Configuring Identity Bridging on Unified Access Gateway

You are now ready to configure the Identity Bridging feature on the Unified Access Gateway appliance.  By providing the IdP Metadata XML from the VMware Identity Manager tenant and the Keytab file generated for the [email protected] user, you will be able to configure the Unified Access Gateway to authenticate users with SAML to your it.corp.local intranet website.

1. Configure Identity Provider

Advanced Settings IdP Metadata
  1. Scroll down until you see the option for Identity Bridging Settings
  2. Click the Gear for Upload Identity Provider Metadata under Advanced Settings.

1.1. Upload the Identity Provider Metadata

Set iDP Metadata

Click Select for the IDP Metadata field.

1.2. Select the Identity Provider Metadata

  1. Click Downloads.
  2. Click idp.xml.
    NOTE: This is the Identity Provider Metadata XML you downloaded from the VMware Identity Manager tenant in previous steps.
  3. Click Open.

1.3. Save the Uploaded Identity Provider Metadata

Click Save.

NOTE: It may take a moment to save the configuration after you click Save.  Please do not click multiple times, the page should update after 5 - 10 seconds.

After hit Save, you should receive a pop-up message showing "Configuration is saved successfully".

NOTE: The Entity ID will be detected from the IDP metadata XML, so no need to enter this manually.

2. Configure Keytab

Advanced Settings Keytab

Click the Gear for Upload Keytab Settings under Advanced Settings

2.1. Update the Keytab Settings

Set Keytab
  1. Enter HTTP/[email protected] for the Principal Name.
  2. Click on Select for the Keytab File.

2.2. Select the Keytab File

  1. Click Local Disk (C:).
  2. Click it.keytab.
    NOTE: This is the keytab file you generated from a previous step by running the ktpass command from the Command Prompt.
  3. Click Open.

2.3. Save the Uploaded Keytab File

Click Save.

NOTE: It may take a few seconds for the console to update after you click Save.  Please do not click Save multiple times, the page will refresh automatically within a few seconds.

After hit Save, you should receive a pop-up message showing "Keytab upload is successful".

NOTE: The first Principal Name found on the Keytab file will be used when not provided, if your Keytab contain multiple Principal Names it's recommend that you inform the Principal Name to be used.

3. Configure REALM

Advanced Settings Realm

Click the Gear for Realm Settings under Advanced Settings.

3.1. Add a Realm Setting

Add Relm Settings

Click Add.

3.2. Configure the Realm Settings

Realm Settings
  1. Enter CORP.LOCAL for Name of the realm.
    NOTE: This entry MUST BE IN CAPITAL.  It is advised to copy the value directly or drag-and-drop the text from the manual for accuracy.
  2. Enter corp.local for Key Distribution Centers.
  3. Enter 3 for KCD Timeout (in seconds).
  4. Click Save.

After you click Save, you should receive a pop-up message showing "Configuration saved successful"

3.3. Close the Realm Settings

Realm configured

Click Close.

4. Configure Identity Bridging

Access Reverse Proxy settings
  1. Click the SHOW toggle for the Edge Service Settings.  This will change to HIDE after you click it.
  2. Select the Gear icon for Reverse Proxy Settings.

4.1. Open the itbudget Reverse Proxy Settings

Setup itbudget instance

Select the Gear icon for the itbudget Reverse Proxy Instance.

4.2. Update the itbudget Reverse Proxy Settings

Config identity bridging
  1. Click NO to show the Enable Identity Bridging, it will switch to YES after you enable it.
  2. Select SAML for Authentication Types.
  3. Select https://vidm.airwlab.com for Identity Provider.  This Identity Provider was made available with the IdP Metadata XML you uploaded from the previous steps.
  4. Select HTTP/[email protected] for Keytab.  This Keytab was made available with the Keytab file you uploaded from the previous steps.
  5. Enter HTTP/[email protected] for Target Service Principal Name.
  6. Enter / for Service Landing Page.
  7. Click Download SAML service provider metadata, this will open another screen.

NOTE: Do NOT click save yet! Continue to the next step.

4.3. Download the SAML Service Provider Metadata

Download SAML SP metadata
  1. Enter uag-internet.corp.local for External Host Name.
    NOTE: This is the internet facing NIC that was configured for the Unified Access Gateway appliance during deployment using the .ini file with PowerShell.
  2. Click Download.

NOTE: It may take a moment for the download to start after clicking Download.  Please wait a moment and do not click Download multiple times!

A file named uag-internal.corp.local.xml will be download into the Downloads folder, this file will be used during the Web App setup in VMware Identity Manager.

4.4. Keep the SAML Service Provider Metadata (IF NEEDED)

If you are prompted to keep or discard the uag-internet.corp.local.XML download, click Keep.

4.5. Save the Reverse Proxy Settings

Config identity bridging
  1. Scroll down until you see the button Save
  2. Click Save

4.6. Confirm the Reverse Proxy Settings Saved

Configuration saved sucessfully

Confirm the Configuration is saved successfully message is displayed.

Click Close