Purpose
The purpose of this article is to showcase SAML integration with Azure AD for VSA portal and gateway authentication when
Portal and gateway are configured in the same deviceDevice 1 is configured as portal and device 2 is configured as gateway
This wiki article will not showcase all the basic VSA configuration.
Create a SAML APP in Azure
Login to Azure PortalClick onEnterprise Applications



SAML APP Configuration
3. Open the created application under Enterprise Applications and click on Single sign-on -> SAML from application menu.

4. Edit Basic SAML configuration

5. SSO URL in the SAML application should be configured in the following format.
https://<domain-name>/secure-access/services/saml/login-consumer
6. In the below example shown, domain name in the URL is replaced with the WAN IP address of the device which has both Secure access portal & gateway configured.

Please note: If the config is via concerto, we need to use below reply-url on the SSO (Assertion Consumer Service URL): https://sase-concerto.acs.versanow.net/secure-access/services/saml/login-consumer
User Attributes & Claims

7. The Value of Unique User Identifier should match the User ID that will be used during VSA Registration. The default value is userprincipalname.
In this example, email ID of the user is used as User ID for the registration. In this case the value type of Unique User Identifier should be changed to user.mail

8. Click on the Value to edit

Azure certificate for SAML profile creation
9. Download the below shown certificate into the local machine

10. In the Director, navigate to VSA device appliance context -> Configuration-> Objects & Connectors -> Objects -> Custom Objects ->CA Chains
11. Under Director tab, upload the Azure SAML certificate


12. Navigate to Appliance tab and import the CA-chain cert that was uploaded in the previous step


Assign Users for SSO Authentication
13. Under Users and groups from application menu


14. Make sure email address is mapped under user profile

SAML Profile Configuration – VSA
15. To configure SAML profile in VSA device, from Director configuration tab, open device template, navigate to Objects & Connectors -> Connectors -> Users/Groups -> SAML Profile

16. Use the below details to configure SAML profile


17. Configure Host with SSO URL configured in Azure SAML app
18. SP Entity ID : Identifier (Entity ID) value configured in Azure SAML app
19. IDP certificate -> configure the certificate that was downloaded and imported from Azure SAML app.
20. Map this SAML profile in the authentication profile configured under VSA portal and gateway.
Refer this document to configure authentication profile for VSA
https://wiki.versa-networks.com/display/VSETAC/Versa+Secure-Access+VPN+Gateway
21. If VSA portal and gateway are configured in 2 different devices, each device needs to be configured with SAML profile by creating 2 different SAML apps in Azure (1 for each device) by repeating above mentioned steps with SSO URL
1st APP -> https://<Device1 WAN IP>/secure-access/services/saml/login-consumer
2nd APP -> https://<Device2 WAN IP>/secure-access/services/saml/login-consumer
Client Side Verification
22. Use Microsoft login credentials – for Portal & gateway authentication




Debugging
Enable VSA debug – device CLI
|
|
If SSO URL configured in Azure SAML app (Point no 5) is incorrect, below shown error occurs

If below shown error is encountered, check ifIDP Entity ID(Point number 16) in Versa SAML profile is properly configured

If SAML authentication is successful

Author: Snekha Ravichandran