IBM Verify

IBM Verify

Join this online user group to communicate across Security product users and IBM experts by sharing advice and best practices with peers and staying up to date regarding product enhancements.

 View Only
  • 1.  Sharing Federation among Reverse Proxies

    Posted Sat January 02, 2021 11:52 AM
    Although I know it is possible, it seems that the way to do this is awkward!
    I have an Identity Provider IdP for SAML 2.0 and multiple partners.

    Because there are multiple clients (some internal and some external), I would like provide access to the same Federation (IdP) through different ports/Reverse Proxies.

    But on the definition of the Identity Provider, I must specify the Provider ID as well as the Point Of Contact, which are Reverse Proxy dependent!

    What is the recommendation for such use case!

    ------------------------------
    Joao Goncalves
    Pyxis, Lda.
    Sintra
    +351 91 721 4994
    ------------------------------


  • 2.  RE: Sharing Federation among Reverse Proxies

    Posted Mon January 04, 2021 12:58 AM
    Hi Joao,

    I assume you want to do following

    1. Internal request to go to Internal_proxy
    2. External request to go to external_proxy

    This can be handled easily using LB. LB facing internet would route all the request to external proxy and LB intercepting internal request would route request to internal_proxy.

    Please let me know if you need any other information. 


    ------------------------------
    Rahil Anwar
    ------------------------------



  • 3.  RE: Sharing Federation among Reverse Proxies

    Posted Mon January 04, 2021 06:42 AM
    Thanks for your reply, but it does not answer the question.
    On the definition of the IdP, we must define 2 parameters: Provider ID and Point of Contact.

    Both are Reverse Proxy dependent. How can the same Federation serve 2 different Reverse proxies? What is the recommendation?

    For example,
    • The Point of Contact should be http[s]://hostname[:portnumber]/junction/sps
    • The Provider ID should be point_of_contact _server_URL/federation_name/saml20.

    The hostname is the Load Balancer for either Internal or External Virtual IP addresses!
    How do you overcome this problem?


    ------------------------------
    Joao Goncalves
    Pyxis, Lda.
    Sintra
    +351 91 721 4994
    ------------------------------



  • 4.  RE: Sharing Federation among Reverse Proxies

    Posted Mon January 04, 2021 07:14 AM
    Dear Joao,

    We have done the same in our environment. No need to specify 2 URL in federation configuration. 

    please check with LB team

    ------------------------------
    Rahil Anwar
    ------------------------------



  • 5.  RE: Sharing Federation among Reverse Proxies

    Posted Mon January 04, 2021 07:21 AM
    Joao, Rahil,

    I suspect that in the environment Rahil has set up, both internal and external users are using the SAME DNS name (which resolves to Global LB) - but are then being directed to different Reverse Proxy clusters based on source.  You could achieve a similar result by having internal and external systems use different DNS (which returns different cluster IP for internal and external).

    In the case where the DNS hostname for each cluster is different (which sounds like the case for Joao's environment) I think you will still need different federation definitions for the internal and external channels.

    Jon.

    ------------------------------
    Jon Harry
    Consulting IT Security Specialist
    IBM
    ------------------------------



  • 6.  RE: Sharing Federation among Reverse Proxies

    Posted Mon January 04, 2021 07:37 AM
    Hi Jon,

    Agree in case you need different name for external and internal DNS then you need to configure different federation.

    ------------------------------
    Rahil Anwar
    ------------------------------



  • 7.  RE: Sharing Federation among Reverse Proxies

    Posted Tue January 05, 2021 02:46 AM
    Hi Joao,

    If you want to stick to 1 federation definition only, you could define the federation's local address as the point of contact (with local I mean the target of the /isam junction from the internal and external webseal).
    If the partners (SPs) are proxy-integrated behind the same webseal, all the SAML operations would work due to webseal's filtering capabilities.

    But if a SP is not proxy-integrated via junction, then all those SAML operations would probably fail, where the SP has to send messages to the IdP: SP initiated SSO, SLO.
    At least IdP intiated SSO will still work.

    Frank

    ------------------------------
    Frank Thurau
    ------------------------------