SafeNet Trusted Access for iProva
SafeNet Trusted Access (STA) allows you to configure the iProva application using the Security Assertion Markup Language (SAML) protocol.
The STA and iProva integration is aimed to protect the iProva end users' access.
The SP-initiated SSO use case can be configured for iProva
Configuring SafeNet Trusted Access for iProva is a three-step process:
2.SafeNet Trusted Access setup
NOTE This application integration online help was produced based on a review of publicly available documentation and was not tested by Thales. Support for the application integration is provided on a best-effort basis.
As a prerequisite, from the STA console, copy the STA metadata URL by clicking the Copy to Clipboard icon available next to the Download metadata file button. You will need the metadata URL while configuring STA in iProva.
NOTE If the STA certificate is required separately, first you need to click on the Manual Configuration link and then click Download X.509 certificate to download the certificate.
For more information, refer to the Configure the SAML service provider section of the STA online documentation.
Perform the appropriate steps to configure SafeNet Trusted Access as your Identity Provider in iProva.
For more information on configuring STA in iProva, contact the iProva support team.
After configuring SafeNet Trusted Access in the iProva application, the next step is to activate the iProva application in SafeNet Trusted Access by performing the following steps:
1.In the Applications pane, you will notice that the iProva application that you added previously is currently in inactive state by default. To configure and activate the application, click on the iProva application and proceed to the next step.
2.Under Account Details, enter the field values.
NOTE Contact the iProva support team for the field values.
For more information on configuring the SAML service provider, refer to the Configure the SAML service provider section of the STA online documentation.
NOTE Under Return Attributes, add return attribute(s) as required by the iProva application.
3.Under User Portal Settings, perform the following steps:
a.In the FEDERATION MODE field, select a federation type as per your preferred configuration.
b.In the SERVICE LOGIN URL field, enter the application login URL only if you have selected FEDERATION MODE as SP Initiated, else leave this field blank.
4.Under Advanced Settings, perform the following steps:
a.In the IDP INITIATED SSO RELAY STATE field, enter the relay state value if your application requires a unique relay state.
b.In the LOGOUT CHANNEL field, select an option that is compatible with your application.
For rest of the fields, modify the default values as per your preferred configuration.
5.Click Save Configuration to save the details and activate the iProva application in SafeNet Trusted Access.
Navigate to the iProva URL, enter your email address, and click Sign In. You will be redirected to the SafeNet Trusted Access sign-in page. Enter your primary directory login information, approve the two-factor authentication, and you should be redirected to the iProva application after authentication.
Navigate to the User Portal URL to log in to the STA User Portal dashboard. On the dashboard, you will see a list of applications to which you have access. Click on the iProva icon, you should be redirected to the iProva application after authentication.
© 2021 SafeNet Trusted Access. Various trademarks are held by their respective owners.