- Under "auth", add the following values for "saml enabled" and "location":
auth: <other entries> saml: enabled: true location: <Smart Check FQDN or IP>
- Update your Smart Check to use updated configuration:
helm upgrade \--values overrides.yaml \deepsecurity-smartcheck \https://github.com/deep-security/smartcheck-helm/archive/master.tar.gz- Add parameter -n if you are using different namespace.
- Change master.tar.gz if you are using a specific version of Smart Check.
- On a Linux machine, modify and run the following shell script to get a session token:
#!/bin/bash#Create a session, change the target URL to your DSSCcurl -k https://<Smart Check FQDN or IP>/api/sessions --header "Content-Type: application/json" --request POST --data '{"user": {"userID":"<user>","password":"<password>"}}' | jq -r '.token' > session.json- Change <user> and <password> to your Smart Check administrator user and password.
- Change <Smart Check FQDN or IP>.
- Make sure that session.json file is created with token content.
- Go to Azure web console and get the metadata URL.
- Modify and run the following script to register Azure SSO metadata URL:
#!/bin/bash#Change target URL and metadataURLcurl -kv -X POST https://<Smart Check FQDN or IP>:<port>/api/identity-providers/saml -H "Authorization: Bearer $(cat session.json)" -H 'Content-Type: application/json' -d '{"name":"IdentityProvider","description":"My SAML identity provider. Contact identity@example.com for support.","metadataURL":"<Metadata URL>","insecureSkipVerify":true}'- You can change the description.
- Change <Smart Check FQDN or IP>.
- Change <Metadata URL>.
- Verify that API call was successful:
curl -kv -X GET \https://<Smart Check FQDN or IP>/api/identity-providers/saml \-H"Authorization: Bearer $(cat session.json)"You should see the correct metadata URL reflected with "status": "ok".
- On Azure SSO, click Edit on Claims.
- Add a new claim with name RoleSessionName, namespace https://deepsecurity.trendmicro.com/SAML/Attributes and source attribute user.mail.
- Add another claim with name Role, namespace https://deepsecurity.trendmicro.com/SAML/Attributes and source attribute administrator.
You should be able to log in to Smart Check console using Azure SSO.
