Skip to main content

Akana Integration Guide

Introduction

Use this guide to enable Multi-Factor Authentication and Single Sign-on (SSO) access via OpenID Connect / OAuth 2.0 to Akana.

Prerequisites

1. Have SecureAuth IdP 8.2+

2. Have an Akana admin account and access to the web admin

3. Create a New Realm for the Akana integration in the SecureAuth IdP Web Admin

4. Configure the following tabs in the Web Admin before configuring the Post Authentication tab:

  • Overview – the description of the realm and SMTP connections must be defined

  • Data – an enterprise directory must be integrated with SecureAuth IdP

  • Workflow – the way in which users will access this application must be defined

  • Multi-Factor Methods – the Multi-Factor Authentication methods that will be used to access this page (if any) must be defined

SecureAuth IdP Configuration Steps

Post Authentication

44831514.png

1. In the Post Authentication section, select OpenID Connect / OAuth 2 from the Authenticated User Redirect dropdown

2. An unalterable URL will be auto-populated in the Redirect To field, which will append to the domain name and realm number in the address bar (Authorized/OidcAuthorize.aspx)

Warning

Click Save once the configurations have been completed and before leaving the Post Authentication page to avoid losing changes

Forms Auth / SSO Token

Optionally, in the Forms Auth / SSO Token section, click the View and Configure FormsAuth keys/SSO token link to configure the token/cookie settings and configure this realm for SSO.

44833086.png

OpenID Connect / OAuth 2.0 - Settings

44831502.png

4. Select True from the Enabled dropdown

5. Set the Issuer to the Fully Qualified Domain Name (FQDN) of the SecureAuth IdP appliance, followed by the Akana-integrated realm, e.g. https://secureauth.company.com/secureauth2

6. Select RSA SHA256 from the Signing Algorithm dropdown

7. Click Select Certificate to select a SecureAuth IdP or third-party certificate uploaded to the appliance to be used in the integration

8. Set the Lifetimes for the Authorization Code, Access Token, and Refresh Token

OpenID Connect / OAuth 2.0 - Scopes

44831516.png

9. Check Discoverable from the openid Scope option

10. Check Discoverable on the other Scopes that are being used in the integration

Warning

Click Save once the configurations have been completed and before leaving the Post Authentication page to avoid losing changes

OpenID Connect / OAuth 2.0 - Clients

44831513.png

11. Click Add Client to create an Akana client

OpenID Connect / OAuth 2.0 - Client Details
44831522.png

12. Select True from the Enabled dropdown

13. Set the Name to an identifiable name that appears in the SecureAuth IdP Web Admin, e.g. Akana

The Client ID and Client Secret are generated by SecureAuth IdP once the client is saved

The Client ID appears in the OpenID Connect / OAuth 2.0 - Clients section; and the Client Secret can be viewed by clicking on the Akana from the OpenID Connect / OAuth 2.0 - Clients section (once created)

OpenID Connect / OAuth 2.0 - Client Redirect URIs
44831511.png

14. Click Add Redirect URI

15. Set the URI to https://secureauth.eap.soa.com/api/login/ssoLogin

16.Click Add Redirect URI

17. Set the second URI to https://secureauth.eap.soa.com/oauth/auz/grants/provider/authcomplete

Warning

Click Save once the configurations have been completed and before leaving the OpenID Connection / OAuth 2.0 Clients page to avoid losing changes

OpenID Connect / OAuth 2.0 - Claims

44831505.png

18. Select Authenticated User ID from the Profile Property dropdown in the sub Claim

19. Check Discoverable

20. Select First Name from the Profile Property dropdown in the given_name Claim

21. Check Discoverable

22. Select Last Name from the Profile Property dropdown in the family_name Claim

23. Check Discoverable

Warning

Click Save once the configurations have been completed and before leaving the Post Authentication page to avoid losing changes

Akana Configuration Steps

Domains

44831515.png
44831504.png

1. Log into the Akana web admin, and click the Tools icon from the top menu

2. Select Domains and click Add Domain

3. Select OpenID Connect Relying Party and click Select

Details

44831503.png

4. Provide a Name for the new domain, and an optional Description

5. Click Next

Configuration Method

44831507.png

6. Select Read Provider Metadata & Edit Configuration from the Select Configuration Method options

7. Set the Issuer / Well-Known Configuration URL to the FQDN of the SecureAuth IdP appliance, followed by the Akana-integrated realm, and /.well-known/openid-configuration, e.g. https://secureauth.company.com/secureauth2/.well-known/openid-configuration; and click Load

8. Click Next

Provider

44831518.png

9. The Issuer is auto-populated and should be set to the FQDN of the SecureAuth IdP appliance, followed by the Akana-integrated realm, e.g. https://secureauth.company.com/secureauth2

This is the same value set in the Issuer field of the SecureAuth IdP Web Admin (step 5)

10. The JWK Set URI is auto-populated and should be set to the FQDN of the SecureAuth IdP appliance, followed by the Akana-integrated realm, and /.well-known/jwks, e.g. https://secureauth.company.com/secureauth2/.well-known/jwks

11. Select in which mode the End-User Claims are Available

SecureAuth recommends ID Token from Token Endpoint

12. Click Next

Authentication

44831517.png

13. The Authorization Endpoint URI is auto-populated and should be set to the FQDN of the SecureAuth IdP appliance, followed by the Akana-integrated realm, and /SecureAuth.aspx, e.g. https://secureauth.company.com/secureauth2/SecureAuth.aspx

14. Select GET from the HTTP Method dropdown

15. Select the Response Type from the dropdown, which corresponds to the selection made for step 11

SecureAuth recommends code

16. Select the Response Mode from the dropdown

SecureAuth recommends form_post

17. List all of the Scopes utilized in the integration, and those configured as Discoverable in the SecureAuth IdP Web Admin (steps 9 - 10)

18. Click Next

App

44831521.png

19. Set the App ID to the Client ID generated in the Client Details section of SecureAuth IdP Web Admin

20. Set the App Shared Secret to the Client Secret generated in the Client Details section of the SecureAuth IdP Web Admin, and Confirm

21. Click Next

Token

44831510.png

22. The Token Endpoint URI is auto-populated and should be set to the FQDN of the SecureAuth IdP appliance, followed by the Akana-integrated realm, and /OidcToken.aspx, e.g. https://secureauth.company.com/secureauth2/OidcToken.aspx

23. Select the Client Authentication Method from the dropdown

SecureAuth recommends client_secret_post

24. Click Next

User

44831512.png

25. The UserInfo Endpoint URI is auto-populated and should be set to the FQDN of the SecureAuth IdP appliance, followed by the Akana-integrated realm, and /OidcUserInfo.aspx, e.g. https://secureauth.company.com/secureauth2/OidcUserInfo.aspx

26. Select POST from the HTTP Method dropdown

27. The Subject Claim, First Name Claim, Last Name Claim, and Email Claim values are auto-populated based on the mapping in the SecureAuth IdP Web Admin (steps 18 - 23)

29. Click Finish

44831506.png

Once the Domain is created, it appears in the Domains section

Here, the configuration can be Modified or the domain can be Deleted

Config

44831519.png

30. Select Logins under Config

31. Enable the newly-created Domain and upload a Logo that appears on the login pages

32. Click Save

End-user Experience

When the end-user initiates the login process, instead of providing the username and password, click the Logo uploaded in step 31

The end-user is redirected to SecureAuth IdP for 2-Factor Authentication, and then redirected back into Akana upon successful identity validation

44831509.png
44831508.png