Chat now with support
Chat with Support

NOTICE! We are upgrading our support telephone services, implementing Genesys, starting the week of May 26, 2025

Cloud Access Manager 8.1.2 - Configuration Guide

Configuring a front-end authentication method Adding a web application Configuring step-up authentication Managing your SSL certificate Changing the Cloud Access Manager service account password Reporting Customizing Dell™ One Identity Cloud Access Manager

Configuring advanced WS-Federation token settings

In most situations the WS-Federation token produced by Dell™ One Identity Cloud Access Manager, in response to an authentication request is accepted by the service provider. However, if a service provider has special requirements for the way the token is configured, then you can modify the token options on the WS-Fed Token Settings tab for the application.

Any settings changed on this page will only affect the selected application.

2
Click Show Advanced Settings.
3
Click Advanced Application Settings.

For a description of the available configuration options, please refer to Table 6.

 

wsfedtoken.minutes_before

The number of minutes before the token IssueInstant to set the NotBefore attribute in the Conditions element.

0 minutes

wsfedtoken.minutes_after

The number of minutes after the token IssueInstant to set the NotOnOrAfter attribute in the Conditions element.

30 minutes

wsfedtoken.name_id

The value of the Format attribute of the NameIdentifier element in the Subject.

urn:oasis:names:tc:SAML:1.1:nameidformat:unspecified

wsfedtoken.logout_request_binding

If HttpRedirect is selected then logout requests will be sent to the application. If Disabled is selected then logout requests will not be sent.

HttpRedirect

OpenID Connect/OAuth 2.0

For information on how to use Dell™ One Identity Cloud Access Manager as an OAuth v2.0 or OpenID Authorization Server, please refer to the document entitled Dell™ One Identity Cloud Access Manager How To Develop OpenID Connect Apps.

Manual user provisioning

If the application you are configuring does not provide a user provisioning API, you can use Dell™ One Identity Cloud Access Manager as an intermediary between the user and the manual process of creating a user account for the application.

Manual user provisioning enables users to request a user account for an application from their application catalog. Cloud Access Manager then sends an email to the owner of the application advising them that the user requires an account.

The application owner manually creates the user account within the target application. When the user account has been created, the application owner returns to the email received from Cloud Access Manager and clicks the confirmation link contained in the email to confirm that they have created the user account.

Alternatively, a Cloud Access Manager administrator can view any outstanding manual provisioning requests. To do this, go to Cloud Access Manager Application Portal | Users |Manual Provisioning Requests and confirm that the requests have been dealt with.

When the user account request is confirmed as complete, the application is displayed on the user’s application portal home page within Cloud Access Manager.

HTTP basic authentication

1
Log in to the Administration Console using the desktop shortcut Cloud Access Manager Application Portal and select Add New from the Applications section on the home page.
2
Click Configure Manually.
3
Select HTTP Basic Authentication and click Next.
The new FQDN should be within the wildcard DNS subdomain created during the installation, which will resolve to the public IP address used by the proxy. For example, if you created the wildcard Domain Name Service (DNS) subdomain *.webapps.democorp.com during the installation you could use the FQDN owa.webapps.democorp.com to proxy Microsoft® Outlook® Web App. If you did not create a wildcard DNS subdomain for Cloud Access Manager during the installation you will need to manually add this new FQDN into your public DNS. The new FQDN should be covered by the wildcard SSL certificate you are using.
6
You will now see the Permissions page, which enables you to control the users who can access the application. By default all Cloud Access Manager users have access to the application. You can restrict access to the application to users who belong to a specific role, but for this example, simply click Next to allow all users to access the application.
8
If the application requires users to log in using their primary credentials, for example their domain account, select Use primary credentials to log into this application and click Next. If the application requires users to use a different username or password, leave the option clear and click Next.
NOTE: Take care to ensure that the URL entered is unaltered, even down to subtle changes such as character case, in the example Active Roles Server the URL must be ARServerAdmin. The Add application to application portal home and Allow user to remove application from application portal options allow you to specify whether the application should appear automatically on each user’s portal page, and how the user can manage the application from the application portal. The options are shown in Table 7.

application is added to the portal and it cannot be removed by the user through the application catalog.

application is added to the portal and it can be removed by the user through the application catalog.

application is not automatically added to the portal. The user can add or remove the application to/from the portal through the application catalog.

To access the application catalog from the application portal, the user simply needs to click their username, then select Application Catalog. Depending on the settings in the Add application to application portal home and Allow user to remove application from application portal home options, the user can add or remove applications to/from the application portal.
Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating