  2. To add a new custom policy, select Add.

    The Add Authentication Policy form appears.

    adduserpolicies1

    FIGURE 86 Add User Authentication

    Note

    At any point during this process, you can reset the form data by selecting Reset Fields.

    Note

    To learn more about how custom policies are used for user login and enrollment, see Adding Custom Authentication Policies.

  3. Enter a Policy Name.

  4. Enter a Login URL using the format */login/<path>/.

    The URL must start with “*/login/” and cannot contain any special characters. <path> should be set to a unique value reflecting the endpoint URL you want to define for this authentication policy (appended with a backslash):

    • In the case of user sign-in policies, this is the URL endpoint (appended to the tenant FQDN) to which new users are invited to connect to enroll or sign-in a device with the Controller. Example value: “*/login/saleslogin/”.

    • In the case of user enrollment policies, this endpoint identifies the enrollment URL to which users are redirected if they attempt to connect to the equivalent sign-in policy with an un-enrolled device. In most cases, you do not advertise this endpoint to your users. Example value: “*/login/salesenroll/”.

    Note

    In some enrollment circumstances, such as when using a device pre-installed with an older version of Ivanti Secure Access Client, you connect directly to the enrollment policy endpoint to enroll the device. For more details, see Using User Authentication Policies.

  5. (Optional) Enter a description for the authentication policy.

  6. Select a User Type based on the intended authentication activity for this policy. Choose from:

    • Enrollment Users: Select this option to define the authentication endpoint for enrollment of new end-user devices. This endpoint is reserved for enrollment and not normally provided directly to users.

    • Users: Select this option to define the user sign-in endpoint for enrolled devices. This is the endpoint that you provide to your users to access the service (regardless of enrollment status).

    • Administrators: Select this option to define the authentication endpoint for administrator-level sign-in. This endpoint is used for administrator login to the Controller only.

  7. (for policies with a User Type of “Users” only): Select an Enrollment Policy from the drop-down list to be linked to this sign-in policy (as indicated):

    addpoliciessetusertype

    FIGURE 87 Linking an enrollment policy to a user sign-in policy

    This is the enrollment policy to which a user is redirected if it is determined that the device is not yet enrolled. To learn more, see Using User Authentication Policies.

  8. Under Policy Server Details, select Primary Auth Server and choose the required authentication method from the drop-down list:

    addpoliciessetauthserver

    FIGURE 88 Selecting a primary authentication method for this policy

    Alternatively, select Add New Server and create a new authentication method as per the steps described earlier in this section.

  9. (Optional) Where a secondary method is required for Multi-Factor Authentication, repeat the previous step for Secondary Auth Server.

    Note

    Secondary authentication methods do not apply to Enrollment User type policies. The relevant field is hidden in this case.

  10. Select Add to create the new policy.

    The new policy is added to the list of authentication policies.

If you instead elect to update an existing custom or built-in policy:

  1. Click the three dots adjacent to the relevant policy, then select Edit.

    The Edit authentication policy form appears.

    Note

    For built-in authentication policies, all properties except Primary Auth Server are read-only.

  2. Set the Primary Auth Server to be the new Okta SAML user authentication method:

    oktaeditauthpolicy

    FIGURE 89 Editing an authentication policy

    Note

    SAML authentication can be used only as a Primary Auth Server. If you are using MFA, specify either a local authentication or TOTP method as the Secondary Auth Server.

    Note

    If you configure a secondary authentication method in a policy that is currently in use, any active user sessions must be disconnected and reconnected for the changes to take effect.

  3. Select Save.

    The list of authentication policies updates.

Complete these steps for each of your user enrollment and user sign-in policies in turn.

Workflow: Creating a SAML Authentication Policy for Ping Identity

nZTA supports the use of Ping Identity (PingID) as a SAML service to provide authentication for your users.

If you choose to use PingID as a SAML Identity Provider (IdP), you do not create any users locally on the Controller. All users will already be present in your remote SAML service.

The process to configure PingID as a custom SAML authentication method within nZTA involves the following steps:

  1. Create your PingID application and obtain the SAML IdP metadata, see Creating a PingID SAML Application.

  2. Define a PingID SAML authentication method in nZTA and associate it with your authentication policies, see Defining and Applying PingID Authentication in nZTA.

  3. Obtain the nZTA Service Provider (SP) metadata and upload it back to the PingID application, see Updating Your PingID SAML Application with Your SP Metadata.

Configuring nZTA to use PingID SAML authentication requires configuration of two separate authentication policies on the Controller, user enrollment and user sign-in. The Controller includes built-in default authentication policies for each of these purposes, and also includes the ability to create your own custom policies should you require this authentication mechanism to apply only to a sub-set of your users. Therefore, complete the above steps for each of these policies in turn. Begin with enrollment, and then repeat the process for user sign-in.

To ensure that your users can access the authentication mechanism defined in the policies you configure through this process, make sure your Secure Access Policies are configured with a User Group in which these authentication policies are defined. To learn more, see Creating/Editing Secure Access Policies.

Creating a PingID SAML Application

Note

To fully configure PingID as a SAML authenticator in nZTA, complete these steps for each of your user enrollment and user sign-in policies in turn.

To create a new PingID application and obtain the SAML IdP Metadata file:

  1. Log in to the PingOne web portal (https://admin.pingone.com) and navigate to My Applications.

  2. Select Add Application > New SAML Application:

    addpingapp

    FIGURE 90 Adding a PingID application

  3. In the Application Details step, enter an Application Name and Application Description for the new application:

    pingappdetails

    FIGURE 91 Entering a name and description for your new PingID application

    Note

    Ivanti advises using a descriptive name that relates to the user authentication policy this application is created for.

  4. Select Continue to Next Step.

  5. In the Application Configuration step, locate the SAML Metadata field and select the adjacent Download link to obtain the SAML metadata file. Save this file to your local workstation:

    dlpingidpdata

    FIGURE 92 Downloading the PingID application IdP metadata file

  6. Keep this browser page open in order to finish creating the application after you have obtained the SP metadata file from nZTA.

  7. Proceed to define a new authentication method in nZTA, see Defining and Applying PingID Authentication in nZTA.

Defining and Applying PingID Authentication in nZTA

Note

To fully configure PingID as a SAML authenticator in nZTA, complete these steps for each of your user enrollment and user sign-in policies in turn.

To define a new authentication method using PingID as the SAML IdP:

  1. Log into the Controller as a Tenant Admin, see Logging in as a Tenant Administrator.

    The Network Overview page appears.

  2. From the nZTA menu, select the Secure Access icon, then select Manage Users > Authentication Servers.

    The Authentication Servers page appears. This page lists all existing user authentication methods.

  3. To add a new custom SAML authentication method, select Create Authentication Server.

    The Create Authentication Server form appears:

    addusermethods2

    FIGURE 93 Adding a user authentication method

    Note

    At any point during this process, you can reset the form data by selecting Reset Fields.

  4. Under Choose name and type:

    • Specify an Authentication Server Name. For example: SAML_Ping_Enroll or SAML_Ping_SignIn.

    • Select the Authorization Type of SAML (Custom).

    The form expands to show additional settings:

    pingidaddauthmethod

    FIGURE 94 Configuring PingID SAML authentication settings

  5. (Optional) Specify a Single Logout URL. For more information, see Using SAML Single Logout to Force User Authentication.

  6. To provide your SAML IdP settings, select one of the following:

    • Select Upload to upload a digitally-signed (or unsigned) PingID Identity Provider (IdP) metadata file, as obtained while creating a new PingID SAML application for this activity. That is, for either user enrollment or user sign-in. See Creating a PingID SAML Application.

      Note

      By default, the Controller expects a signed metadata definition file. To allow an unsigned metadata file, select Allow Unsigned Metadata.

      Then, upload your metadata file by selecting Upload a file here.

    • Select Enter Manually to manually enter the required IdP SAML settings. Use this option in scenarios where a SAML metadata file is not available or incomplete.

      Then, enter the following details:

      addusermethodsamlmanual

      FIGURE 95 Configuring SAML IdP settings manually

      The following minimum settings are required for your SAML authentication service to function correctly. Each setting relates to a value configured in the SAML application on your IdP. Contact your IdP administrator to obtain the relevant details:

      • IDP Entity ID: The entity ID is sent as the Issuer value in the SAML assertion generated by the IdP. Specify the Issuer value in assertions generated by the SAML identity provider.

      • IDP SSO URL: A URL provisioned by the SAML IdP to support service-provider-initiated Single Sign-On. Use the format https://<FQDN>.

      • IDP Slo Service: (Optional) A URL to specify the Single Log-Out/sign out endpoint if you want to force re-authentication for increased security. Use the format https://<FQDN>. For more information, see Using SAML Single Logout to Force User Authentication.

      • User Name Template: Specify how the system is to derive the username from the SAML assertion. The default value can be used, or replaced with an alternative specifier that the Controller uses from the incoming assertion. For example: <assertionNameDN.uid>, the NameID value where ICS is the IdP, the UID from X509SubjectName, <userAttr.attr>, attr from AttributeStatement attributes.

      • IDP Signing Certificate: The signing certificate to be used with the SAML app on the IdP. Type or paste in the contents of your Base-64 encoded public key.

    Note

    If, at a later date, you need to replace the metadata definition file with a modified version, edit the authentication method through the User Authentication page and repeat this step. Either edit the existing metadata file and re-upload, or replace it completely with a new version. In both cases, however, make sure your metadata file is valid before uploading it through this process.

  7. Confirm that your settings are correct, then select Add to create the authentication method.

    The User Authentication page lists the new PingID authentication method.

After you have created your PingID authentication method, create or update your authentication policies with the new authentication method:

  1. From the nZTA menu, select the Secure Access icon, then select Manage Users > User Policies.

    The User Policies page appears. This page lists all existing user authentication policies.

    userpoliciesdefaults1

    FIGURE 96 User Authentication Policies

    To learn more about the policies on this page, see Viewing User Authentication Policies.

    From this page, either create a new custom policy or edit an existing policy.

  2. To add a new custom policy, select Add.

    The Add Authentication Policy form appears.

    adduserpolicies1

    FIGURE 97 Add User Authentication

    Note

    At any point during this process, you can reset the form data by selecting Reset Fields.

    Note

    To learn more about how custom policies are used for user login and enrollment, see Adding Custom Authentication Policies.

  3. Enter a Policy Name.

  4. Enter a Login URL using the format */login/<path>/.

    The URL must start with “*/login/” and cannot contain any special characters. <path> should be set to a unique value reflecting the endpoint URL you want to define for this authentication policy (appended with a backslash):

    • In the case of user sign-in policies, this is the URL endpoint (appended to the tenant FQDN) to which new users are invited to connect to enroll or sign-in a device with the Controller. Example value: “*/login/saleslogin/”.

    • In the case of user enrollment policies, this endpoint identifies the enrollment URL to which users are redirected if they attempt to connect to the equivalent sign-in policy with an un-enrolled device. In most cases, you do not advertise this endpoint to your users. Example value: “*/login/salesenroll/”.

    Note

    In some enrollment circumstances, such as when using a device pre-installed with an older version of Ivanti Secure Access Client, you connect directly to the enrollment policy endpoint to enroll the device. For more details, see Using User Authentication Policies.

  5. (Optional) Enter a description for the authentication policy.

  6. Select a User Type based on the intended authentication activity for this policy. Choose from:

    • Enrollment Users: Select this option to define the authentication endpoint for enrollment of new end-user devices. This endpoint is reserved for enrollment and not normally provided directly to users.

    • Users: Select this option to define the user sign-in endpoint for enrolled devices. This is the endpoint that you provide to your users to access the service (regardless of enrollment status).

    • Administrators: Select this option to define the authentication endpoint for administrator-level sign-in. This endpoint is used for administrator login to the Controller only.

  7. (for policies with a User Type of “Users” only): Select an Enrollment Policy from the drop-down list to be linked to this sign-in policy (as indicated):

    addpoliciessetusertype

    FIGURE 98 Linking an enrollment policy to a user sign-in policy

    This is the enrollment policy to which a user is redirected if it is determined that the device is not yet enrolled. To learn more, see Using User Authentication Policies.

  8. Under Policy Server Details, select Primary Auth Server and choose the required authentication method from the drop-down list:

    addpoliciessetauthserver

    FIGURE 99 Selecting a primary authentication method for this policy

    Alternatively, select Add New Server and create a new authentication method as per the steps described earlier in this section.

  9. (Optional) Where a secondary method is required for Multi-Factor Authentication, repeat the previous step for Secondary Auth Server.

    Note

    Secondary authentication methods do not apply to Enrollment User type policies. The relevant field is hidden in this case.

  10. Select Add to create the new policy.

    The new policy is added to the list of authentication policies.

If you instead elect to update an existing custom or built-in policy:

  1. Click the three dots adjacent to the relevant policy, then select Edit.

    The Edit authentication policy form appears.

    Note

    For built-in authentication policies, all properties except Primary Auth Server are read-only.

  2. Set the Primary Auth Server to be the new PingID SAML user authentication method:

    pingeditauthpolicy

    FIGURE 100 Editing an authentication policy

    Note

    SAML authentication can be used only as a Primary Auth Server. If you are using MFA, specify either a local authentication or TOTP method as the Secondary Auth Server.

    Note

    If you configure a secondary authentication method in a policy that is currently in use, any active user sessions must be disconnected and reconnected for the changes to take effect.

  3. Select Save.

    The list of authentication policies updates.

On the Authentication Policies page, select the authentication policy you just created (or updated), then select the corresponding Download link. Save the resulting SP metadata file to your local workstation.

After you have completed this process for both enrollment and sign-in activities, you can proceed to finish configuring your PingID application using the SP metadata file downloaded during this workflow. See Updating Your PingID SAML Application with Your SP Metadata.

Updating Your PingID SAML Application with Your SP Metadata

Note

To fully configure PingID as a SAML authenticator in nZTA, complete these steps for each of your user enrollment and user sign-in policies in turn.

After you have obtained the SP Metadata file from your nZTA Authentication Policy, update the PingID SAML application created in Creating a PingID SAML Application. Make sure you use the application that corresponds to the policy. In other words, if you have obtained metadata for the enrollment policy, update the PingID enrollment application.

To update the PingID application:

  1. Return to the PingID application previously started through the PingOne portal (https://admin.pingone.com):

    pingcontapp

    FIGURE 101 Continuing the PingID application creation process

  2. Locate the Upload Metadata field and select Select File. Upload your SP metadata file.

  3. Make any further changes you require to the application configuration, then select Next.

    The Group Access section appears.

    pingaddgrps

    FIGURE 102 Adding groups to your PingID application

  4. Add to your application any required user groups.

    Note

    The user groups you require depend on your organization and might vary from those shown in this workflow. At least one user group is required.

  5. To review your application configuration, select Continue to next step.

    The Review Setup stage appears.

    pingreviewapp

    FIGURE 103 Reviewing your application configuration

  6. To complete configuration of your PingID application, select Finish.

Workflow: Adding TOTP to an Authentication Policy

Note

This feature is supported for client and gateway versions applicable to release 22.2R1 and later only.

nZTA supports the use of Time-based One Time Password (TOTP) as a secondary authentication method in Multi-Factor Authentication deployments.

To use TOTP, first create a TOTP authentication method in nZTA and then associate it with your user sign-in authentication policies.

To ensure that your users can access the authentication mechanism defined in the policies you configure through this process, make sure your Secure Access Policies are configured with a User Group in which these authentication policies are defined. To learn more, see Creating/Editing Secure Access Policies.

To configure a new TOTP authentication method:

  1. Log into the Controller as a Tenant Admin, see Logging in as a Tenant Administrator.

  2. From the nZTA menu, select the Secure Access icon, then select Manage Users > Authentication Servers.

    The Authentication Servers page appears. This page lists all existing user authentication methods. For example:

    usermethodsdefaults1

    FIGURE 104 User Authentication Methods

  3. Select Create Authentication Server.

    A form appears that enables you to define the authentication method.

    addusermethods1

    FIGURE 105 Creating a new TOTP user authentication method

    Note

    At any point during this process, you can reset the form data by selecting Reset Fields.

  4. Under Choose name and type:

    • Specify an Authentication Server Name.

    • Select the Authorization Type of TOTP.

    The form expands to show additional TOTP authentication settings:

    addusermethodtotp

    FIGURE 106 Adding TOTP authentication settings

  5. Enter the following settings:

    • No of Attempts: The maximum number of consecutive wrong attempts allowed before the account is locked (minimum: 1 attempt, maximum: 5 attempts). To view user attempts and to unlock locked accounts, see Unlocking Locked User Accounts.

    • Custom message for registration page: A custom message to be shown on the new TOTP-user registration web page.

    • Allow Auto Unlock: When selected, a locked account is automatically unlocked after the specified period. (minimum: 10 minutes, maximum: 90 days).

    • Display QR code during User Registration: When selected, a QR code is displayed during user registration.

    • Disable Generation of Backup Codes: When selected, the Controller does not generate TOTP backup codes.

  6. To create an authentication method based on these settings, select Add.

    The new TOTP user authentication method is added to the list of methods and the process is complete.

After you have created your TOTP authentication method, create or update your user sign-in authentication policies with the new method. nZTA supports using TOTP only as secondary authentication, so make sure you have previously configured a primary authentication method before continuing this process. To view workflows for all available authentication types, see Introduction.

Note

Secondary authentication methods do not apply to Enrollment User type policies. The relevant field is hidden in this case.

Complete the following steps for your user sign-in authentication policy:

  1. From the nZTA menu, select the Secure Access icon, then select Manage Users > User Policies.

    The User Policies page appears. This page lists all existing user authentication policies.

    userpoliciesdefaults1

    FIGURE 107 User Authentication Policies

    To learn more about the policies on this page, see Viewing User Authentication Policies.

  2. Click the three dots adjacent to your desired user sign-in policy, then select Edit.

    The Edit Authentication Policy form appears.

    edituserpolicytotp

    FIGURE 108 Selecting a secondary TOTP authentication method for this policy

  3. For Secondary Auth Server, select your new TOTP authentication method from the drop-down list (as indicated).

    Alternatively, select Add New Server and create a new authentication method as per the steps described earlier in this section.

  4. Select Save to update the policy.

Note

If you configure a secondary authentication method in a policy that is currently in use, any active user sessions must be disconnected and reconnected for the changes to take effect.

Unlocking Locked User Accounts

After you have created a TOTP authentication method and assigned it to an active user authentication policy, you can use the authentication method configuration page to view users that have attempted authentication through TOTP. This information enables you to unlock locked user accounts, if required.

To access user attempt information, perform the following steps:

  1. Select Secure Access > Manage Users > Authentication Servers.

  2. Click the three dots adjacent to your TOTP authentication method, then select Edit.

    At the bottom of the page, a Users table is presented:

    totpmethoduserlist

    FIGURE 109 Viewing the list of users who attempted TOTP authentication through this method

    This table lists each user who has attempted to authenticate a device through TOTP, including the last attempt and last successful login times.

  3. (Optional) If a user account is locked through too many consecutive failed authentication attempts (that exceed the value configured in No of Attempts), unlock the account by selecting the checkbox adjacent to the user entry and selecting UNLOCK. The user is then free to re-attempt authentication using valid authentication codes.

  4. (Optional) To remove a user from the list, select the checkbox adjacent to the user entry and select RESET. This means a user must then re-register their device with the TOTP policy.

Note

Reset and unlock operations of individual users are supported only when the TOTP authentication method is associated with a user authentication policy. To reset or unlock all users in a disassociated TOTP authentication method, delete the TOTP authentication method itself.