SAML | Citrix ADC
Set up Citrix ADC (SAML)
To set up Citrix ADC (SAML) as your identity provider:
First, you'll need to configure 2 SAML certificates:
- A certificate to terminate TLS at the vServer. Ensure that the certificate is issued by a publicly trusted CA.
- A certificate for signing SAML assertions.
If you do not already have a certificate for signing SAML assertions, you can use a self-signed certificate generated on Citrix ADC by following these steps:1. Navigate to **Traffic Management > SSL**.2. Select **Create and Install a Server Test Certificate**.
Select Configuration and enter a Certificate File Name, Fully Qualified Domain Name, and a select a Country.
For the rest of this example, the user refers to the IdP address
Add a new profile
Navigate to Security > AAA - Application Traffic > Policies > Authentication > Advanced Policies > SAML IDP to add a new profile.
Include the following required configuration details:
Cloudflare Access currently sends the IdP address in place of the Service Provider ID for the AuthN request.
Create an Authentication Policy that refers to the Profile just created, and bind it to the authentication vServer mentioned above.
To configure all of the above using just the CLI, run the following:add authentication samlIdPProfile samlProf_CloudflareAccess \-samlIdPCertName SAML_Signing \-assertionConsumerServiceURL "https://<your-team-name>.cloudflareaccess.com/cdn-cgi/access/callback" \-samlIssuerName "https://idp.yourdomain.com/saml/login" \-rejectUnsignedRequests OFF \-NameIDFormat emailAddress \-Attribute1 email \-Attribute1Expr "AAA.USER.ATTRIBUTE(\"email\")" \-Attribute1Format Basic \-serviceProviderID "https://idp.yourdomain.com/saml/login"add authentication samlIdPPolicy samlPol_CloudflareAccess -rule true -action samlProf_CloudflareAccessbind authentication vserver nsidp -policy samlPol_CloudflareAccess
On the Teams dashboard, navigate to Settings > Authentication.
Under Login methods, click Add new.
Configure the fields as follows:
Field Description Name Your chosen name Single Sign On URL The FQDN of the IdP, with the path
IdP Entity ID/Issuer URL As above Signing Certificate The public certificate from the NetScaler Email attribute name This is listed under Optional configurations
To test that your connection is working, navigate to Authentication > Login methods and click Test next to the login method you want to test.