After you configure SAML in QRadar, you can configure your
Identity Provider by using the XML metadata file that you created during that process. This example
includes instructions for configuring Microsoft Active Directory Federation Services (AD FS) to
communicate with QRadar using
the SAML 2.0 single sign-on framework.
Before you begin
To configure the AD FS server, you must first configure SAML in QRadar. Then copy the QRadar SAML XML metadata file you
created during that process to a location accessible to the AD FS server.
Procedure
-
On the AD FS Management console, select the Relying Party Trusts
folder.
-
On the Actions sidebar, click Standard Relying Party
Trust, and click Start.
This opens the Add Relying Party Trust wizard.
-
On the Select Data Source window, select Import data about
the relying party from a file, browse to the QRadar SAML XML metadata file, and
click Open.
-
Click Next.
-
Type a Display name and add any relevant Notes,
then click Next.
-
Select an access control policy, and click Next.
-
Configure any additional options you require, and click Next.
-
Click Close.
-
In the Relying Party Trusts folder, select the new trust you created,
then click Edit Claim Issuance Policy.
-
Click Add Rule.
-
Select Send LDAP Attributes as Claims from the Claim rule
template menu, then click Next.
-
Type a Claim rule name, and select the Attribute
store.
-
select the attributes to be sent in the assertion, map to the appropriate Outgoing
Claim Type, and click Finish.
-
Click Add Rule.
-
Select Transform an Incoming Claim from the Claim rule
template menu, then click Next.
-
Configure the following options:
- Claim rule name
- Incoming claim type - use value UPN
- Outgoing claim type as NameID
- Outgoing NameID format
-
Select Pass through all claim values, then click
Finish.
-
If you configured QRadar to use the provided QRadar_SAML certificate for
SAML, copy the previously downloaded Root CA, intermediate CA, and CRL files to a directory on the
Windows server. Then open a command line window as administrator on Windows OS and type the
following commands:
certutil -addstore -f ROOT <local_path>root-qradar-ca_ca
certutil -addstore -f CA <local_path>QRadarSAML_ca.crt
certutil -addstore -f ROOT <local_path>QRadarSAML_ca.crl
certutil -addstore -f Root <local_path>root-qradar-ca_ca.crl
The files are located in /opt/qradar/ca/www.