When SAML metadata is generated for login, the SAML assertion port is 8382.
<?xml version="1.0" encoding="UTF-8"?><md:EntityDescriptor xmlns:md="urn:oasis:names:tc:SAML:2.0:metadata" ID="c1d4bc9c-c75a-41ba-b832-e2d85e22f0c2" entityID="IP">
<md:SPSSODescriptor AuthnRequestsSigned="false" WantAssertionsSigned="false" protocolSupportEnumeration="urn:oasis:names:tc:SAML:2.0:protocol">
<md:SingleLogoutService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect" Location="https://IP:8382/sso/saml2/LogoutService" ResponseLocation="https://IP:8382/sso/saml2/LogoutServiceResponse"/>
<md:NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress</md:NameIDFormat>
<md:NameIDFormat>urn:oasis:names:tc:SAML:2.0:nameid-format:transient</md:NameIDFormat>
<md:NameIDFormat>urn:oasis:names:tc:SAML:2.0:nameid-format:persistent</md:NameIDFormat>
<md:NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified</md:NameIDFormat>
<md:NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName</md:NameIDFormat>
<md:AssertionConsumerService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST" Location="https://IP:8382/sso/saml2/UserAssertionService" index="0" isDefault="true"/>
</md:SPSSODescriptor>
</md:EntityDescriptor>
Is it possible to change it to 443 for SAML assertion login only?
DX NetOps Release : 20.2 or later
SAML works in 2 ways:
saml.properties
and SSO Port in DB.saml.properties
and SSO Port in DB.So, to configure
https://proxy:443/ -> http://NetOps Portal:8382/
Do the following
https://proxy:8382/...
That should make it so that NetOps Portal will send user to https://proxy:8382/sso/...
then to SAML and back.
Also, DA will send user to https://proxy:8382/sso/...
for logins to odataquery and it will use https://proxy:8382/sso/...
for odata API calls directly.
You also need to import the new entity XML export from SsoConfig into IDP otherwise the IDP may still think it needs to send user to 8382.
Configuring the NetOps Portal side is not enough, the IDP needs the same info import/setup or it will send the user to wrong location.
You need to be on 21.2.11 or later as there is a required defect fix that allows this to work:
Features and Enhancements 22.2.11
Symptom:
When the SSO Service is running on https/443 and SAML2 is being used, SSO fails to validate the SAML2 Assertion, and the user fails to log in. If the user overrides SSO Virtual Directory, some SSO URLs might be made with wrong path, as they were hard coded to use /sso.
Resolution:
With this fix, the validation code now handles when the Assertion is coming in with https/443 or https/no port. Both are acceptable. The various places NetOps Portal generates SSO URLs now use the SSO Virtual Directory setting in the SsoConfig tool.
(21.2.11, DE482680)