- Under "auth", add the following values for "saml enabled" and "location":
auth: <other entries> saml: enabled: true location: <Smart Check FQDN or IP>
- Update your Smart Check to use updated configuration:
helm upgrade \
--values overrides.yaml \
deepsecurity-smartcheck \
https:
//github.com/deep-security/smartcheck-helm/archive/master.tar.gz
- Add parameter -n if you are using different namespace.
- Change master.tar.gz if you are using a specific version of Smart Check.
- On a Linux machine, modify and run the following shell script to get a session token:
#!/bin/bash
#Create a session, change the target URL to your DSSC
curl -k https:
//<Smart Check FQDN or IP>/api/sessions --header "Content-Type: application/json" --request POST --data '{
"user"
: {
"userID"
:
"<user>"
,
"password"
:
"<password>"
}
}
' | jq -r '
.token' > session.json
- Change <user> and <password> to your Smart Check administrator user and password.
- Change <Smart Check FQDN or IP>.
- Make sure that session.json file is created with token content.
- Go to Azure web console and get the metadata URL.
- Modify and run the following script to register Azure SSO metadata URL:
#!/bin/bash
#Change target URL and metadataURL
curl -kv -X POST https:
//<Smart Check FQDN or IP>:<port>/api/identity-providers/saml -H "Authorization: Bearer $(cat session.json)" -H 'Content-Type: application/json' -d '{
"name"
:
"IdentityProvider"
,
"description"
:
"My SAML identity provider. Contact identity@example.com for support."
,
"metadataURL"
:
"<Metadata URL>"
,
"insecureSkipVerify"
:
true
}'
- You can change the description.
- Change <Smart Check FQDN or IP>.
- Change <Metadata URL>.
- Verify that API call was successful:
curl -kv -X GET \
https:
//<Smart Check FQDN or IP>/api/identity-providers/saml \
-H
"Authorization: Bearer $(cat session.json)"
You should see the correct metadata URL reflected with "status": "ok".
- On Azure SSO, click Edit on Claims.
- Add a new claim with name RoleSessionName, namespace https://deepsecurity.trendmicro.com/SAML/Attributes and source attribute user.mail.
- Add another claim with name Role, namespace https://deepsecurity.trendmicro.com/SAML/Attributes and source attribute administrator.
You should be able to log in to Smart Check console using Azure SSO.