Skip to main content

Web Service (Multi-Data Store) as Additional Profile Provider Configuration Guide

Introduction

Use this guide along with the Data Tab Configuration guide to configure a SecureAuth IdP realm that uses Web Service (Multi-Data Store) as an additional Profile Provider.

Web Service enables SecureAuth IdP to access multiple data stores to extract the appropriate user information for authentication and assertion.

Prerequisites

  • An on-premises data stores (Active Directory, SQL Server, ODBC, etc.)

  • Service accounts with read access (and optional write access) for SecureAuth IdP for each data store

Web Service (Multi-Data Store) Configuration Steps

44833249.png

1. In the Profile Provider Settings section, select True from the Same as Above dropdown to copy the data store integration from the Membership Connection Settings section for use in profile connection; or select False if that directory is only used for the membership connection.

2. Select Web Service (Multi-Datastore) from the Default Profile Provider dropdown if Web Service is to be used as the default profile provider

Note

  • If another Web Service data store is configured in the Membership Connection Settings section, and True is selected from the Same as Above dropdown, then those settings appear in the Profile Connection Settings (below) and must be modified to reflect the settings of the new Web Service configuration

  • Only one Web Service configuration can be utilized for profile connection

  • If another directory is selected from the Default Profile Provider dropdown, then Web Service must be selected from Source dropdown in the Profile Fields section for the SecureAuth IdP Properties that are mapped to Web Service configuration fields

Profile Connection Settings

44833246.png
Datastore Type

3. Select Web Service (Multi-Datastore) from the Data Server dropdown

4. Set the Webservice Username

It is recommended that this be changed from the default to ensure security

5. Set the Webservice Password

It is recommended that this be changed from the default to ensure security

6. Create a list of Allowed Groups that can access the realm (optional), e.g. Admins

7. Select True from the Failover dropdown if SecureAuth IdP is to respond in the event of a failure

8. Click Test Connection to ensure that the connection is successful

Multi-Datastore Profile Configuration

44833248.png

9. Click Add Realm from Local Server to use the Profile Connection Settings data store integration information from a realm on the same SecureAuth IdP appliance

Click Add Realm from Another Server to use the data store integration information from a realm on a different SecureAuth IdP appliance

10. Select the realms in which the necessary Profile Connection Settings data store integration is configured to be used for this realm's workflow, and click Add

11. Once realms are added, drag and drop the realms to create the order in which SecureAuth IdP checks for user information

Note

Refer to Data Tab Configuration to complete the configuration steps in the Data tab of the Web Admin