Objective
This article describes how to configure SAML SSO authentication between NetScaler Gateway and load balancing virtual server.
Click on the link to review part 1 of the article?? CTX138988 - How to Configure SAML SSO Authentication between NetScaler Gateway and Load Balancing Virtual Servers?? - Part 1
Click on the link to review part 1 of the article?? CTX138988 - How to Configure SAML SSO Authentication between NetScaler Gateway and Load Balancing Virtual Servers?? - Part 1
Instructions
To configure SAML SSO authentication between NetScaler Gateway and load balancing virtual server, complete the following procedure:
Creating AAA Virtual Server and Binding the SAML Policy
- In the?? Configuration?? tab, navigate?? Security?? >?? AAA - Application Traffic?? >?? Virtual Servers?? and click?? Add
- In the?? Create RSA Key?? field, specify the options:
- Name, example:?? av_saml
- IP Address Type, validate IP Address is specified.
- IP Address, example:?? 192.168.10.102
- Port, example:?? 8443
- Click?? OK
The Command-line Interface equivalent to the Graphical User Interface.
add authentication vserver?? av_saml SSL 192.168.10.102 8443
?? add authentication vserver?? av_saml SSL 192.168.10.102 8443
- In the?? Configuration?? tab, navigate?? NetScaler Gateway?? >?? Policies?? >?? Authentication?? >?? SAML?? and click on the?? Servers?? tab
- Click?? Add
- In the?? Configuration Authentication SAML Server, specify the options:
- Name, example:?? samlssoact1
- IDP Certificate Name, example:?? NCCP
- Redirect URL, example:?? https://auth1.training.lab
- Click?? OK
The Command-line Interface equivalent to the Graphical User Interface.
add authentication samlAction?? samlssoact1?? -samlIdPCertName?? NCCP?? -samlRedirectUrl?? https://auth1.training.lab
add authentication samlAction?? samlssoact1?? -samlIdPCertName?? NCCP?? -samlRedirectUrl?? https://auth1.training.lab
- In the?? Configuration?? tab, navigate?? NetScaler Gateway?? >?? Policies?? >?? Authentication?? >?? SAML?? and click on the?? Policies?? tab
- Click?? Add
- In the Configuration Authentication SAML Policy, specify the options:
- Name, example:?? samlssoact1
- Server, example:?? samlssoact1
- Expression, example:?? ns_true
- Click?? OK
The Command-line Interface equivalent to the Graphical User Interface.
add authentication samlPolicy?? samlssoact1 ns_true samlssoact1
add authentication samlPolicy?? samlssoact1 ns_true samlssoact1
- In the?? Configuration?? tab, navigate?? Security?? >?? AAA?? -?? Application Traffic?? >?? Virtual Servers?? and highlight the Authentication Virtual Server, example:?? av_saml
- Click?? Edit
- Click the symbol + in the?? Basic Authentication Policies
- In the?? Policy?? section and the?? Choose Policy?? field, select?? SAML
- Click?? Continue
- Click?? Add Binding
- Specify?? samlssoact1?? and click?? Select
- Click?? OK?? and?? Close
- Click?? Done
The Command-line Interface equivalent to the Graphical User Interface.
bind authentication vserver?? av_saml?? -policy?? samlssoact1
bind authentication vserver?? av_saml?? -policy?? samlssoact1
Creating a Load Balancing Virtual Server to the Application Server
Creating a Load Balancing Virtual Server to the Application Server
- In the?? Configuration?? tab, navigate?? Traffic Management?? >?? Load Balancing?? >?? Virtual Servers?? and click?? Add
- In the?? Load Balancing Virtual Server?? field, specify the options:
- Name, example:?? lb1_ssl
- Protocol, example:?? SSL
- IP Address Type, example:?? IP Address
- IP Address, example:?? 192.168.10.103
- Port, example:?? 443
- Click?? OK
- Click?? Continue
- Click?? Continue
- Click?? Persistence?? option.
- Validate?? NONE?? is selected
- Click?? OK
- Click?? Traffic Setting?? option.
- Validate Client Idle Time-out?? is set to?? 180
- Click?? OK
- Click?? Authentication?? option.
- Validate Form Based Authentication?? is selected.
- Authentication FQDN, example:?? auth1.example.com
- Choose Authentication Virtual Server Type, example:?? Authentication Virtual Server
- Authentication Virtual Server,?? example:?? av_saml
- Click OK
- Click Done.
The Command-line Interface equivalent to the Graphical User Interface.
add lb vserver?? lb1_ssl?? SSL?? 192.168.10.103?? 443 -persistenceType?? NONE?? -cltTimeout?? 180?? -AuthenticationHost?? auth1.example.com?? -Authentication?? ON?? -authnVsName?? av_saml
add lb vserver?? lb1_ssl?? SSL?? 192.168.10.103?? 443 -persistenceType?? NONE?? -cltTimeout?? 180?? -AuthenticationHost?? auth1.example.com?? -Authentication?? ON?? -authnVsName?? av_saml
??
- In the?? Configuration?? tab, navigate?? Security?? >?? AAA – Application Traffic?? >?? Policies?? >?? Traffic?? and click on the?? Form SSO Policies?? tab.??
- Click Add
- In the?? Configuration Form SSO Profile?? field, specify the options:
- Name, example:?? html_formaction
- Action URL, example:?? /MYPHP/auth.php
- User Name Field,?? example:?? username
- Password?? Field, example:?? password
- Expression, example:?? HTTP.RES.STATUS.EQ(200)
- SubmitMethod, example:?? POST
- Click?? OK
The Command-line Interface equivalent to the Graphical User Interface.
add tm formSSOAction html_formaction1 -actionURL "/MYPHP/auth.php" -userField username -passwdField password -ssoSuccessRule "HTTP.RES.STATUS.EQ(200)" -submitMethod POST
add tm formSSOAction html_formaction1 -actionURL "/MYPHP/auth.php" -userField username -passwdField password -ssoSuccessRule "HTTP.RES.STATUS.EQ(200)" -submitMethod POST
??
- In the?? Configuration?? tab, navigate?? Security?? >?? AAA – Application Traffic?? >?? Policies?? >?? Traffic?? and click on the?? Traffic Profiles?? tab.??
- Click?? Add
- In the?? Create Traffic Profile?? field, specify the options
- Name, example:?? html_prof??
- AppTimeout: example:?? 180
- Single Sign-on,?? example:?? ON
- Form SSO Profile, example:?? html_formaction
- Click?? Create
The Command-line Interface equivalent to the Graphical User Interface.
add tm trafficAction html_prof -SSO ON -formSSOAction html_formaction
Note: AppTimeout is not required configuration when running the Command-Line Interface. ??
add tm trafficAction html_prof -SSO ON -formSSOAction html_formaction
Note: AppTimeout is not required configuration when running the Command-Line Interface. ??
??
- In the?? Configuration?? tab, navigate?? Security?? >?? AAA – Application Traffic?? >?? Policies?? >?? Traffic?? and click on the?? Traffic Policy?? tab.??
- Click?? Add
- In the Create Traffic Policy?? field, specify the options
- Name, example:?? html_pol
- Profile, validate the profile is select in the previous step, example:?? html_prof
- Expression, example:?? HTTP.REQ.URL.CONTAINS("abc.html")
- Click?? Create
The Command-line Interface equivalent to the Graphical User Interface.
add tm trafficPolicy?? html_pol?? "HTTP.REQ.URL.CONTAINS(\"abc.html\")" html_prof
add tm trafficPolicy?? html_pol?? "HTTP.REQ.URL.CONTAINS(\"abc.html\")" html_prof
- In the?? Configuration?? tab, navigate?? Traffic Management?? >?? Load Balancing?? >?? Virtual Servers?? and Highlight the Virtual Servers, example:?? lb1_ssl.??
- Click?? Edit
- Click?? Policies
- Click on the symbol?? +?? in the?? Policy?? field.
- In the?? Policies?? field, specify the options
- Choose?? Policy, example:?? Traffic
- Choose?? Type, example:?? Request
- Click?? Continue.
- In the?? Policy Binding?? field, specify the options
- Binding, example:?? html.pol
- Click?? Select
- Priority, example:?? 100
- Click?? Bind
The Command-line Interface equivalent to the Graphical User Interface.
bind lb vserver?? lb1_ssl?? -policyName?? html_pol?? -priority?? 100?? -gotoPriorityExpression?? END?? -type?? REQUEST
bind lb vserver?? lb1_ssl?? -policyName?? html_pol?? -priority?? 100?? -gotoPriorityExpression?? END?? -type?? REQUEST
??
Publishing a Web Application at the XenApp Site.
??
When you configure a published application at the XenApp site, ensure that the Content Address is specified correctly. For example, in this article the web application is /myphp/abc.html and it is configured as https://nsslvpn.example.com/cvpn/https/nssp.example.com/myphp/abc.html.
The following are sample screen shots for publishing a web application:
When you configure a published application at the XenApp site, ensure that the Content Address is specified correctly. For example, in this article the web application is /myphp/abc.html and it is configured as https://nsslvpn.example.com/cvpn/https/nssp.example.com/myphp/abc.html.
The following are sample screen shots for publishing a web application:
?? 



??
After you configure the NetScaler appliance and the XenApp site, the user can logon to the VPN virtual server and open the published application. Form SAML SSO will trigger SAMLSSO to the load balancing virtual server and applies SSO to the application server.
??
After you configure the NetScaler appliance and the XenApp site, the user can logon to the VPN virtual server and open the published application. Form SAML SSO will trigger SAMLSSO to the load balancing virtual server and applies SSO to the application server.
Additional Resources
To configure SAML SSO authentication between NetScaler Gateway and load balancing virtual server, complete the following procedure: