FrejaEIDAuthenticatorSAML
This document describes how to configure FrejaEIDAuthenticatorSAML.
A keystore should have been received from Freja eID and imported into PhenixID Server before configuration of the authenticator. The keystore contains a certificate that allows the Freja eID server to verify requests from the PAS authenticator.
Please follow this document to import the keystore.
Properties
General description
When a SAML SP sends an authentication request to this authenticator, the authenticator will in turn send an authentication request to the Freja eID server for the specified username. If the user has enrolled a device at the Freja eID server, that device will receive a request from the Freja eID server to allow or deny the authentication. The authenticator will regularly check the server for a response from the user, until a response is received or a timeout limit is reached. If the authentication request is allowed by the user, the user will be allowed to the requested resource.
The keystore
In order for the authenticator to act as a client to the Freja eID server, triggering authentication requests and polling the server for user responses, a keystore with a certificate is necessary. The certificate is provided by Freja eID and must be kept secure. For instructions of how to upload the keystore to the PAS server, see here. The resulting configuration, as seen in the Advanced view, can be seen below.
{
"id" : "a9bdfe2c-9a0b-4165-8d6d-0ae3f2ec7d9e",
"type" : "pkcs12",
"password" : "keystore password",
"certificateAlias" : "xxxx",
"privateKeyPassword" : "keystore password",
"resource" : "c9be2a3b-f3c0-471a-9f87-15ede5d55498",
"name" : "freja"
}
The truststore
In order for the PAS server to ensure that it is connecting to the correct Freja eID server, it is necessary to provide a truststore with public certificates
You have to add the add the certificate chain that the above client cert is created from.
This part has to be added manually in the Advanced view.
Open the Keystores part with the pen and add following code at the end.
{
"id": "frejaeid-truststore",
"resource": "frejaeid-resource",
"name": "Verisec Certificate Chain",
"certificateAlias": "0",
"type": "pkcs12"
}
Stage and Commit and then open the Resources part with it´s pen.
Add the following code, Stage and Commit.
{
"description": "Verisec Certificate Chain",
"id": "frejaeid-resource",
"content_type": "application/x-pkcs12",
"content_encoding": "base64",
"content": "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
"
}
The information in the content property is the .cer version of the root and intermediate certificates "Freja eID Production Root", "Freja eID Production Issuing CA" and the corresponding test certificates concatenated into one file. That file has has then been base64 encoded to fit in the content property above
Configuring the authenticator
Start by configuring the scenario, Federation - Username and password, according to this instruction.
See information about values for the scenario below.
When done, go to the Advanced tab and locate the Authentication - HTTP entry, that was configured in the previous "Federation - Username and password" scenario.
Change the value of the name parameter from "PostUidAndPasswordSAML" to "FrejaEIDAuthenticatorSAML".
Example Freja eID SAMLAuthenticator
In PhenixID configuration portal, go to advanced and click on the pencil next to "Authentication - HTTP".
Authenticator should look similar to this:
{
"id": "13d61f3d-3b41-49d9-ba7c-24a3b3b8911e",
"alias": "Freja2018",
"name": "FrejaEIDAuthenticatorSAML",
"displayName": "SAMLUidPwd",
"configuration": {
"success_template": "samlconsent",
"pipeID": "ff6cb2b4-101c-4734-b1bf-eb61526257c9",
"idpID": "459256d5-fb72-4bf6-8628-229a2f091c2f",
"keyStore": "b3d10a11-e325-4c6b-89e9-66bc2b240b81",
"trustStore": "frejaeid-truststore"
}
}
Add the keyStore parameter and value to the configuration. The value for keyStore can be found in PhenixID configuration portal, under Scenarios and then Federation, Keystore. Use the ID of the keystore created/imported earlier.
When done click Stage changes and Commit changes.
Configure the execution flow
Open the Execution flow tab and expand the flow.
Delete valve #1 (InputParameterExistValidatorValve), valve #2 (LDAPSearchValve) and valve #3 (LDAPBindValve).
On the valve AssertionProvider, make sure that the value for "NAME ID ATTRIBUTE" is set to "userIdentifier" and values for "ADDITIONAL ATTRIBUTES" is set to "userGivenName,userSurName".
Add valve ItemCreateFromRequestValve with the value {{request.uid}} for parameter "DESTINATION ITEM ID".
Place this valve before AssertionProvider in the valve list.
When done, press Save.
Example Pipes (from the section "Pipe valves")
{
"id": "85808f6d-8228-41b4-a8b5-afb2a1cebc16",
"name": "ItemCreateFromRequestValve",
"enabled": "true",
"config": {
"proceed_on_error": "false",
"dest_id": "{{request.uid}}"
},
"pipe_ref": "ff6cb2b4-101c-4734-b1bf-eb61526257c9"
}
----
{
"id": "356c244c-daee-425e-9488-24f876d84751",
"name": "AssertionProvider",
"enabled": "true",
"config": {
"targetEntityID": "459256d5-fb72-4bf6-8628-229a2f091c2f",
"sourceID": "https://external_sp/sp",
"nameIDAttribute": "userIdentifier",
"guide_ref": "e691e6e8-f519-4458-b389-8ed3a6b14f3d",
"additionalAttributes": "userGivenName,userSurName"
}
}
Requirements
A keystore with a valid certificate is uploaded to the PAS server.
User enrolled for freja e-id.