- 27 Jun 2024
- 2 Minutes to read
- Print
- DarkLight
- PDF
Scenario 4 StoreFront via ADC SAML integration
- Updated on 27 Jun 2024
- 2 Minutes to read
- Print
- DarkLight
- PDF
This scenario describes the integration of Liquit Workspace with Citrix StoreFront for external application access through Citrix ADC.
Implementing this integration requires Citrix ADC knowledge. We recommend you contact your Citrix ADC administrator to learn more about it before implementation. The scenario may vary according to the Citrix implementation.
In this scenario:
- Citrix Federated Authentication Services (FAS) is deployed and configured.
Prerequisites
- Liquit Workspace 3.2 or later
- A Citrix ADC 12.1.xx or later configured with a virtual server for the StoreFront
- Citrix XenApp/XenDesktop 7.9 or late
- Citrix StoreFront connector must be configured
- Citrix StoreFront must be configured for Citrix ADC (Gateway)
- Citrix Federated Authentication Service must be deployed and configured
- SAML identity provider must be configured on the Liquit server
- The public certificate of the Liquit SAML identity provider must be exported as base 64
For enhanced integration, see Configure the Citrix StoreFront connector.
The SAML identity provider is available only with a valid Liquit Access Manager license. We recommend you contact Liquit Sales if the option is not available in your Liquit System.
ADC Configuration
The configuration steps described here are done in the web interface of the Citrix ADC.
- In Citrix ADC navigate to Traffic Management > SSL > Certificates > Server Certificates and click Install.
- Import the Liquit SAML identity provider public certificate into ADC.
- Navigate to Security > AAA - Application Traffic > Policies > Authentication > Basic Policies > SAML > Policies tab.
- Add a new policy with the following parameters:
- Name: LIQUIT_IDP_POLICY
- Expression: ns_true
- In the Servers tab, click on Add.
- Configure the following parameters:
- Name: LIQUIT_IDP_SERVER
- Redirect URL: https://workspace.liquit.com/idp/{guid}/saml2/sso (the entity ID can be found on the Liquit SAML identity provider details page, followed by “sso”)
- Single Logout URL: https://workspace.liquit.com/idp/{guid}/saml2/slo (the entity ID can be found on the Liquit SAML identity provider details page, followed by “slo”)
- SAML Binding: POST
- Logout Binding: REDIRECT
- IdP Certificate Name: The Liquit identity provider certificate that was imported
- Authentication Type: SAML
- User Field: Name ID
- Signing Certificate Name: The Citrix ADC certificate that will be used to sign SAML requests
- Issuer Name: This can be anything, for example: https://{Virtual server dns name}/saml
- Reject Unsigned Assertion: ON
- Authentication Class Types: Select "PasswordProtectedTransport"
- Signature Algorithm: RSA-SHA256
- Digest Method: SHA256
After creating the SAML Server, the metadata can be exported and used for registering the StoreFront SAML Service Provider in the Liquit Workspace.
If ADC version 12.1+ is being used, then the popup window that will be shown will contain a URL in the address bar that can be directly used by Liquit Workspace for importing the SAML metadata.
The newly created SAML policy can now be configured as the primary authentication policy on the virtual server for StoreFront.
Register the StoreFront SAML Service Provider in the Liquit Workspace
- In the Liquit Workspace, navigate to Manage > Authentication > Identity Providers and open the desired SAML identity provider.
- Navigate to the Service Providers screen and click Create service provider.
- In Type, select Import Service provider from Metadata.
In General, provide a name to identify the new service provider later. For example, “ADC - Store Service”. Specify the import method that is appropriate for your environment and provide the metadata source.
- In Summary, leave the checkbox Modify Service Provider after creation selected. The service provider entry will be created and populated with the information found in the metadata.
- Configure the Name Identifier on the server provider as follows:
• Name Identifier: Persistent
• User attribute: User principal name