Configuring SAML Authentication for PAM3609 minutes to read
Note: This help document applies only till PAM360 builds 7301. For builds 7400 and above, please refer to this help document. ManageEngine PAM360 supports Security Assertion Markup Language (SAML) 2.0, facilitating integration with Federated Identity Management Solutions for Single Sign-On and Single Logout functionalities. SAML 2.0 is a widely adopted open standard that facilitates the exchange of authentication and authorization information between an Identity Provider (IdP) and a Service Provider (SP). This standard provides Single Sign-On (SSO) access to web-based applications, allowing users to authenticate once and gain access to multiple applications without needing to log in repeatedly. Additionally, SAML 2.0 supports Single Logout (SLO), enabling users to log out of all user sessions established during SSO simultaneously with a single click. PAM360 acts as the SP and integrates with various IdPs, facilitating SSO access for users. The integration process involves exchanging details between the SP and IdP to establish trust and enable secure communication. Upon SAML configuration, users can log in to the IdP and automatically gain access to PAM360 from the IdP's interface without needing to authenticate using the PAM360 credentials, and with Single Logout (SLO), they can log out from all applications with a single click. This help document covers the following topics in detail:
1. SAML Configuration for PAM360To configure PAM360 as the SP on the IdP's website, you need SP details i.e., the PAM360 SAML configuration details displayed on the SAML configuration page. These details are necessary for setting up PAM360 as the SP on the IdP console, ensuring a seamless integration between PAM360 and IdP. Follow these steps to obtain the SP details:
Note: For SAML SSO authentication, the Assertion Consumer Service (ACS) URL is the hostname of the PAM360 server by default. Follow these steps to update the ACS URL: 2. Configuring PAM360 as the SP on the IdP InterfaceThe following help documents will assist you in configuring PAM360 as the SP on the desired IdP: Upon completing the configuration, download the IdP Metadata XML file or note down the IdP details, such as the Issuer, IdP Login URL, IdP Logout URL, etc. This information will be used in the PAM360 application to complete the SAML configuration. 3. Configuring SAML SSO in PAM360After configuring the SP details on the IdP's interface, you should configure the IdP details in the PAM360 application. On the Configuration For Single Sign-On Using SAML page, under the Configure Identity Provider Details section, you should provide the required IdP details and upload the IdP certificate under the Import IdP's Certificate section. 3.1 Configuring Identity Provider DetailsYou can configure the IdP details manually or upload a metadata file obtained from the IdP's website that contains all the required IdP details. Follow these steps to auto-populate the IdP details using the metadata.xml file:
Alternatively, if you wish to enter the IdP details manually, follow these steps:
3.2 Importing IdP CertificateAfter configuring the required IdP details, you must upload the IdP certificate under the Import IdP's Certificate section on the Configuration For Single Sign-On Using SAML page. You can upload the IdP certificate directly from your machine or select a File/Key Store from PAM360 if you have the certificate stored in your PAM360 account.
Notes:
3.3 Enabling SAML Single Sign-OnThe final step in configuring SAML SSO is enabling SAML Single Sign-On for the PAM360 users. On the SAML configuration page, click the Enable Now button at the bottom-right corner of the screen to enable SAML SSO for the users in your environment. | |