FrejaEIDAuthenticator

This document describes how to configure FrejaEIDAuthenticator.

A keystore should have been received from Freja eID and imported into PhenixID Server before configuration of the authenticator. The keystore contains a certificate that allows the Freja eID server to verify requests from the PAS authenticator.

Please follow this document to import the keystore.

In the example below, a Freja eID authentication is used to protect the /mfaadmin resource.

Properties

Name Description Default value Mandatory
pipeID Id of pipe used by Freja eID Authenticator. Yes
successURL The URL to redirect the browser to after successful authentication. Yes
keyStore ID of the keyStore created in PhenixID Server. Yes
trustStore ID of the trustStore based on the public trusted certificates from Verisec. Yes
poll_frequency Poll frequency from the authenticator to Verisec server 1 No
poll_max Max number of polls from the authenticator to Verisec server, before the response is returned to the browser, where a new polling period is initiated. 120 No
test_mode Test mode, connecting to Verisec test environment false No
userNameParameter Username parameter name username No
relyingPartyId Freja eID relying party id No
allowLanguageChange Allow language change No
title Title login.messages.heading No
translationKey Translation key No
headingtranslationKey Heading translation key login.messages.information.header No
openLocalFrejaApp Open local Freja App text key login.messages.openLocalFrejaApp No
failedAuthKey Failed authentication key login.messages.failed_auth No
loginTemplate Login template frejaeid.template No
templates_dir Template directory templates No
includeQueryString Include query string false No
success_template Success template autopost No

General description

When a user client sends an authentication request to this authenticator, the authenticator will in turn send an authentication request to the Freja eID server for the specified username. If the user has enrolled a device at the Freja eID server, that device will receive a request from the Freja eID server to allow or deny the authentication. The authenticator will regularly check the server for a response from the user, until a response is received or a timeout limit is reached.  If the authentication request is allowed by the user, the authenticator will execute a pipe. If the pipe request is successful, the user will be allowed to the requested resource.


In the following, we will look specifically at an example where a Freja eID authenticator is used to protect the /mfaadmin resource on the PAS server, using a database lookup in addition to the authentication to ensure that the user is valid. To try the example, make sure that the MFA Admin application is activated.

Database configuration

The system is typically configured to check a database for the existence of the requesting user before allowing the user client to the requested resource. The database connection can be configured from the PhenixID Configuration Portal under Scenarios/Connections, or by using the Advanced view. An example configuration of a database connection, as seen in the Advanced view, is provided below.

<p>{
  "id": "d5c9fd4f-0e51-43d4-b1c5-b3e34b6edd4b",
  "type": "ldap",
  "description": "Connection to local OpenDJ",
  "config": {
    "host": "localhost",
    "port": "389",
    "bind_dn": "cn=Directory Manager",
    "password": "mypassword",
    "use_ssl": "true",
    "ssl_trust_all": "true",
    "follow_referrals": "false",
    "auto_reconnect": "true",
    "use_keep_alive": "true",
    "response_timeout_ms": "30000",
    "pool_initial_size": "1",
    "pool_max_size": "2"
  }
}</p>
Click to copy

The pipe that checks the database for the existence of the requesting user is in this case most easily configured using the Advanced view in the PhenixID Configuration Portal. After logging in and navigating to the advanced view, click the pencil next to the header "Pipes". Add the configuration below to the list of pipe configurations in the opened window, then click "Stage changes" and "Commit changes".

<p>{
  "id": "68731314-eeb2-4d59-9aaa-79cd9913a320",
  "valves": [{
    "name": "LDAPSearchValve",
    "enabled": "true",
    "config": {
      "connection_ref": "d5c9fd4f-0e51-43d4-b1c5-b3e34b6edd4b",
      "base_dn": "dc=example,dc=org",
      "scope": "SUB",
      "size_limit": "0",
      "filter_template": "mail={{request.username}}"
    }
  }]
}</p>
Click to copy

Note that the value of the field "connection_ref" corresponds to the value of the field "id" of the database configuration above.

The keystore

In order for the authenticator to act as a client to the Freja eID server, triggering authentication requests and polling the server for user responses, a keystore with a certificate is necessary. The certificate is provided by Freja eID and must be kept secure. For instructions of how to upload the keystore to the PAS server, see here. The resulting configuration, as seen in the Advanced view, can be seen below.

<p>{
    "id" : "a9bdfe2c-9a0b-4165-8d6d-0ae3f2ec7d9e",
    "type" : "pkcs12",
    "password" : "keystore password",
    "certificateAlias" : "xxxx",
    "privateKeyPassword" : "keystore password",
    "resource" : "c9be2a3b-f3c0-471a-9f87-15ede5d55498",
    "name" : "freja"
  }</p>
Click to copy

The truststore

In order for the PAS server to ensure that it is connecting to the correct Freja eID server, it is necessary to provide a truststore with public certificates

You have to add the add the certificate chain that the above client cert is created from.
This part has to be added manually in the Advanced view.

Open the Keystores part with the pen and add following code at the end.

<p>{
    "id": "frejaeid-truststore",
    "resource": "frejaeid-resource",
    "name": "Verisec Certificate Chain",
    "certificateAlias": "0",
    "type": "pkcs12"
}</p>
Click to copy

Stage and Commit and then open the Resources part with it´s pen.

Add the following code, Stage and Commit.

<p>{
    "description": "Verisec Certificate Chain",
    "id": "frejaeid-resource",
    "content_type": "application/x-pkcs12",
    "content_encoding": "base64",
    "content": "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----
MIIGODCCBCCgAwIBAgIUdxOCM0ShYGSRH6uHRMXj9bKkgV4wDQYJKoZIhvcNAQEL
BQAwUTELMAkGA1UEBhMCU0UxEzARBgNVBAoTClZlcmlzZWMgQUIxEjAQBgNVBAsT
CUZyZWphIGVJRDEZMBcGA1UEAxMQUlNBIFRlc3QgUm9vdCBDQTAeFw0xNzA1MTcx
NDQyNTJaFw0yNzA1MTcxNDQyNTJaMIGDMQswCQYDVQQGEwJTRTESMBAGA1UEBxMJ
U3RvY2tob2xtMRQwEgYDVQRhEws1NTkxMTAtNDgwNjEdMBsGA1UEChMUVmVyaXNl
YyBGcmVqYSBlSUQgQUIxDTALBgNVBAsTBFRlc3QxHDAaBgNVBAMTE1JTQSBURVNU
IElzc3VpbmcgQ0EwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDSUhGD
HHpqhp9OmA2f8HjKHd+JJDtexrVQetyZujZfig8UV6y85nEcAw7Fh1kEG9I3JHe/
PNmBL/y9NaRbqywgR8evU0l5wSBlevGelz9H+neGVEFvKkHmFOvr7f7c5bVWa/UR
zTmCfWAolKvY+AwKlIkdTE1eptn8M940YFvUULBhLaDSZXNhvv6EZT9w2xTT4ZyH
wd8faLfEvtGs+13KrAhutaJJYY6Xq0Fn9Q71sX/x5T7dG5InSiEPYNggW9pRVkx6
1mdbpiz6waGsNrMo0wOyX8/wfptgQ81B4BUnKT89F3NOh9M7ZJN9+sRtX0kWLLRZ
SN+Rg1Yy73D68B0xAgMBAAGjggHTMIIBzzAOBgNVHQ8BAf8EBAMCAQYwEgYDVR0T
AQH/BAgwBgEB/wIBADBPBggrBgEFBQcBAQRDMEEwPwYIKwYBBQUHMAGGM2h0dHA6
Ly9yb290Y2FsYWIzMS50ZXN0LmZyZWphZWlkLmNvbTo4Nzc3L2Fkc3Mvb2NzcDAf
BgNVHSMEGDAWgBTKsOy5V8OcPa05ihP68DW67Ax3ijCBuAYDVR0gBIGwMIGtMIGq
BgUqAwQFBjCBoDA4BggrBgEFBQcCARYsaHR0cHM6Ly9jcHMudGVzdC5mcmVqYWVp
ZC5jb20vY3BzL2luZGV4Lmh0bWwwZAYIKwYBBQUHAgIwWAxWVGhpcyBjZXJ0aWZp
Y2F0ZSBoYXMgYmVlbiBpc3N1ZWQgIGluIGFjY29yZGFuY2Ugd2l0aCB0aGUgRnJl
amEgZUlEIFRFU1QgUG9saWN5IENvbnRyb2wwXQYDVR0fBFYwVDBSoFCgToZMaHR0
cDovL3Jvb3RjYWxhYjMxLnRlc3QuZnJlamFlaWQuY29tOjg3NzcvYWRzcy9jcmxz
L2ZyZWphZWlkX3JzYV9yb290X2NhLmNybDAdBgNVHQ4EFgQUanyKD51wDhzaXy2g
PCZfiOgVv5wwDQYJKoZIhvcNAQELBQADggIBAGzHkEkVDMqcA+GRTAvW2OW1tDZo
FljM+w1AuQz380kmMamAl4f+Imw3UsT3JhXPZaJNVofqPBO/FiooO9mPIf8jMxrx
Lfm/p/2n9K49RYwgRNDwVyW59c1H0jvHePpfaRtPS2ov0eI+QSMvk14/phIv/bkN
d+0OVp0qgTVTTwwAvUQJ2P9cDK3OIj7H0vJhhw7ux66gNMHf+InERrbu0Si5rQem
SafaQTS6N0QNtJVAafRYDM/FTOdPulbxkbktybjMiDTuJ3MvhqKv5zCR8noYwEBP
VrePAvg6bwb0K1aCAQm4IsWBCKF4t6sqjrvaq/3jUo+M65Tp0AKTKn4B8nmTvGv9
lT4PgsCTwwXbIUcW5rfsmE9wVpRfieG7Gx62ydHPlIPkTChUzs/joju8sykVnssF
1YDqQlgMa2Sp+kx5i7eijX1ejcJh+pmuQTQnXj6sDJry81OtqDO7D7DhaUHfGLil
mXurAolujmll5MabdBEq3E4TTebvv6WSNpEYwQ1S+8eE+9slLnmhR2RSNpWGDQ/l
WwFoAsTCjG+e9f57mGUlmSeU6zERIxieER7wMM7EaqWaYo6JbeOhusbdTU/LmsyA
8fZYp+gn/FM8Wl8eh1qj/GIcAdDAIO3k8mqA98sWR7Mx5vgdRNcmpCtOQxxiijC7
MRbYKeBk4HOtXw9e
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----"
}</p>
Click to copy

The information in the content property is the .cer version of the root and intermediate certificates "Freja eID Production Root",  "Freja eID Production Issuing CA" and the corresponding test certificates concatenated into one file. That file has has then been base64 encoded to fit in the content property above

Configuring the authenticator

To protect the MFA Admin application with a Freja eID authentication and a database lookup, use the Advanced view in the Configuration Portal to enter the configuration below. After logging in and navigating to the Advanced view, click the pencil next to the header "Authentication - HTTP". Add the configuration below to the list of authenticator configurations in the opened window, then click "Stage changes" and "Commit changes".

<p>{
  "id": "0c18a73e-612a-4ce2-a353-40f60dd4bbf9",
  "alias": "freja",
  "name": "FrejaEIDAuthenticator",
  "displayName": "Freja",
  "configuration": {
    "pipeID": "68731314-eeb2-4d59-9aaa-79cd9913a320",
    "successURL": "/mfaadmin/",
    "keyStore": "a9bdfe2c-9a0b-4165-8d6d-0ae3f2ec7d9e"
  }
}</p>
Click to copy

Note that the value of the field "pipeID" corresponds to the value of the field "id" of the pipe configuration above, and that the value of the field "keyStore" corresponds to the value of the field "id" of the keystore configuration above.

Configuring the protected resource

To configure the MFA Admin application to be protected by the Freja eID authenticator, use the Advanced view in the Configuration Portal. After logging in and navigating to the Advanced view, locate the MFA Admin module and change the field "auth_redirect_url" to point to the authenticator alias, see below for example configuration.

<p>{
  "name" : "com.phenixidentity~phenix-prism",
  "enabled" : "true",
  "config" : {
    "base_url" : "/mfaadmin",
    "auth_redirect_url" : "/mfaadmin/authenticate/freja",
    "http_configuration_ref" : "bb8aed96-6b34-4850-9741-5c8960094e0f",
    "module_refs" : "a2103942-92ce-4259-ba4a-acbe4de209f8,97f3537e-a754-4cc5-b7f2-fce7eec38f33",
    "enable_roles" : "true"
  }
}</p>
Click to copy

If all the instructions above are carried out correctly, the user will be presented with a login screen for Freja eID when trying to access the /mfaadmin resource on the PAS server.

Requirements

A keystore with a valid certificate is uploaded to the PAS server.

User enrolled for freja e-id.