Purpose

The purpose of this article is to showcase SAML integration with Azure AD for VSA portal and gateway authentication when

  • Portal and gateway are configured in the same device
  • Device 1 is configured as portal and device 2 is configured as gateway

This wiki article will not showcase all the basic VSA configuration.

Create a SAML APP in Azure

  1. Login to Azure Portal
  2. Click on Enterprise Applications







SAML APP Configuration

3. Open the created application under Enterprise Applications and click on Single sign-on -> SAML from application menu.



4. Edit Basic SAML configuration


  

5. SSO URL in the SAML application should be configured in the following format.

 https://<domain-name>/secure-access/services/saml/login-consumer

  

6. In the below example shown, domain name in the URL  is replaced with the WAN IP address of the device which has both Secure access portal & gateway configured.



Please note:  If the config is via concerto, we need to use below reply-url on the SSO (Assertion Consumer Service URL):  https://sase-concerto.acs.versanow.net/secure-access/services/saml/login-consumer


User Attributes & Claims


  

7. The Value of Unique User Identifier should match the User ID that will be used during VSA Registration. The default value is userprincipalname.

    In this example, email ID of the user is used as User ID for the registration. In this case the value type of Unique User Identifier should be changed to user.mail


  

8.  Click on the Value to edit


  

Azure certificate for SAML profile creation

9. Download the below shown certificate into the local machine


  

10. In the Director, navigate to VSA device appliance context -> Configuration-> Objects & Connectors -> Objects -> Custom Objects ->CA Chains

  

11. Under Director tab, upload the Azure SAML certificate



  

12. Navigate to Appliance tab and import the CA-chain cert that was uploaded in the previous step



  

Assign Users for SSO Authentication

13. Under Users and groups from application menu



  

14. Make sure email address is mapped under user profile


  

SAML Profile Configuration – VSA

15. To configure SAML profile in VSA device, from Director configuration tab, open device template, navigate to Objects & Connectors -> Connectors -> Users/Groups -> SAML Profile


  

16. Use the below details to configure SAML profile



  

17. Configure Host with SSO URL configured in Azure SAML app

 

18. SP Entity IDIdentifier (Entity ID) value configured in Azure SAML app

 

19. IDP certificate -> configure the certificate that was downloaded and imported from Azure SAML app.

  

20. Map this SAML profile in the authentication profile configured under VSA portal and gateway.

      Refer this document to configure authentication profile for VSA

      https://wiki.versa-networks.com/display/VSETAC/Versa+Secure-Access+VPN+Gateway

  

21. If VSA portal and gateway are configured in 2 different devices, each device needs to be configured with SAML profile by creating 2 different SAML apps in Azure (1 for each device) by repeating above mentioned steps with SSO URL

      1st APP -> https://<Device1 WAN IP>/secure-access/services/saml/login-consumer

      2nd APP -> https://<Device2 WAN IP>/secure-access/services/saml/login-consumer

Client Side Verification

22. Use Microsoft login credentials – for Portal & gateway authentication





Debugging

  • Enable VSA debug – device CLI

admin@VSA-Gateway-cli(config)% set debug saccess all-flags level all

admin@VSA-Gateway-cli(config)% commit

[admin@VSA-Gateway: ~] $ cd /var/log/versa/

[admin@VSA-Gateway: versa] $ tail -f -n 100 versa-service.log

 

  • If SSO URL configured in Azure SAML app (Point no 5)  is incorrect, below shown error occurs



  • If below shown error is encountered, check if IDP Entity ID (Point number 16) in Versa SAML profile is properly configured
     



  • If SAML authentication is successful


Author: Snekha Ravichandran