Pulse Secure SAML Integrationï
Introductionï
This article explains how to integrate a PulseSecure SSL VPN with AuthControl Sentry.
Configuring the PulseSecure VPNï
Note
It is assumed that your PulseSecure already has a basic, working configuration.
Log into the PulseSecure administration console. From the menu, select âAuthenticationâ, then âSigning Inâ and âSign-in SAMLâ.
Click the link for âSAML Settingsâ, at the end of the line for âEntity Idâ.
Enter the public host name of your PulseSecure server under âHost FQDN for SAMLâ, and click âSave Changesâ.
Go back to the âSign-in SAMLâ page, and ensure that the Entity Id is:
https://<pulse_server>/dana-na/auth/saml-endpoint.cgi
i.e. it should be exactly the same as the Entity ID you put on the Sentry application settings, except for â?p=sp1â.
Now go to âAuthenticationâ, âAuth. Serversâ
Select âSAML Serverâ from the drop-down, then click âNew ServerâŠâ.
Set a name for the server. Ensure that âSAML Versionâ is set to 2.0.
âConnect Secure Entity Idâ will be set as the unique entity ID for this server. Make a note of it, as you will be entering it in the Sentry configuration page.
For âIdentity Provider Entity Idâ and âIdentity Provider Single Sign On Service URLâ, enter:
https://<swivel_server>/sentry/saml20endpoint
Here, ââ<swivel_server>ââ is the public URL of the Swivel sentry server.
Check âSupport Single Logoutâ, and enter:
https://<swivel_server>/sentry/singlelogout
as the âSingle Logout Server URLâ. The âSingle Logout Response URLâ is the same, so can be left blank.
Note
For the next part, you will need a copy of the metadata from the Swivel Sentry server. If you do not already have one, open your browser to: âhttps://<swivel_server>/sentry/metadata/generatedMetadata.xmlâ. When the metadata is displayed in your browser, save it to disk.
Ensure that âPostâ is selected as the âSSO Methodâ. Click âBrowseâ next to âUpload Certificateâ and select the metadata file you downloaded earlier.
Set a valid value for âMetadata Validityâ.
Click âSave Changesâ.
Now Select âUsersâ, then âUser Realmsâ.
Click âNewâ to create a new user realm.
Add a name, then under âAuthenticationâ, select your new authentication server. Click âSave Changesâ.
Now under âRole Mappingâ, select the role(s) that users will be assigned. For example, in the following role mapping, all users are assigned to the Role âUsersâ.
Finally, go to âAuthenticationâ, âSigning Inâ, âSign-in Policiesâ. Click âNew URLâŠâ. Enter the âSign-in URLâ, then select âUser picks from a list of authentication realmsâ and add the user realm created above. Click âSave Changesâ.
Configuring the Sentry Applicationï
Log into the Sentry administration console. Select âApplicationsâ. Then Click âAdd Applicationâ and select âSAML - PulseSecureâ
Note
For all the following, replace ââ<pulse_server>ââ with the public host name for your Pulse server:
Under âPortal URLâ, enter the URL for the PulseSecure portal that will be authenticated using Sentry, for example:
https://<pulse_server>/saml
Under âEndpoint URLâ, enter:
https://<pulse_server>/dana-na/auth/saml-consumer.cgi
Under âEntity IDâ, enter the unique Entity ID you recorded from the PulseSecure authentication server.
Under âFederated Idâ, enter âemailâ.
Testing authentication to PulseSecure via AuthControl Sentryï
This should be the final step after all previous elements have been configured.
Visit your AuthControl Sentry Page with your public DNS entry of your Swivel AuthControl Sentry server, e.g.
https://mycompanysentrydomain/sentry/startPage
On a Start Page you will be able to see a new PulseSecure Icon on which you can click and proceed with authentication (as you would by going straight to the PulseSecure page)
When you visit this URL you will notice that the domain should redirect to the identity provider login URL that you setup, once you have submitted your username. You should be presented with the page of the Authentication Method which can score enough points to match the points required by the PulseSecure Application definition.
In this login example we are using the email as a username:
After we enter the username we are prompted with another authentication method (in this example we use Turing image):
After we enter our authentication credentials we successfully will see the PulseSecure that we tried to access.