Basic Flow
Log on to IBM® webMethods iPaaS as a user with Cloud-Tenant-Administrator privileges. In IBM webMethods iPaaS, you can grant access to external identity provider users by assigning the default IBM webMethods iPaaS roles to the users, or by assigning IBM webMethods iPaaS roles to the users based on external identity provider group membership. If you want to do the latter, go to Administration > Roles and note the role names.
Create the URI for connecting the external identity provider to IBM webMethods iPaaS:
a. Go to Administration > Single-sign on > Add identity provider.
b. Specify the identity provider display name and unique identifier.
c. Copy the auto-created URI that appears in the IBM webMethods iPaaS redirect URI field to the clipboard. You can use the icon at the far right of the field to copy.
Configure your identity provider using the following examples:
- Configuring PingFederate to connect as the SAML Identity Provider
- Configuring Ping Identity as an Identity Provider for single sign-on
- Configuring OKTA to connect as the SAML Identity Provider
- Configuring Microsoft Active Directory Federation Services (ADFS) 3.0 to connect as the SAML Identity Provider
- Configuring Microsoft Azure to connect as the SAML Identity Provider
Configuration in IBM webMethods iPaaS
Return to the Metadata page and complete the fields. If you copied the external identity provider metadata URI or saved the metadata to file, choose to import and then specify the URI or file.
Click Next.
Go to the Configuration page and complete the fields as necessary. If you imported the external identity provider metadata, some of the fields are pre-populated with that corresponding metadata. If you did not import metadata, IBM webMethods iPaaS fields map to the external identity provider attributes as follows:
Tab Name | Field Name | Description | Identity Provider Attribute or Field |
Metadata | Single Sign-On Type | SAML 2.0 | -------- |
Metadata | Identity provider display name | Friendly name of the identity provider. | -------- |
Metadata | Identity provider unique identifier for use in IBM webMethods iPaaS redirect URI | Unique identifier for the identity provider. | -------- |
Metadata | IBM webMethods iPaaS redirect URI | URI that redirects external identity provider users to IBM webMethods iPaaS. | Copy the IBM webMethods iPaaS redirect URI to these fields:
|
Configuration | NameID policy format | Format to use for the subjects of SAML assertions. |
|
Configuration | Single sign-on service URL | URL for the identity provider endpoint/service to which applications must submit service requests (SAML AuthnRequests). | If you are creating the identity provider from scratch in IBM webMethods iPaaS (as opposed to importing a configuration), copy the value from this identity provider field to the IBM webMethods iPaaS field:
|
Configuration(SAML advanced settings) | HTTP-POST binding response | Whether the identity provider uses HTTP-POST binding to respond to authentication requests instead of the default HTTP-Request rebinding. Default value is true. | -------- |
Configuration (SAML advanced settings) | HTTP-POST binding for AuthnRequest | Whether the identity provider expects applications to use HTTP-POST binding to submit authentication requests instead of the default HTTP-Redirect binding. Default value is true. | -------- |
Configuration (SAML advanced settings) | Assertions signed (on/ off) | Whether the identity provider signs SAML assertions and send the signed assertion. | If you set the IBM webMethods iPaaS field to On, set this attribute as follows:
|
Configuration (SAML advanced settings) | Assertions encrypted | Whether IBM webMethods iPaaS expects an encrypted assertion from the identity provider. | If you set the IBM webMethods iPaaS field to ON, create the
certificate as follows: i. Copy the Service Provider Descriptor URL from the Configuration tab in IBM webMethods iPaaS and open it in a browser. Note: This field is visible only after the
Single sign-on profile is saved.
Copy the content of the X509Certificate attribute from the
response to a file, add the header —–BEGIN CERTIFICATE—– and the footer —–END CERTIFICATE—–, and
save the file with the extension .cert. Set this attribute and upload the certificate:
|
Configuration (SAML advanced settings) | Validate signature | Whether IBM webMethods iPaaS validates SAML assertion signatures. | If you set the IBM webMethods iPaaS field to On, copy the public certificate from the identity provider to the Validating X509 Certificates field in IBM webMethods iPaaS. You can obtain the certificate as follows:
|
Attributes | Username | Name of the SAML attribute that identifies the user. | Always the NameID attribute value in the Identity provider (for example, an email address or user name). |
Attributes | Work email | Name of the SAML attribute that provides the user’s email address. |
|
Attributes | First name | Name of the SAML attribute that provides the user’s first name. |
|
Attributes | Last name | Name of the SAML attribute that provides the user’s last name. |
|
Roles | IBM webMethods iPaaS Roles | Roles set in the Identity provider. The values are reflected in the SAML assertion. In the SAML assertion response, IBM webMethods iPaaS looks for a key named roles to get the list of roles. |
|
Click Next.
On the Attributes page, type the user attribute names you specified in identity provider.
Click Next.
-
Whenever a user logs in, all user attributes are updated from the external identity provider.
-
You cannot use an external identity provider user as a technical user for API authentication. Instead, use an internal user for technical API calls.
On the Roles page, you can grant access to identity provider users as follows:
By assigning default IBM webMethods iPaaS roles to Identity Provider user
Click Assign default IBM webMethods iPaaS roles to users. Later, you can go to individual IBM webMethods iPaaS products and modify the access.
By assigning IBM webMethods iPaaS roles to identity provider users based on Identity Provider group membership
Click Assign IBM webMethods iPaaS roles to users by mapping to identity provider roles. Click +, select a IBM webMethods iPaaS role, and then type the name of the Identity Provider group that corresponds to the role. IBM webMethods iPaaS updates the user role assignments at each login. If an external-Identity Provider role matches the SAML assertion, the role is added. If not, the role is removed.
Save the identity provider configuration.