Configurating SAML Authentication
Configurating SAML Authentication
3 Tasks
1 hr 30 mins
1 hr 30 mins
Release 1
Pega Platform 8.3.1
Pega Platform
8.5
English
Scenario
Front Stage is considering using SSO using SAML to Authenticate Operators. There are many Identity Providers available in
the marketplace, some are free services and some charge per user. Before Front Stage decides on an Identity Provider they
have requested that you develop a Proof of Concept using OpenAM as the identity provider. Most Identity Providers require
internet access to configure. OpenAM was selected for the Proof of Concept because it can be configured and tested in a
closed system like a Virtual Machine without requiring Internet Connectivity. OpenAm (Open Access Management) can be
downloaded from the Forgerock website here: Access Management
(https://backstage.forgerock.com/downloads/browse/am/latest).
The following table provides the credentials you need to complete the challenge. This challenge requires the use of the Linux
Lite VM to complete.
Design and implement an SSO authentication scheme using SAML as a proof of concept.
Detailed Tasks
1. Download the Access Management version 6.5.2.2 *.war file in the ZIP file attached at the bottom of the challenge.
(https://backstage.forgerock.com/downloads/browse/am/latest).
2. Extract the AM-eval-6.5.2.2.war from the ZIP file.
3. If necessary, rename the file AM-eval-6.5.2.2.war .
4. Copy the AM-eval-6.5.2.2.war file into the opt\tomcat\webapps folder.
1. Top copy the .war file, run the Terminal Emulator to get a command window.
2. Change to the directory where the .war file is located, using the cd command, for example, if the AM-eval-
6.5.2.2.war is on the Desktop: cd Desktop
3. Use the sudo cp command to copy the file to /opt/tomcat/webapps, for example:sudo cp *.war /opt/tomcat/webapps
5. The .war file should auto-deploy, if it does not, Restart Tomcat to deploy the .war file.
6. After restarting Tomcat, use the following URL to access the OpenAm homepage:http://<host name>:<port number>/AM-eval-
6.5.2.2/XUI/#realm (for example, http://localhost:9080/AM-eval-6.5.2.2/config/options.htm ).
Configure OpenAM
8. After Creating the PegaSAML Realm, in the Realm Overview, clickConfigure SAML V2 Provider.
9. In the Configure SAML V2 Provider dialog box, select Configure Hosted Identity Provider.
10. In the Configure Hosted Identity Provider dialog box, in the Signing Key list, select test.
11. In the New Circle of Trust field, enter PegaSAML.
12. In the upper right, click Configure.
1. Create a new PegaSAML Authentication Service (Dev Studio > Configure > Org & Security > Authentication >
Create Authentication Service).
The completed Identity Provider Information should look like the following image.
3. On the SAML 2.0 tab, in the Service Provider settings section, select the Disable request signing check box so that
the authentication service can work without certificates.
4. On the History tab, in the Documentation section, provide a Description and Usage.
5. Save the PegaSAML authentication service.
1. Open the CEO@Booking operator ID, if the CEO@Booking operator does not exist, save the mistyped COE@Booking
operator ID as CEO@Booking.
2. On the Security tab, select External Authentication.
Confirm your work
1. Copy the Login URL from the PegaSAML Authentication Service: http://localhost:9080/prweb/PRAuth/PegaSAML
2. Open a different browser (if you are using Chrome, open Firefox).
3. Paste the Login URL into the web browser to access the OpenAM Login Screen.
4. Log in with user name CEO@Booking using password password.
AccessManager.zip