Forum Discussion
SAML Idp federated with Service-Now
Has anyone had any experience setting up SAML Idp with SN? I am using APM 11.4.0 and trying to determine the Assertion Settings and SAML Attributes. I have Assertion Subject Type = Email Address and Value = %{session.logon.last.username} and I believe that is what SN preference. For the SAML attribute, what should be included in the assertion?
14 Replies
- gbbaus_104974Historic F5 Account
Hi
Are you sure that your %{session.logon.last.username} is an email address format ?
Deepnding on the VPE [logon] oject, if you "Split the username" , then the %{session.logon.last.username} is a "simple" name format.
I had a situation necently where I needed to change to %{session.logon.last.logonname}
- gbbaus_104974Historic F5 Account
Just to clarify ... my situation wasnt with Service-Now, but I did need to pass the full email address (logon name) across as a "userPrincipleName" attribute
- gbbaus_104974Historic F5 Account
Hi Turn up SSO debugging and you may get more insight to the error in /var/log/apm log
Once a APM session is started, either do a "sessiondump -allkey | grep .last." at the APM CLI, or run a report via the APM GUI and look at the session.logon.last session varibles for your session. Is there a {session.logon.last.username or session.logon.last.logonname ?)
Also use SAML tracer in Firefox to look at the SAML assertion that your browser is posting (if you are getting to that point).
Your error above may be the "SP Entity ID" value that is mismatched between the APM and Service-now (not sure, so double check).
There also seems to be a mismatch of certs/keys used to sign and decrypt the assertion on either side. Check you have the same combination of settings either side (start with signing but not encrypting).
Lastly, depending on the version of APM, there is an issue with soecial cahracters in the asserion.... there is an irule fix to ensure the Assertion is preserved as initially created
maybe look at
http://wiki.servicenow.com/index.php?title=SAML_2.0_Web_Browser_SSO_Profile https://wiki.servicenow.com/index.php?title=SAML_2.0_Troubleshooting
and "Fixing F5 BIG-IP SAML Authentication Requests" blog
http://blog.routedlogic.net/?p=480
HTH
Gary
- AP_129594
Nimbostratus
It also appears that my client/server ssl profile need to be included the CA/Chain?
- AP_129594
Nimbostratus
It is getting more interesting as we progress: 1. We had to get a new client/server certificate and converted to jks format for the SP's keystore since they used the wildcard (*) certificate. 2. We enable AuthReq and SLO that required the assertion to be signed on the SP side. Now, I think we will also have to change the SAML Idp setting for assertion subject value to SAML Idp as sAMAccountName=%{session.logon.last.username} or sAMAccountName=%{session.session.ssl.cert.last.cn} ???
- THASIN
Nimbostratus
HI AP, I configured BIG-IP as IDP for service-now instance. IdP initiated connection is working perfectly. Service-now sdp initiated connection is not working - connection reset or page not displayed. Appreciate if you could share your Big-IP as IDP configuration for service-now or provide me some clue how to resolve this issue. Thasin
- AP_129594
Nimbostratus
Thasin, Can you be a little more specific when it started to fail? Download Firefox SAML tracer and look up the error message to determine where it fail.
- THASIN
Nimbostratus
After authenticating, the redirect page will not go anywhere and display "Connection was reset" https://apm.XXXX.com/saml/idp/profile/redirectorpost/sso?SAMLRequest=lVJBbtswEPyKwLtEiVKSmrAMKDaCGkhSIXZz6I0mVwkBilS5lJL%2BvjLtIumhCXrlzs7MznCJojds4M0Ynu0D%2FBwBQ%2FLaG4v8NKnJ6C13AjVyK3pAHiTfNXe3nGU5H7wLTjpDkgYRfNDOrp3FsQe%2FAz9pCd8fbmvyHMKAnFLohfAKpgxPw9S6l0y6nloxDeIJMuVIspktaCuOXG%2BbYuizuB3hR2tUq4HO%2Bp02QD0o7UEG5weHgSLOPDfOS4h31aQTBoEk201NdvfrhZKHfHHoyqqCksnDRZdXnRBXjF2J6uKynIHYCkQ9wdsq4ghbi0HYUBOWF1Va5Cn7si9KXlacsWzBLn%2BQpD0ncq2t0vbp4%2FgOJxDyr%2Ft9m7bfdvtIMGkF%2Fn5G%2F2dyj%2BAxpjZzk9UyFsijcf%2B%2B0489iT9FktVn4kv6XuIsOPCj8%2B2mdUbLX0ljjHtZexBhvib4EWIxvQj%2FdlFkRXzRKu0ilM8GtGmU8oBI6Oqs%2B%2FevXf0G&RelayState=https%3a%2f%2femaardev.service-now.com%2fnavpage.do&SigAlg=http%3a%2f%2fwww.w3.org%2f2000%2f09%2fxmldsig%23rsa-sha1&Signature=nA%2bXhUnwa%2fIiMMqR8aMOokIOXAVp9KziVj0YTxTBTVs7ic8x6pQt03TJ5G1hpd1B2qYliQ6aJ8ouUUzTTFnAtKGuBpHTIerYt%2byjqWloRRt%2fq04nYDh3Mhf8JHVtE3cSjtHmSpbJDnRCOzfgM%2fj48yIfxYmQi%2fVkVe3ifyJ7nwY%3d
- kunjan
Nimbostratus
Enable debug as following, and check the logs for the error.
tmsh modify apm sso saml /Common/myIdP log-level debugCheck thedebug logs in /var/log/apm
Which version are you using? BZ 428390 affects SAML logging
- THASIN
Nimbostratus
Oct 28 16:33:24 emaarhoapm1 notice apd[12930]: 01490010:5: 5c3c848a: Username 'shijog' Oct 28 16:33:26 emaarhoapm1 notice apd[12930]: 01490008:5: 5c3c848a: Connectivity resource '/Common/emaar_dev' assigned Oct 28 16:33:26 emaarhoapm1 notice apd[12930]: 01490128:5: 5c3c848a: Webtop '/Common/emaar_smal_webtop' assigned Oct 28 16:33:26 emaarhoapm1 notice apd[12930]: 01490005:5: 5c3c848a: Following rule 'fallback' from item 'Advanced Resource Assign' to ending 'Allow' Oct 28 16:33:26 emaarhoapm1 notice apd[12930]: 01490102:5: 5c3c848a: Access policy result: Full Oct 28 16:33:26 emaarhoapm1 warning tmm1[16307]: 014d0002:4: 5c3c848a: SSOv2 Authn Request has no Signature element Oct 28 16:33:26 emaarhoapm1 warning tmm1[16307]: 014d0002:4: 5c3c848a: SSOv2 Authn Request has no Signature element Oct 28 16:33:37 emaarhoapm1 warning tmm1[16307]: 014d0002:4: 5c3c848a: SSOv2 Authn Request has no Signature element Oct 28 16:33:55 emaarhoapm1 notice tmm1[16307]: 01490521:5: 2782480d: Session statistics - bytes in: 11415, bytes out: 9512 Oct 28 16:34:07 emaarhoapm1 warning tmm1[16307]: 014d0002:4: 5c3c848a: SSOv2 Authn Request has no Signature element Oct 28 16:34:26 emaarhoapm1 notice tmm1[16307]: 01490501:5: 5c3c848a: Session deleted due to user logout request.
SSOv2 Authn Request has no signature element - what it means
BIG-IP software version 11.5.1 HF5
- kunjan_118660
Cumulonimbus
BigIP as IdP is expecting the Authentication request from SP to be signed. In this case since it is not signed disable that.
tmsh modify apm sso saml-sp-connector /Common/mySP is-authn-request-signed false- THASIN
Nimbostratus
It worked perfectly after making the changes- Do not expect signed SAML Auth request from SP. Thanks for everyone
- kunjan
Nimbostratus
BigIP as IdP is expecting the Authentication request from SP to be signed. In this case since it is not signed disable that.
tmsh modify apm sso saml-sp-connector /Common/mySP is-authn-request-signed false- THASIN
Nimbostratus
It worked perfectly after making the changes- Do not expect signed SAML Auth request from SP. Thanks for everyone
Help guide the future of your DevCentral Community!
What tools do you use to collaborate? (1min - anonymous)Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com
