I would like to configure multiple SSO nodes xFlow
Release : 17.2
Component : SERVICE DESK MANAGER
We have verified load balancer xFlow(Primary and secondary) with SAML using ADFS environment. It is working as expected.
To Support Load balancer(Multiple xFlow servers) for xFlow with SAML we need to follow below steps in ADFS and xFlow settings.
ADFS side settings:-
In ADFS Relying party trust:-
1)Under Identifiers add below.
https://<loadbalancer hostname or IP>:<port_number>/samllogin
Example: https://10.131.234.22:443/samllogin
2) Under Endpoints add below for both WS-Federation Passive Endpoints and SAML Assertion Consumer Endpoints.
https://<loadbalancer hostname or IP>:<port_number>/samllogin
Example: https://10.131.234.22:443/samllogin
xFlow side settings:-
Go to the Administration tab and navigate to xFlow Interface, General in the left hand navigation.
The General Configurations List page opens.
#1) Find the following from the Configuration Key column and specify the values as specified below:
1.federation.audienceuris
https://<loadbalancer hostname or IP>:<port_number>/samllogin|https://<loadbalancer hostname or IP>:<port_number>/samllogin
Example:
https://10.131.234.22:443/samllogin|https://10.131.234.22:443/samllogin
2.federation.enableManualRedirect
Example: False
3.federation.realm
https://<loadbalancer hostname or IP>:<port_number>/samllogin
Example:
https://10.131.234.22:443/samllogin
4.federation.reply
https://<loadbalancer hostname or IP>:<port_number>/samllogin
Example:
https://10.131.234.22:443/samllogin
5.federation.trustedissuers.friendlyname
: Specifies a common name for the Identity Provider.
Example:
ADFS Signing - <trusted_issuer_URL>.
6.federation.trustedissuers.issuer
: Specifies the URL of the Identity Provider.
https://<trusted_issuer_URL>/<identity_provider>/ls/idpinitiatedsignon.aspx.
Example:
https://casm-adfs.casmadfsqa.local/adfs/ls/idpinitiatedsignon.aspx
7.federation.trustedissuers.thumbprint
: Specifies the value of the certificate thumbprint provided by the Identity Provider.
Example:
0214c3035d002505b9e5e672a117d9bf5c5d4d02
#2)authenticationtype
Specifies the authentication value as SAML in the configuration value.
Restart the CA xFlow Interface service.
SDM side settings there is no change.
i.e we should continue the same as below.
Launch CA SDM and enable the external user authentication from UI for the user role that you want to allow the SAML based SSO access.
defect DE58110