Carrier Single Sign On SSO Add on Microsoft Personal User Guide
- July 4, 2024
- Carrier
Table of Contents
- Single Sign On (SSO) Add-on User’s Guide
- Read User Manual Online (PDF format)
- Download This Manual (PDF format)
Single Sign On (SSO) Add-on User’s Guide
v1.0 for 9.0 systems and later
Catalog No. 11-808-1066-01
Rev. 6/12/2024
Important changes are listed in Document Revision History at the end of this document.
All rights reserved. All trademarks are the property of their respective owners.
The content of this guide is furnished for informational use only and is subject to change without notice. Carrier assumes no responsibility or liability for any errors or inaccuracies that may appear in the informational content contained in this guide.
replace
What is the Single Sign On (SSO) add-on?
The Single Sign On add-on allows you to use an Identity Provider of your choice to access your BAS system. The Identity Provider’s authentication functions in addition to the traditional BAS sign-in. The SSO addon can be configured to use SAML or OIDC.
Requirements
- You are running a v9.0 or later (or Cloud) system with the latest cumulative patch applied
- You have downloaded sso.addon file
- You have purchased and downloaded the SSO license
- Your system is backed up regularly to ensure the add-on’s data is also backed up
- You have adequate disk space available to store the add-on’s data
- After installing the add-on, you must Configure the SSO add-on in SiteBuilder (page 1)
- You have configured the add-on to use SAML (page 2)or OIDC (page 4).
- You have Mapped your Identity Provider email (page 4)
See “Installing an Add-on User Guide” for the following:
- Installing an add-on
- Applying a license
- Running an add-on
- Upgrading an add-on
Configuring the SSO add-on in SiteBuilder
Before you can use the SSO add-on, you must configure your system in SiteBuilder.
1 Download and install the add-on.
2 In SiteBuilder, go to Configure > Preferences.
3 On the Web Server tab, open Authentication Provider and select
ssoauthclient.
4 Click Apply , and then click OK.
5 Log in to your BAS system locally as Administrator to continue setting
up the SSO add-on. You can now configure the add-on to use SAML (page 2)or
OIDC (page 4).
Configuring the SSO add-on for SAML
Follow the steps below to configure the SSO add-on for use with SAML.
1 Verify required Identity Provider Configurations for SAML (page 2).
2 Set up SSOAuthclient Addon (Service Provider) (page 3)
Verify required Identity Provider Configurations for SAML
The identity provider needs to have the following configurations for the user successfully login through SAML via the SSO addon.
-
Single sign-on URL and Single Logout URL of service provider: Example, http or
https:///~index
NOTE If your SAML identity provider only supports HTTPS Single Sign-On and Single Logout URLs, you BAS must be configured to use HTTPS. -
Audience URI (SP Entity ID)/SP Issuer: This unique identifier should also be passed to the SSO Addon configuration.
-
SAML Authentication Response and Assertion from the Identity Provider must be signed with a SHA256 Signature Algorithm.
ο Encryption and Signature Certificate: A X509 public certificate and its private key must be generated and maintained by the administrator to encrypt the SAML assertion and sign logout requests. The public certificate must be uploaded to the Identity Provider’s Encryption Certificate and Signature Certificate fields. The public certificate and private key are required for the add-on’s Service Provider Public Certificate and Service Provider Private Key fields.
ο One method you can use to create the X509 Service Provider Public Certificate and Private key is OpenSSL. The OpenSSL example below generates the X509 certificate and private key. The certificate and key expire in 365 days.
NOTE The expiration days and name of the public certificate can be modified.
openssl req -x509 -nodes -days 365 -new -out <your-public-certificate- name>.crt -
Assertion: The Assertion must be encrypted and the public X.509 certificate (generated by the administrator) must be uploaded to the Identity Provider’s Encryption certificate field.
-
Logout request: If the Identity Provider requires the Logout request to be signed, the same public X.509 certificate used for encryption (generated by the administrator) must be uploaded to the Identity Provider’s Signature Certificate field.
The identity provider should not Verify Request Signatures since the Authentication Request generated by the SSO addon is not signed. -
ACS URL/ Single sign-on URL: The ACS URL/ Single sign-on URL configured on the SAML Identity Provider is used for redirecting the Authentication response/assertion back to Service Provider instead of the ACS URL on the Authentication Request.
-
SAML Assertion NameId: The SAML Assertion NameId should return the email address of the user which is mapped in your BAS. (Identity Providers may do this by default, but it can be changed by the Identity Provider administrators).
Set up SSOAuthclient Addon (Service Provider)
1 Log in to your BAS as Administrator.
2 On the System Options tree, select System Settings.
3 Go to the Add-ons tab. Under Details , click Main Page.
4 Select SAML.
5 Enter the required information described below.
In this field… | Enter this information… |
---|---|
Identity Provider Issuer | Identity Provider Entity ID/ Issuer (provided |
by the Identity Provider)
Identity Provider Single Sign-On URL| Provided by the Identity Provider
Also referred to as “SP-Initiated Redirect Endpoint”
Identity Provider Single Logout URL| Provided by the Identity Provider
Identity Provider X.509 Certificate| Copy and paste the contents of your
identity provider’s X.509 certificate. (provided by the Identity Provider)
Configure the Identity Provider to sign the SAML response and assertion with
SHA256 signature algorithm.
Service Provider Entity ID/ Issuer.| Audience URI (SP Entity ID)
Also referred to as “Audience URI” or “Audience Restriction”
Service Provider Assertion Consumer Service (ACS) URL| http or
https://
Also referred to as “Redirect or login” URL
Service Provider Single Logout URL| http or https://<your BAS
domain>/~index
Also referred to as “Redirect or logout” URL
Service Provider X.509 Public Certificate| Copy and paste the contents
of the X509 public certificate that was generated for the Encryption and
Signature Certificate.
NOTE Authentication requests are not signed by this service provider.
Service Provider Private Key field| The contents of the private key that
was generated.
NOTE Authentication requests are not signed by this service provider.
6 Click Apply.
7 You must now Map your Identity Provider e-mail to an Operator (page 4)
in your BAS.
Configuring the SSO add-on for OIDC
Verify required Identity Provider Configurations for OIDC
The ID token must include the “email” claim, which is usually part of the
standard OIDC claims.
Follow the steps below to configure the SSO add-on for use with OIDC.
1 Log in to your BAS as Administrator.
2 On the System Options tree, select System Settings.
3 Go to the Add-ons tab. Under Details , click Main Page.
4 Select OIDC.
5 Enter the required information described below.
In this field… | Enter this information… |
---|---|
Token URL | Token endpoint from your Identification Provider |
Authorize URL | Authorization endpoint from your Identification Provider |
Logout URL | Logout endpoint from your Identification Provider |
Public Keys URL | JWKS / Public keys enpdoint from your Identification Provider |
Client ID | Client ID from your Identification Provider |
Client Secret (Optional) | Client Secret from your Identification Provider |
Redirect on Login | http or https:// |
Redirect on Logout | http or https:// |
6 Click Apply.
7 You must now Map your Identity Provider e-mail to an Operator (page 4)
in your BAS.
Mapping Identity Provider e-mail to an Operator
1 On the System Options tree, select Operators.
2 Click Add to add a new Operator.
3 Create a new Operator as described in your BAS User Manual, using your
Identity Provided e-mail address in Login Name.
4 Open Sign On Mode and select Single Sign On.
NOTE No password is required for this Operator. Password requirements are
handled by your Identity Provider.
5 Click Accept.
6 You are now ready to log in to your BAS (page 5) using your Identity
Provider.
Logging in to your BAS using SSO
1 From the Log in page of your BAS, click Log in with Single Sign
On.
NOTE Do not enter in your local Login Name or Password. Do not
click Log in.
2 Log in using your Identity Provider login process.
3 When prompted to log in using the SSO Operator name, verify the name is
correct and then click Yes.
NOTE If desired, you can still log in locally using Login Name and Password. The SSO add-on does not interfere with local log on or existing Operator configurations.
Document revision history
Important changes to this document are listed below. Minor changes such as typographical or formatting errors are not listed.
Date | Topic | Change description | **Code*** |
---|---|---|---|
No updates yet |
- For internal use only
All trademarks used herein are the property of their respective owners.
Proprietary and Confidential
Single Sign On (SSO) Add-on User’s Guide © 2024 Carrier. All
rights reserved.
Rev. 6/12/2024
A Carrier Company
Read User Manual Online (PDF format)
Read User Manual Online (PDF format) >>