Happy New Year & Sangfor SASE IDaaS SAML Certification Configuration Steps
  

David Hong Lv1Posted 2025-Jan-02 14:44

Happy New Year, everyone!
As we step into this new year, I wish you all a year filled with success, joy, and new opportunities. May this year bring you closer to your goals and aspirations. Let's embrace the challenges ahead with enthusiasm and make the most of the exciting possibilities that await us.
Thank you for being a part of our Sangfor Access Secure (SASE), and let's make this year our best one yet!

Sangfor SASE IDaaS SAML Certification Configuration Steps
1. Foreword
SAML (Security Assertion Markup Language) is an open standard for single sign-on (SSO) that allows users to securely exchange authentication and authorization data between multiple applications or services. The SASE IDaaS authentication platform supports SAML authentication of Google and AzureAD to implement client authentication and login.


2. Google SAML Config Steps
2.1 Login Google Portal
[url=https://admin.google.com/ normalLink \tdkey a3zcif \tdfe -10 \tdfn https%3A//admin.google.com/ \tdfu https://admin.google.com/ \tdlt card \tdsub normalLink \tdindr 0 \tdly container]https://admin.google.com/[/url]
2.2 Create a SAML App
Path: Apps>Web and mobile apps>Add app>Add custom SAML app
Copy these parameters
2.3 Login IDaaS Portal,create SAML Identity Providers
Path: Authentication>Identity Providers>SAML>Add
2.4 Input IDaaS parameters from Google SAML phase two
2.5 Input Google SAML parameters phase three from IDaaS SAML parameters, and check signed response
2.6 Keep other default parameters, save and next
2.7 IDaaS Application check SAML
2.8 SASE Authentication policies check SAML
2.9 Effect verification
Login SASE agent

3、Microsoft AzureAD SAML Config Steps
3.1 Login AzureAD Portal
[url=https://azure.microsoft.com/zh-cn/free/search/?ef_id=_k_EAIaIQobChMIqsvRqYzcggMVJGsPAh3EoA5sEAAYAiAAEgK2-vD_BwE_k_&OCID=AIDcmmiqezz3h5_SEM__k_EAIaIQobChMIqsvRqYzcggMVJGsPAh3EoA5sEAAYAiAAEgK2-vD_BwE_k_&gad_source=1&gclid=EAIaIQobChMIqsvRqYzcggMVJGsPAh3EoA5sEAAYAiAAEgK2-vD_BwE normalLink \tdkey 7xb1r4 \tdfe -10 \tdfn https%3A//azure.microsoft.com/zh-cn/free/search/%3Fef_id%3D_k_EAIaIQobChMIqsvRqYzcggMVJGsPAh3EoA5sEAAYAiAAEgK2-vD_BwE_k_%26OCID%3DAIDcmmiqezz3h5_SEM__k_EAIaIQobChMIqsvRqYzcggMVJGsPAh3EoA5sEAAYAiAAEgK2-vD_BwE_k_%26gad_source%3D1%26gclid%3DEAIaIQobChMIqsvRqYzcggMVJGsPAh3EoA5sEAAYAiAAEgK2-vD_BwE \tdfu https://azure.microsoft.com/zh-c ... EAAYAiAAEgK2-vD_BwE \tdlt card \tdsub normalLink \tdindr 0 \tdly container]https://azure.microsoft.com/zh-cn/free/search/?ef_id=_k_EAIaIQobChMIqsvRqYzcggMVJGsPAh3EoA5sEAAYAiAAEgK2-vD_BwE_k_&OCID=AIDcmmiqezz3h5_SEM__k_EAIaIQobChMIqsvRqYzcggMVJGsPAh3EoA5sEAAYAiAAEgK2-vD_BwE_k_&gad_source=1&gclid=EAIaIQobChMIqsvRqYzcggMVJGsPAh3EoA5sEAAYAiAAEgK2-vD_BwE[/url]
3.2 Enter enterprise application
Create a new application
Create a custom application
3.3 Select SAML on sign-on
3.4 Login IDaaS Portal,create SAML Identity Providers
Path: Authentication>Identity Providers>SAML>Add
3.5 Steps1: enter edit and input entity ID and ACS URL to AzureAD steps 1
3.6 Steps3: download base64 Certificate and open it via notepad, copy cert to IDaaS Signature Certificate
3.7 Steps4: copy login URL and EntraID to IDaaS SSOURL and EntraID
//Notice: remember authorize apps to user
3.8 IDaaS Application check SAML
3.9 SASE Authentication policies check SAML
3.10 Effect verification
Login SASE agent

Like this topic? Like it or reward the author.

Creating a topic earns you 5 coins. A featured or excellent topic earns you more coins. What is Coin?

Enter your mobile phone number and company name for better service. Go

Prosi Lv3Posted 2025-Jan-06 13:01
  
Thank you for the information

Moderator on This Board

7
2
0

Started Topics

Followers

Follow

Trending Topics

Board Leaders