Kony Fabric identity supports Security Assertion Markup Language 2.0 (SAML). SAML is an XML-based open standard data format for exchanging authentication and authorization data between parties, such as an identity provider and a service provider. SAML defines three roles:
SAML allows single sign-on (SSO) with web browsers or other clients. With SSO, a user logs in once with a name and password, and can access multiple resources.
When a user logs into an application (either a mobile app or web app), the service provider issues an authentication request to a SAML identity provider through the user agent (usually a web browser.) After the user logs in (as part of SAML identity provider log-in), the IdP generates a SAML token that includes assertions about the user (such as user name, email, or other authorization information). The service provider verifies the SAML token (identity provider of the user information), and provides access to its services or resources. When the process completes, the user can interact with the application/web resources.
Note: NTLM authentication is not supported by SAML identity service.
Note:
To enable SAML ADFS login, follow these steps:
The UnlimitedJCEPolicyJDK7.zip
(unlimited strength) contains the following files:
local_policy.jar
US_export_policy.jar
README.txt
USERINSTALLDIR/jre/lib/security
folder. Replace the policy files with the unlimited strength policy files (local_policy.jar and US_export_policy.jar) that you downloaded from the Oracle website.The following sections describe how to configure and use a SAML service:
To create a SAML service, follow these steps:
idpmetadata.xml
.Under Choose Assertion Consumer Service Binding, select one of the following options:
Note: By default, this field is set to Artifact Binding.
For example, In the Mapping of LDAP attributes to outgoing claim types, you must map at least one attribute to the Name ID as SAML validates the Name ID attribute. If the Name ID is not mapped, the system throws an exception. The Name ID should not be empty - for example, User-Principal-Name to Name ID.
Other mappings are optional - for example, Given-Name, Surname.
Important: Apps enabled for SSO will not work if the option is selected, Allow only one active user session across all apps.
Click SAML Metadata and then select the desired metadata from the list.
The system downloads the metadata file generated by your authentication service (service provider) into your local system. For example, spmetadata.xml.
Once you are authenticated successfully, the system retrieves the profile information from the identity provider. The profile information depends on mapped attributes. If no attributes are mapped, Kony service provider shows an empty profile.
Note: Logout from a browser session not supported for Kony SAML Identity Provider:
When a user logs out from the Kony SAML identity connector, only the identity session is cleared and does not log out from the browser session of the Identity Provider (IdP). Currently, support for the Kony SAML identity connector logout of browser session of IDP is not available. So, this results in the user's IDP session cookies that are created as part of login to SAML IDP are not cleared. After the user logs in again, the Login page is not displayed to the user until the IDP session cookies get expired due to timeout.
Note: You can view the service in the Data Panel feature of Kony Visualizer. By using the Data Panel, you can link back-end data services to your application UI elements seamlessly with low-code to no code. For more information on Data Panel, click here.
To upload your service provider's metadata to Salesforce, follow these steps:
entityID
. For example, kony:100000001:providernameCopy the value of the AssertionConsumerService URL
. For example, https://100000001.auth.konycloud.com/saml/SSO/alias/kony:100000001:providername?provider=provideernam
In the Web App Settings section, do the following:
Important: While logging on by using the SAML provider, ensure that you have required permission set to access the connected app.
To use an existing service, follow these steps:
The service is added and is available in the Identity page of your app.
Note: The Existing Services page contains a list of services created within the same parent account.
Copyright © 2020 Kony, Inc. All rights reserved. |