This topic describes how to configure single sign-on (SSO) in the Secure Access Service Edge (SASE) console and the Identity as a Service (IDaaS) console. After you configure the settings, a user can log on to the IDaaS application portal by using SASE SSO.
SASE uses the OpenID Connect (OIDC) protocol to implement SSO between IDaaS and SASE. If the SSO service of an enterprise supports OIDC, the account system in SASE can serve as an identity provider (IdP) and can be integrated with the SSO system of the enterprise.
Scenario
An enterprise uses IDaaS to manage the identities and application permissions of users and connects its office applications to IDaaS for SSO. The enterprise also activates SASE to ensure the security of remote access and sensitive office data. In this case, you can use the SSO feature of SASE to connect SASE to IDaaS over OIDC. Then, after a user logs on to the SASE client, the user can access an office application in the IDaaS application portal as a user of a SASE IdP.
Prerequisites
SASE is purchased. For more information, see Service purchase.
Logon to the SASE client is complete. For more information, see Install and log on to the SASE client.
IDaaS is activated, and an IDaaS Enterprise Identity Access Management (EIAM) instance of the new version is created. For more information, see Create an instance for free.
Office applications of the enterprise are connected to IDaaS. For more information, see Overview.
Process
Step 1: Obtain the IDaaS redirect URI
Log on to the IDaaS console.
On the EIAM page, click the name of the created instance to go to the instance console.
In the left-side navigation pane, click IdPs.
On the IdPs page, click Other IdPs.
In the Add IdP panel, click OIDC IdP.
In the Bind OIDC Identity Provider panel, copy the IDaaS redirect URI.
We recommend that you do not close this panel because you need to perform Step 3 in this panel.
Step 2: Configure a SASE SSO policy
Log on to the SASE console.
In the left-side navigation pane, choose
.On the Single Sign-on page, click Create Policy.
In the Create Policy panel, configure the parameters. The following table describes the parameters.
Parameter
Description
Example
Policy Name
Enter the name of the policy.
SASE_SSO_test
Policy Status
Specify whether to enable the policy.
Enabled
API access authorization
Configure the client_id and client_secret parameters. Before you can use SSO, you must enable API access. You must configure the client_id and client_secret parameters for API authorization.
ImportantKeep the client secret confidential. If the client secret is leaked, delete the client secret and create another client secret for rotation.
client_id: sase_sso
client_secret: 1kr6ld066******
Redirect URL
The Redirect URL parameter is used to specify the redirect_uri parameter in the URL of an office application. After you configure the Redirect URL parameter and create the policy, the specified URL is added to a whitelist and SASE can initiate a logon request after authentication.
Set the Redirect URL parameter to the redirect URI that you obtained in Step 1.
https://l6v271cn.aliyunidaas.com/login/********
Click OK.
Step 3: Bind SASE IdPs to the IDaaS instance
In the Bind OIDC Identity Provider panel, configure the following parameters.
If you close the panel in which you need to perform steps, go to the Bind OIDC Identity Provider panel by following instructions in Step 1.
For more information, see Bind IDaaS to an OIDC IdP.
Parameter
Example
Basic Information
Nickname
SASE
Logon Settings
Authentication Mode
client_secret_post
Client ID
sase_sso
Client Secret
Client Secret: 1kr6ld066******
Scopes
openid,external_id
Endpoint Configurations
Issuer
After you configure the Issuer parameter, you can parse the discovery endpoint to obtain endpoint information.
Authorization Endpoint
Token Endpoint
Public Key Endpoint
User Information Endpoint
Click Next to go to the Select Scenario step.
To facilitate subsequent verification, retain the default configurations in the Select Scenario step. For more information, see Select a scenario.
Click Created.
Step 4: Use SASE SSO to access IDaaS applications
On the EIAM page, find the IDaaS instance that you want to manage and click the address in the User Portal column.
On the logon page of the user portal, find SASE in the Other login methods section.
Click SASE to log on to the IDaaS portal.
On the application page, access IDaaS applications without entering an account and password.