Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

11. If configured correctly all the tests should pass, as below.


Create a SAML 2.0 Service Provider Configuration for Citrix Workspace.


1. In the main menu, select Identity > Identity Attributes

Image Added


2. Select the Identity Source that the domain you wish to use for authentication is bound to

Image Added


3. Click on Create on the top right.

Image Added

4. Create a new identity attribute called objectSid matching the settings as per screen shot below. Make sure the data type is set to Binary:

Image Added


5. Click Save. You will now see the objectSid attribute listed under Identity Attributes

Image Added


6. Log into Citrix Cloud

7. Click on the menu icon on the top left.

Image Added

8. Select Identity and Access Management from the drop-down menu, that appears:

Image Added


9. Click on the Ellipsis (…) next to SAML and click Connect from the drop -down option.


Image Added


10. On the Configure Saml page click Image Added next to SAML Metadata

Image Added


11. On the DualShield Administration Console, select SSO > Service Providers.

Image Added


12. Click Create

Image Added


13. In the SSO Server field, select your DualShield SSO server from the list

14. In the Name field, enter the name for the Service Provider to be created

15. In the Type field, select SAML 2.0 

Image Added

  1. Click on Image Added
  2. Open the SAML metadata file you downloaded from the Citrix Cloud, in a text editor..


Image Added

  1. Select all and copy and past into the Service Provider Metadata box on DualShield.

Image Added

  1. Click Save
  2. Enable Sign on SAML Assertion under SAML Options

Image Added

  1. Click on Attributes tab at the top Image Added

We are now going to add the following attribute names which are required by the Service Provider.
cip_email
cip_upn
cip_oid
cip_sid
With the exception of cip_sid the above attributes will be mapped to their counterpart DualShield Identity Attributes which in turn are mapped to the Active Directory account attributes.
For example:

Citrix SAML Attribute

DualShield Identity Attribute

AD Account Attribute

cip_email

email

mail

cip_upn

userPrincipalName

userPricipalName

cip_oid

uuid

ObjectGUID

In steps 1-5 you created a new Identity Attribute called objectSID. This will be specified in a script which will be applied to the cip_sid Citrix Attribute

  1. Click Create

Image Added

  1. On the Attributes builder specify Location as HTTP Body and enter cip_upn as the name for this attribute.

Image Added

  1. Click on the search symbol to the right of the Maps To field.

Image Added

  1. Select the identity source that will be used and select User Principal Name from the Maps to drop down list:

Image Added

  1. Click Save
  2. Click Save again
  3. Repeat steps 21 - 23 but this time name the attribute cip_oid

Image Added

  1. Repeat steps 24 & 25 but this time map to Unique Identifier

Image Added

  1. Click Save
  2. Click Save again
  3. Repeat the process above, one more time. Name the attribute cip_email and map to email.

Image Added

  1. For cip_sid, create a new attribute and name it cip_sid

Image Added

  1. Under the Value group box, select Script

Image Added


  1. Copy and paste the following script into the text box.


Wiki Markup
if (!objectSid) return null;
\\
byte\[\] sid = objectSid.decodeHex();
\\
if (sid.length<8 || sid.length % 4 != 0) return "";
\\
StringBuilder sb = new StringBuilder();
sb.append("S-").append(sid\[0\]);
int c = sid\[1\]; // Init with Subauthority Count.
\\
// Default order is BIG_ENDIAN
java.nio.ByteBuffer bb = java.nio.ByteBuffer.wrap(sid);
sb.append("-").append((long)bb.getLong() & 0XFFFFFFFFFFFFL);
bb.order(java.nio.ByteOrder.LITTLE_ENDIAN); // Now switch.
\\
for (int i=0; i<c; i++) \{ // Create Subauthorities.
    sb.append("-").append((long)bb.getInt() & 0xFFFFFFFFL);
\}        
return sb.toString();


  1. Click Save. The Service Provider Attributes window should now look like this..

Image Added

  1. Click on General Settings at the top

Image Added

  1. Set the default attribute to cip_upn (You can click anywhere in this field to change it.)

Image Added

  1. Click Save at the bottom.