Log in to your OneLogin account and create a domain when prompted. For example: sonicwall.onelogin.com
.
Search SAML and add it by clicking SAML Test Connector (Advanced).
Download the certificate to upload as ‘Certificate Authority’ cert in SMA appliance.
Set Audience, Recipient, ACS URL Validator, ACS URL, Single Logout URL as per the following:
https://{appliance ‘s IP address or Hostname}/ api /v1/logon/saml2ssoconsumer
https://{appliance ‘s IP address or Hostname}/ api /v1/logon/saml2ssoconsumer
https://{appliance ‘s IP address or Hostname}/ api /v1/logon/saml2ssoconsumer
Single Logout URL: https://{appliance‘s IP address or Hostname}/ api /v1/logon/saml2ssoco
Click Add parameter.
Enter a name for Field name, select Include in SAML assertion, and click SAVE.
The dialog binds the field name to user’s attribute.
You can select an attribute relevant to this field and select Include in SAML assertion, then this attribute is present in the AUTH Response messages.
For example, in step 1 we have customized some parameters, for example:
parameter name: GGNAME, the value of GGNAME is the value of user’s attribute Department
parameter name: UUNAME, the value of UUNAME is value of user’s attribute First Name
Now you can see the parameter that you have set.
Add more users for the SAML domain.
Navigate to System > Certificates and import SAML certificates.
Configure SAML domain with OneLogin data.
You can now proceed with authentication from Virtual Office portal and NetExtender. When you select OneLogin domain in the login page, you are redirected to the OneLogin login page, and after providing correct credentials, the authentication is successful.