Federate with a SAML identity provider
Federate with your SAML 2.0 IdP provider to enable single sign-on (SSO) for BlueXP. This allows users to log in using their corporate credentials.
Organization admin. Learn more about access roles.
|
You can federate with your corporate IdP or with the NetApp Support Site. You can't federate with both. |
NetApp supports service provider-initiated (SP-initiated) SSO only. You need to first configure the identity provider to trust NetApp as a service provider. Then, you can create a connection in BlueXP that uses the identity provider's configuration.
You can set up a federated connection with your SAML 2.0 provider to enable single sign-on (SSO) for BlueXP. The process involves configuring your provider to trust NetApp as a service provider and then creating the connection in BlueXP.
-
An IdP account with administrative privileges is required. Coordinate with your IdP administrator to complete the steps.
-
Identify the domain you want to use for federation. You can use your email domain or a different domain that you own. If you want to use a domain other than your email domain, you must first verify the domain in BlueXP. You can do this by following the steps in the Verify your domain in BlueXP topic.
-
In the upper right of the BlueXP console, select
> Identity & Access Management.
-
Select the Federation tab.
-
Select Configure new federation.
-
Enter your domain details:
-
Choose whether you want to use a verified domain or your email domain. The email domain is the domain associated with the account you are logged in with.
-
Enter the name of the federation you are configuring.
-
If you choose a verified domain, select the domain from the list.
-
-
Select Next.
-
For your connection method, choose Protocol and then select SAML Identity Provider.
-
Select Next.
-
Configure your SAML identity provider to trust NetApp as a service provider. You need to do this step on your SAML provider server.
-
Ensure that your IdP has the attribute
email
set to the user's email address. This is required for BlueXP to identify users correctly:<saml:AttributeStatement xmlns:x500="urn:oasis:names:tc:SAML:2.0:profiles:attribute:X500" xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"> <saml:Attribute Name="email" NameFormat="urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName"> <saml:AttributeValue xsi:type="xs:string">email@domain.com</saml:AttributeValue> </saml:Attribute> </saml:AttributeStatement>
-
Use the following values when registering your SAML application with BlueXP:
-
For the Reply URL or Assertion Consumer Service (ACS) URL, use
https://netapp-cloud-account.auth0.com/login/callback
-
For the Logout URL, use
https://netapp-cloud-account.auth0.com/logout
-
For Audience/Entity ID, use
urn:auth0:netapp-cloud-account:<fed-domain-name-saml>
where <fed-domain-name-saml> is the domain name you want to use for federation. For example, if your domain isexample.com
, the Audience/Entity ID would beurn:auth0:netapp-cloud-account:fed-example-com-samlp
.
-
-
After creating the trust, copy the following values from your SAML provider server:
-
Sign In URL
-
Sign Out URL (optional)
-
-
Download the X.509 certificate from your SAML provider server. It needs to be in PEM, CER, or CRT format.
-
-
Return to BlueXP, and select Next to create the connection.
-
Create the connection with SAML.
-
Enter the Sign In URL of your SAML server.
-
Upload the X.509 certificate that you downloaded from your SAML provider server.
-
Optionally, enter the Sign Out URL of your SAML server.
-
-
Select Create connection. The system creates the connection in a few seconds.
-
Select Next.
-
Select Test connection to test your connection. You are directed to a login page for your IdP server. Log in with your IdP credentials to complete the test and return to BlueXP to enable the connection.
-
Select Next.
-
On the Enable federation page, review the federation details and then select Enable federation.
-
Select Finish to complete the process.
After you enable the federation, users can log in to BlueXP using their corporate credentials.