Chat now with support
Chat with Support

Cloud Access Manager 8.1.1 - How To Configure as an Identity Provider

Dell™ One Identity Cloud Access Manager 8.1.1 - How to Configure as an Identity Provider

Prerequisites

Configuration

Configuring the SAML application on idp-cam.partner.local
describes how to configure the Identity Provider (IDP) Cloud Access Manager instance (on idp-cam.partner.local) with a SAML application to define the service provider (SP) Cloud Access Manager instance (on sp-cam.demo.local).
Setting up the front-end Authenticator in sp-cam.demo.local
describes how to configure the SP Cloud Access Manager instance (on sp-cam.demo.local) with a front-end authenticator (FEA) definition for the IDP Cloud Access Manager instance (on idp-cam.partner.local).
Testing your configuration
describes how to test a federated logon to the SP Cloud Access Manager instance authenticating against the IDP Cloud Access Manager instance.

Configuring the SAML application on idp-cam.partner.local

2
From the main menu in the Applications section click + Add New.
3
In the Create an Application Using a Template section select the Dell One Identity Cloud Access Manager template.
4
On the Settings for Cloud Access Manager enter sp-cam.demo.local as the Cloud Access Manager hostname and then click Save & Next.
5
On the Subject Mapping page click Derive the username from an attribute.
6
In the Take the username from the following attribute field enter sAMAccountName.
7
Click Next.
8
The Permissions page is displayed. Here you can grant or deny access to the application based on role membership. Select Allow Role Access to specify which roles will have access to Cloud Access Manager.
10
Click Next.
12
The Federation Settings page provides you with information that you may need to configure your Service Provider. In this example, we will generate metadata to set up our Service Provider. Click Download Metadata and transfer the downloaded file to your sp-cam.demo.local machine.
2
From the main menu, in the Applications section, click + Add New.
3
The Create New Application page is displayed. Click Configure Manually.
4
The Back-end SSO Method page is displayed. Select SAML and then click Next.
5
On the Federation Settings screen, enter the Recipient and the Audience / SP Identity as follows:
6
On the Subject Mapping page, click Derive the username from an attribute.
7
In the Take the username from the following attribute field, enter sAMAccountName.
8
Click Next.
9
Click Next to advance to the External Access page. This asks you whether the application should be proxied for situations where external users are required to access applications on your internal network. When Cloud Access Manager is operating as an IDP, the application (SP) does not run on your internal network and therefore this is not required. Select Do not proxy this application.
10
Click Next.
11
The Permissions page is displayed. Here you can grant or deny access to the application based on role membership. Select Allow Role Access to specify which roles will have access to Cloud Access Manager.
13
Click Next.
15
The Federation Settings page provides you with information you may need to configure your Service Provider. In this example, we will generate metadata to set up our Service Provider. Click Download Metadata and transfer the downloaded file to your sp-cam.demo.local machine.
2
From the main menu, in the Applications section, click View and Edit.
4
Select the Claim Mapping section.
5
Select the Send Cloud Access Manager role claim checkbox.
6
Click Finish.
Self Service Tools
Knowledge Base
Notifications & Alerts
Product Support
Software Downloads
Technical Documentation
User Forums
Video Tutorials
RSS Feed
Contact Us
Licensing Assistance
Technical Support
View All
Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating