PlanningSpace tenant IdP configuration

PAGE CONTENTS

This topic shows the settings required for the 'Identity Provider' setting for a PlanningSpace tenant, in the 'Tenants' screen of IPS Manager. Typical settings are shown for the different types of IdP.

Each tenant has an independent setting for the Identity Provider (IdP). Click the 'Configure' button to open the dialog named 'Configure SAML2'.

You will need a token (SAML) signing certificate obtained from the IdP server or service.

Import or Export metadata

Only for version 16.4 Update 1 and later: The import/export functions are not available in the initial release of 16.4 (version 16.4.0).

These functions can be accessed using the buttons in the tenant configuration dialog (see screenshot below), and simplify the IdP setup process by replacing manual typing. Use 'Export metadata' to get the service provider data (as an XML file) which needs to be loaded into your IdP server or service. Use 'Import metadata' to upload to the IPS Server the IdP settings provided as an XML file by your IdP server or service.

Configuration of PlanningSpace 'SAML2' user accounts

Every PlanningSpace user that is based on a Windows AD user account needs to have a tenant user account of type 'SAML2'.

Important: If you are upgrading a PlanningSpace deployment from version 16.3 to 16.4, every 'Windows' user account in the tenant database will be automatically converted to a 16.4 'Windows Active Directory' user account. For use with IdP-based authentication, each account requires to be edited to have user type 'SAML2' and the username must be converted to a UPN-format username (i.e. in the form first.lastname@domain.mycompany.com). 

Also, it is possible to do bulk import of new Windows user account information into a PlanningSpace tenant, using the 'Import from CSV' function. For more information see Tenant users and administrators.

Configuration for an ADFS IdP

The table shows the standard settings for ADFS.

Setting Description
Provider name An arbitrary friendly name for the IdP, e.g. 'ADFS'
Provider URL https://ADFS.domain/adfs/services/trust
ACS binding 'POST' (default setting)
Single sign on URL https://ADFS.domain/adfs/ls/
Single sign on binding 'Redirect' (default setting)
Single logout URL https://ADFS.domain/adfs/ls/?wa=wsignout1.0
Single logout binding 'Redirect' (default setting)
Username claim Choose 'UPN' from the dropdown menu
Clock skew Number of minutes time difference allowed between the IdP and IPS machine clocks ( default 3 minutes, range 1 to 60 minutes)
Reject unsigned assertion Enabled (default setting)
Certificate Upload the token signing certificate exported from the ADFS IdP server, in Base 64-Encoded X.509 format
Export metadata - Service Provider Exports an XML file containing the SAML Service Provider metadata which is needed to configure the 'relying party trust' in the IdP server
Import metadata - Identity Provider Imports an XML file that contains the Identity Provider metadata for the SAML configuration

The following screenshot shows an example of a completed configuration in IPS Manager:

Screenshot-PalantirIPS-Tenant-Configure-SAML2-IdentityProvider-dialog

Configuration for an Azure AD IdP

The table shows the standard settings for Azure AD.

Setting Description
Provider name An arbitrary friendly name for the IdP, e.g. 'AzureAD'
Provider URL https://sts.windows.net/00.../ [Azure AD Identifier]
ACS binding 'POST' (default setting)
Single sign on URL https://login.microsoft.com/00.../wsfed [Login URL]
Single sign on binding 'Redirect' (default setting)
Single logout URL https://login.microsoftonline.com/common/wsfederation?wa=wsignout1.0 [Logout URL]
Single logout binding 'Redirect' (default setting)
Username claim 'Email address'
Clock skew Number of minutes time difference allowed between the IdP and IPS machine clocks (default 3 minutes, range 1 to 60 minutes)
Reject unsigned assertion Enabled (default setting)
Certificate Upload the SAML signing certificate exported from Azure AD, in Base 64-Encoded X.509 format
Export metadata - Service Provider Exports an XML file containing the SAML Service Provider metadata which is needed to configure the Enterprise Application in Azure AD
Import metadata - Identity Provider Imports an XML file that contains the Azure AD IdP metadata for the SAML configuration

Configuration for a Citrix NetScaler IdP

The table shows the standard settings for Citrix NetScaler, assuming that there is a NetScaler server at the DNS address 'netscaler.domain.mycompany.com'.

Setting Description
Provider name An arbitrary friendly name for the IdP, e.g. 'NetScaler'
Provider URL https://netscaler.domain.mycompany.com
ACS binding 'POST' (default setting)
Single sign on URL https://netscaler.domain.mycompany.com/saml/login
Single sign on binding 'Redirect' (default setting)
Single logout URL https://netscaler.domain.mycompany.com/cgi/logout
Single logout binding 'Redirect' (default setting)
Username claim 'Name ID' (default setting)
Clock skew Number of minutes time difference allowed between the IdP and IPS machine clocks (default 3 minutes, range 1 to 60 minutes)
Reject unsigned assertion Enabled (default setting)
Certificate Upload the SAML signing certificate exported from NetScaler, in Base 64-encoded X.509 format