FrejaEIDAuthenticatorSAML
This document describes how to configure FrejaEIDAuthenticatorSAML.
A keystore should have been received from Freja eID and imported into PhenixID Server before configuration of the authenticator. The keystore contains a certificate that allows the Freja eID server to verify requests from the PAS authenticator.
Please follow this document to import the keystore.
Properties
General description
When a SAML SP sends an authentication request to this authenticator, the authenticator will in turn send an authentication request to the Freja eID server for the specified username. If the user has enrolled a device at the Freja eID server, that device will receive a request from the Freja eID server to allow or deny the authentication. The authenticator will regularly check the server for a response from the user, until a response is received or a timeout limit is reached. If the authentication request is allowed by the user, the user will be allowed to the requested resource.
The keystore
In order for the authenticator to act as a client to the Freja eID server, triggering authentication requests and polling the server for user responses, a keystore with a certificate is necessary. The certificate is provided by Freja eID and must be kept secure. More information:
Freja eID Client SSL Certificate
For instructions of how to upload the keystore to the PAS server, see here. The resulting configuration, as seen in the Advanced view, can be seen below.
{
"id" : "a9bdfe2c-9a0b-4165-8d6d-0ae3f2ec7d9e",
"type" : "pkcs12",
"password" : "keystore password",
"certificateAlias" : "xxxx",
"privateKeyPassword" : "keystore password",
"resource" : "c9be2a3b-f3c0-471a-9f87-15ede5d55498",
"name" : "freja"
}
The truststore
In order for the PAS server to ensure that it is connecting to the correct Freja eID server, it is necessary to provide a truststore with public certificates
You have to add the certificate chain that the above client cert is created from.
This part has to be added manually in the Advanced view.
Open the Keystores part with the pen and add following code at the end.
{
"id": "frejaeid-truststore",
"resource": "frejaeid-resource",
"name": "Verisec Certificate Chain",
"certificateAlias": "0",
"type": "pkcs12"
}
Stage and Commit and then open the Resources part with it´s pen.
Add the following code, Stage and Commit.
{
"description": "Verisec Certificate Chain",
"id": "frejaeid-resource",
"content_type": "application/x-pkcs12",
"content_encoding": "base64",
"content": "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----
MIIGKTCCBBGgAwIBAgIURVYm7hoZF4XSX/iKAN5xmB+3qF4wDQYJKoZIhvcNAQEL
BQAwdjELMAkGA1UEBhMCU0UxHTAbBgNVBAoTFFZlcmlzZWMgRnJlamEgZUlEIEFC
MRMwEQYDVQQLEwpQcm9kdWN0aW9uMR0wGwYDVQQDExRGcmVqYSBlSUQgUm9vdCBD
QSB2MTEUMBIGA1UEYRMLNTU5MTEwLTQ4MDYwHhcNMTcwODAxMTEzNzUwWhcNNDcw
ODAxMTEzNzUwWjB2MQswCQYDVQQGEwJTRTEdMBsGA1UEChMUVmVyaXNlYyBGcmVq
YSBlSUQgQUIxEzARBgNVBAsTClByb2R1Y3Rpb24xHTAbBgNVBAMTFEZyZWphIGVJ
RCBSb290IENBIHYxMRQwEgYDVQRhEws1NTkxMTAtNDgwNjCCAiIwDQYJKoZIhvcN
AQEBBQADggIPADCCAgoCggIBAKXB6WuJuqYlZQzRHWAxG4WI8WzwK0h8A4V7mL+x
LNH9dW5WykdKiC9WOrYq2bUYB5KJofMvsUMnmcbOmoTjNikBUvI88CZjinqpSd0O
kCEIHrEeNrk8C9tkNf6v879nsqr94k9uJj665OrRZinkTW+bxAWnYiEH1tNrc/Wj
nUWXR5pwZnDhO4m/fOHCR92LR5cP9zZ7DDBFPXqtTXURrXSyhoXn+/yKX/ubBeN4
OHorjS7cywEzyQkhvYSSIf1ypmDpRuBoL+sMKapCHgIrPcWeCMR0SHFaKxDe1bqL
Y59OKRcRBrm5Ec9RnJcnOT8DZoDQqWGDZ6GsSRuHlW5xkhhzrdlB6Lrw1avPcCvx
4/ZQTFLOZm+zpltUCG7Q/z9HzihGn0bqcrm1PYKQmRpTlwcqfgNGOConnNOkLW7h
+8szIR4xIpT6MroAZTrvwWi43Db35TQWZkPQ9NKKUmc98KN3cqcIvtjrLArK1nlS
9Juf30oQrU4lQbfod9NZYC/U03aonYd514wpz/mwtVFkY9zZfNfkfGmSwMGycexn
bBh5swIZYUvkmtdDZsHGXjJIsIFD4AI6NODRvyXvgLRDabvrqia22+cEvJ/eIQIK
hKm8Kvo3Y28g1oZPuePLZZkFeKHluBDsgBsJJspyIlYHS3s7YfBkhmzKDkH4JZaf
Pl/nAgMBAAGjga4wgaswDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8w
HwYDVR0jBBgwFoAUtHJ2xk4gUzOKnP0zaascRhQzY+MwSAYDVR0gBEEwPzA9Bggq
hXCBeQEBATAxMC8GCCsGAQUFBwIBFiNodHRwczovL3d3dy5mcmVqYWVpZC5jb20v
dGMvY2EuaHRtbDAdBgNVHQ4EFgQUtHJ2xk4gUzOKnP0zaascRhQzY+MwDQYJKoZI
hvcNAQELBQADggIBAGYhB+/Imju88U+TBz0ddO71aaO9otqvsAQFpVwXDERTqwG6
Z/3dXUZYWaP02CA6zRG7hy8o/EfkrDGyluNsUvN8XAskulCvhKNvQ86Rv1fEq6/v
kNeg+fhkF70R4NPAOmZm5uiho2QUT45gXPo16ICK9kCdLYdN6HrCK7/d+0bMDigH
moTlSvq8G50rpKcvxEBdwy7zAfYZ+p1B6gLV7ulUJot5fZ5+RG/mD3tmWHi2bQid
lsi3MM9Tpw1XWjimLSsdjXbV0LOzGVRcB4xbvDxM4OfR3zTCxJpdqE/9jLNVNr5O
IVqj3P+K3dU6ydj+RMjJILpRU+Po4YEhv32VFyITiX+n7GKXN2n7Sp13/6/UCgxe
cqBIuI+UK7F7c+ZKNY1RBh0uoIc/2hFkQNUz8R9LmTzex20Y0RhW9fq2cuNxp9vJ
IMPOiHsggGCn6hwf0RY94VDxGIhSAkzSVvfaiLZYejN2Xu/C2ym9wUd0QauBTpXO
mgIV38CMwmtbSKLxPqfEbgpk6+/An5HO3u4XoxKYroL8JuuKsZBxbQyiPmOZVeNg
uXExHmZhcayFRXMs4xJMXE1W1zj+zTsGa57QxFWfgH6FPfY2PG5Z/0MiBEMlS1V5
Q25JHHI64kWnkynGymYL2veqVOYxuJm2Jmzwkeequ5+pi814HCHGwjMpT60N
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
"
}
The information in the content property is the .cer version of the root and intermediate certificates "Freja eID Production Root", "Freja eID Production Issuing CA" and the corresponding test certificates concatenated into one file. That file has has then been base64 encoded to fit in the content property above
Configuring the authenticator
Start by configuring the scenario, Federation - Username and password, according to this instruction.
See information about values for the scenario below.
When done, go to the Advanced tab and locate the Authentication - HTTP entry, that was configured in the previous "Federation - Username and password" scenario.
Change the value of the name parameter from "PostUidAndPasswordSAML" to "FrejaEIDAuthenticatorSAML".
Example Freja eID SAMLAuthenticator
In PhenixID configuration portal, go to advanced and click on the pencil next to "Authentication - HTTP".
Authenticator should look similar to this:
{
"id": "13d61f3d-3b41-49d9-ba7c-24a3b3b8911e",
"alias": "Freja2018",
"name": "FrejaEIDAuthenticatorSAML",
"displayName": "SAMLUidPwd",
"configuration": {
"success_template": "samlconsent",
"pipeID": "ff6cb2b4-101c-4734-b1bf-eb61526257c9",
"idpID": "459256d5-fb72-4bf6-8628-229a2f091c2f",
"keyStore": "b3d10a11-e325-4c6b-89e9-66bc2b240b81",
"trustStore": "frejaeid-truststore"
}
}
Add the keyStore parameter and value to the configuration. The value for keyStore can be found in PhenixID configuration portal, under Scenarios and then Federation, Keystore. Use the ID of the keystore created/imported earlier.
When done click Stage changes and Commit changes.
Configure the execution flow
Open the Execution flow tab and expand the flow.
Delete valve #1 (InputParameterExistValidatorValve), valve #2 (LDAPSearchValve) and valve #3 (LDAPBindValve).
On the valve AssertionProvider, make sure that the value for "NAME ID ATTRIBUTE" is set to "userIdentifier" and values for "ADDITIONAL ATTRIBUTES" is set to "userGivenName,userSurName".
Add valve ItemCreateFromRequestValve with the value {{request.uid}} for parameter "DESTINATION ITEM ID".
Place this valve before AssertionProvider in the valve list.
When done, press Save.
Example Pipes (from the section "Pipe valves")
{
"id": "85808f6d-8228-41b4-a8b5-afb2a1cebc16",
"name": "ItemCreateFromRequestValve",
"enabled": "true",
"config": {
"proceed_on_error": "false",
"dest_id": "{{request.uid}}"
},
"pipe_ref": "ff6cb2b4-101c-4734-b1bf-eb61526257c9"
}
----
{
"id": "356c244c-daee-425e-9488-24f876d84751",
"name": "AssertionProvider",
"enabled": "true",
"config": {
"targetEntityID": "459256d5-fb72-4bf6-8628-229a2f091c2f",
"sourceID": "https://external_sp/sp",
"nameIDAttribute": "userIdentifier",
"guide_ref": "e691e6e8-f519-4458-b389-8ed3a6b14f3d",
"additionalAttributes": "userGivenName,userSurName"
}
}
Requirements
A keystore with a valid certificate is uploaded to the PAS server.
User enrolled for freja e-id.