Skip to main content

Citrix ADC SAML integration

Multi-Factor Authentication (MFA) is an extra layer of security used when logging into websites or apps. Individuals are authenticated through more than one required security and validation procedure that only you know or have access to.

Citrix™ ADC (formerly Netscaler) is an application delivery and load balancing solution that gives a high-quality user experience of web services and cloud-native applications, wherever hosted. Acceptto, as a Citrix Ready Partner, offers a simple method for adding MFA to Citrix ADC via its SAML solution.

Prerequisites

  • An Acceptto account with a configured Identity Provider and LDAP Agent.

    For more information, see the LDAP Agent deployment guide.

  • A user with administrative privileges for Citrix ADC.

Acceptto SAML Configuration as Identity Provider (IdP)

  1. Login to the Acceptto Dashboard with an administrative account and go to Applications.

  2. Create a new application by selecting the Create New Application.

    Create new application
  3. In the New Application form, enter the following values under the General tab.

    • Name - The application name displayed in the admin panel and application portal and used for push notifications and audit logs (e.g. Citrix ADC)

    • Type - Select "SAML Service Provider" from the options

    • Out of Band Methods - Select the allowed methods for approving MFA requests

    • Message for MFA Requests - Enter the user-facing message for Push, SMS, and email MFA requests (optional)

    citrix_adc-s_add_app.png
  4. Under the SAML Service Provider Configuration tab, enter the following values:

    • Issuer or Entity ID – The Issuer/EntityID of your Citrix ADC instance (e.g. CitrixADC.example.com).

    • Sign in URL - The link used by your users to access the Citrix ADC(e.g. https://ADC.example.com).

    • Metadata URL - The URL containing metadata about your Citrix ADC instance (e.g. https://adc.example.com/metadata/samlsp/SAML-Acceptto)

    citrix_adc-s_sp_settings.png
  5. Click Save.

Citrix ADC configuration

  1. Download the SAML metadata and certificate for your organization from Acceptto.

    Metadata Download at https://sso.acceptto.com/<myorganization>/saml/download/metadata or view at https://sso.acceptto.com/<myorganization>/saml/metadata

    Certificate Download at https://sso.acceptto.com/<myorganization>/saml/download/cert

  2. Login to your Citrix ADC with an administrative account.

  3. Navigate to Traffic Management > SSL > SSL Certificate.

    citrix_adc-s_ssl_cert.png
  4. Upload the X.509 certificate file you got from Acceptto SAML Appliance earlier.

    citrix_adc-s_install_cert.png
  5. Connect to Citrix ADC via SSH and insert the following command (Change the values based on your configurations):

    add authentication samlaction {NAME} -samlIDPCertName {IDP Certificate Name} -samlSigningCertName {Signing Certificate Name} -samlredirectUrl {Redirect URL} 
    

    For example, the command could be:

    add authentication samlaction SAML-Acceptto -samlIDPCertName SAML-Acceptto -samlSigningCertName lab.acceptto-com.pfx_CERT_KEY -samlredirectUrl https://saml.acceptto.com/saml/auth
    
  6. Navigate to the Configuration tab, and select Citrix Gateway from the menu and select Policies > Authentication> SAML>.

    citrix_adc-s_saml_servers.png
  7. Select the Policies tab and click ADD. Then, fill the items like the following image and click Ok.

    citrix_adc-s_config_policy.png
  8. Go to the Citrix Gateway > Virtual Servers and select the virtual server you want to add SAML authentication to it and click Edit.

    citrix_adc-s_virtual_servers.png
  9. Go to Basic Authentication and choose SAML as a Primary policy and click on Continue. Then, select the SAML policy created earlier and click Bind and Done.

    citrix_adc-s_saml_policy.png
    citrix_adc-s_policy_type.png

Test your setup

  1. Go to your Citrix Gateway Virtual Server link you got from the previous section. You will be redirected to the Acceptto SAML page.

    SSO login
  2. After successful authentication, you’ll see the Acceptto MFA options, select your desired method. Then, pass the verification stage on your It’sMe mobile app.

    Select MFA method
  3. Finally, you will be redirected to your Citrix ADC landing page.

    citrix_adc-s_landing.png

Support

If you have questions or need assistance, contact SecureAuth Support.

Sales

Want to learn more about our MFA solutions? Contact our Professional Services for a demo today.

Disclaimer

All product names, trademarks, and registered trademarks are the property of their respective owners.

All company, product, and service names used in this document are for identification purposes only. The use of these names, trademarks, and brands do not constitute an endorsement by the SecureAuth Corporation.

Citrix, ADC, and ‘ADC’ are either registered trademarks or trademarks of Citrix and/or one or more of its subsidiaries in the United States and/or other countries.

Microsoft and Active Directory are either registered trademarks or trademarks of Microsoft and/or one or more of its subsidiaries in the United States and/or other countries.