Installing Redistributable STS
Redistributable STS (RSTS) is a third-party authentication component that you can use as an alternative to the default IIS Windows authentication, when logging in to the Active Roles Web Interface.
To install the RSTS application, follow the steps.
Prerequisites
-
In Windows, open Local Security Policy and navigate to Security Settings > Local Policies > User Rights Assignment to add the domain user(s) to the Act as part of the operating system policy.
-
Make sure that the User Logon Name and the UPN Suffix is set for the domain user(s). Example: administrator@ars1.net.
Installing Redistributable STS (RSTS)
- Open the Command Prompt with Administrator privileges.
- Change the directory to the location of the Redistributable STS (RSTS). By default, RSTS is available in C:\Program Files\One Identity\Active Roles\<version>\Web\RSTS.
- Type RSTS /install to install the RSTS application.
Configuring Redistributable STS in RStsApiAdmin
To configure Redistributable STS (RSTS) in the RStsApiAdmin application, follow the steps.
To configure Redistributable STS (RSTS) in RSts Api Admin
- In C:\Program Files\One Identity\Active Roles\<version>\Web\RSTS, Open the RStsApiAdmin application.
- In Connection Settings, enter localhost in the Server field and click Login.
-
In the Directory Service Providers pane, open the Provider Specific Options tab to configure Active Roles.
-
Domain: The name of the domain.
-
Username: The sAMAccountName of an Active Directory service account with read permissions.
-
Password: The password of the domain user.
- In the Claim Definitions tab, right-click and select New to open the Add Claim Definition window.
- Select the RSts.Sts.Attribute.Claim.Definition claim definition type and click OK.
-
In the Settings tab, configure the settings of the new attribute claim for User Principal Name (UPN).
- Click Save.
Configuring Redistributable STS in Configuration Center
To configure the Redistributable STS (RSTS) authentication method in the Active Roles Configuration Center, follow the steps.
To configure Redistributable STS (RSTS) in Configuration Center
-
In the Configuration Center, navigate to Web Interface > Authentication.
-
In the Site authentication settings window, select the Federated tab.
-
In Identity provider configuration, configure the settings of the identity provider.
-
From the Identity provider drop-down, select RSTS.
-
Federated metadata URL: http://localhost/rsts/wsfedmetadata
-
Click Test metadata to validate the metadata.
-
Realm: The URL of the Web Interface: https://<Web Server Name>/arwebadmin/
-
Reply URL: The URL of the Web Interface: https://<Web Server Name>/arwebadmin/
NOTE: To check the URL of the Web Interface, navigate to Web Interface > Sites and click Open in Browser.
-
In Claim editor, click Add to open the Add claim window.
-
Make sure that the Claim type is UPN.
-
Set the following Claim value: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/userprincipalname
-
Set the following Display name: IUser.UPN
-
Click Save.
-
Enter the Domain user login credentials.
-
Username: The name of the domain and the user in domain\user format, for example: ars1\Administrator
-
Password: The password of the domain user.
-
Click Modify.
-
In the list of services, check if the RedistributableSecureTokenServer service is running.
As a result of modifying the authentication settings in the Configuration Center, you can log in with the domain user to the Active Roles Web Interface using RSTS authentication.
Examples of configuring identity providers
Refer to the following examples of configuring the identity providers when using Federated Authentication.
Azure
- Metadata url: https://login.microsoftonline.com/<AzureTenantID>/FederationMetadata/2007-06/FederationMetadata.xml
- realm: spn:<Azure Application ID>
- replyurl: https://<Web Server Name>/arwebadmin/
Active Directory Federation Services (AD FS)
- Metadata url: https://<ADFS Server name>/FederationMetadata/2007-06/FederationMetadata.xml
- realm: https://<Web Server Name>/arwebadmin/
- replyurl: https://<Web Server Name>/arwebadmin/