Unified Access Gateway / VMware Horizon integration into Workspace ONE Access

Overview

  • Traditional Federation with VMware Horizon and Workspace ONE Access has been a popular approach and is used by many organizations.
  • Organizations with high security requirements do not like a SAML Artifact being validated internally
  • In this session we look at the option to validate the SAML Artifact on the Unified Access Gateway instead of forwarding the Artifact internally.

Part 1. Enabling SAML federation with the VMware Unified Access Gateway for Workspace ONE Access as the IDP

The Federation of Unified Access Gateway and VMware Horizon with Workspace ONE Access will be done in three phases

  • Phase 1. We enable and configure the SAML federation on  4 VMware Unified Access Gateway servers in a multi-site scenario
  • Phase 2. We enable and configure the SAML Integration as a Web App in Workspace ONE Access
  • Phase 3. We will create deep links in Workspace ONE Access for our Desktop entitlements
Step 1. Preparing to Federate the Unified Access Gateway with Workspace ONE Access
  1. On your ControlCenter server
    • Open your Workspace ONE Access, Admin console URL
      • Under Username
        • enter Administrator
      • Under Password
        • enter VMware1!
      • Select Sign In
  1. In the Web Intelligent Hub Console
    • To the right,
      • select TA
    • From the dropdown
      • select Workspace ONE Access Console
  1. In the Workspace ONE Access Console
    • Select Resources
    • Under the Resources > WEB Apps area
      • Select SETTINGS
  1. In the Settings window
    • below SaaS Apps
      • select SAML Metadata
  1. In the Settings window
    • in the right pane
      • below SAML Metadata
        • select & right click Identity Provider (IdP) metadata
        • in the drop down menu
          • select Save link as...
        • in Flle Explorer Save As window
          • ensure Downloads is selected Quick Access (default)
          • at the bottom of the window
            • select Save
Step 2. Enabling SAML Federation on Site 1 , UAG-HZN-01a
  1. On your  Site 1 Browser profile
    • In the Favourites bar
      • select the UAG-HZN-01a shortcut
  1. In the VMware Unified Access Gateway login
    • in the Username area
      • enter admin
    • in the Password area
      • enter VMware1!
    • select Login
  1. In the VMware Unified Access Gateway admin console
    • below Configure Manually
      • click Select
  1. In the VMware Unified Access Gateway admin console
    • scroll down to Identity Bridging Settings
      • to the right of Upload Identity Provider Metadata
        • select the GEAR icon
  1. In the Upload Identity Provider Metadata window
    • next to Entity ID
      • enter Workspace ONE Access
    • next to IDP Metadata
      • click Select
  1. In the File Explorer - Open window
    • Quick Access > Downloads folder
      • (this should be the default)
        • select idp.xml
    • in the bottom right corner
      • select Open
  1. In the Upload Identity Provider Metadata window
    • next to Always force SAML auth
      • switch the Toggle from OFF to ON
        • select Save
    • scroll back up to the top of UAG admin console
  1. In the VMware Unified Access Gateway admin console
    • In the General Settings area
      • next to Edge Service Settings
        • turn the TOGGLE from OFF to ON
      • to the right of Horizon Settings
        • select the GEAR icon
  1. In the Horizon Settings window
    • scroll down to the bottom
      • next to More
        • select the expand icon
  1. In the Horizon Settings window
    • next to Auth Methods
      • from the dropdown
        • select SAML
  1. In the Horizon Settings window
    • below Auth Methods
      • next to Identity Provider*
        • from the dropdown
          • select Workspace ONE Access
  1. In the Horizon Settings window
    • below Identity Provider*
      • select Download SAML service provider metadata
  1. In the Download SAML service provider metadata window
    • next to External Host Name
      • enter corp.euc-livefire.com
      • select Download
  1. In the Horizon Settings window
    • scroll down to the bottom of the window
      • select Save
Step 3. Enabling SAML Federation on Site 1 , UAG-HZN-01b
  1. On your  Site 1 Browser profile
    • In the Favourites bar
      • select the UAG-HZN-01B shortcut
  1. In the VMware Unified Access Gateway login
    • in the Username area
      • enter admin
    • in the Password area
      • enter VMware1!
    • select Login
  1. In the VMware Unified Access Gateway admin console
    • below Configure Manually
      • click Select
  1. In the VMware Unified Access Gateway admin console
    • scroll down to Identity Bridging Settings
      • to the right of Upload Identity Provider Metadata
        • select the GEAR icon
  1. In the Upload Identity Provider Metadata window
    • next to Entity ID
      • enter Workspace ONE Access
    • next to IDP Metadata
      • click Select
  1. In the File Explorer - Open window
    • Quick Access > Downloads folder
      • (this should be the default)
        • select idp.xml
    • in the bottom right corner
      • select Open
  1. In the Upload Identity Provider Metadata window
    • next to Always force SAML auth
      • switch the Toggle from OFF to ON
        • select Save
    • scroll back up to the top of UAG admin console
  1. In the VMware Unified Access Gateway admin console
    • In the General Settings area
      • next to Edge Service Settings
        • turn the TOGGLE from OFF to ON
      • to the right of Horizon Settings
        • select the GEAR icon
  1. In the Horizon Settings window
    • scroll down to the bottom
      • next to More
        • select the expand icon
  1. In the Horizon Settings window
    • next to Auth Methods
      • from the dropdown
        • select SAML
  1. In the Horizon Settings window
    • below Auth Methods
      • next to Identity Provider*
        • from the dropdown
          • select Workspace ONE Access
  1. In the Horizon Settings window
    • scroll down to the bottom of the window
      • select Save
Step 4. Enabling SAML Federation on Site 2 , UAG-HZN-02a
  1. On your ControlCenter server
    • switch to your Site 2 Browser profile
      • In the Favourites bar
        • select the UAG-HZN-02a shortcut
  1. In the VMware Unified Access Gateway login
    • in the Username area
      • enter admin
    • in the Password area
      • enter VMware1!
    • select Login
  1. In the VMware Unified Access Gateway admin console
    • below Configure Manually
      • click Select
  1. In the VMware Unified Access Gateway admin console
    • scroll down to Identity Bridging Settings
      • to the right of Upload Identity Provider Metadata
        • select the GEAR icon
  1. In the Upload Identity Provider Metadata window
    • next to Entity ID
      • enter Workspace ONE Access
    • next to IDP Metadata
      • click Select
  1. In the File Explorer - Open window
    • Quick Access > Downloads folder
      • (this should be the default)
        • select idp.xml
    • in the bottom right corner
      • select Open
  1. In the Upload Identity Provider Metadata window
    • next to Always force SAML auth
      • switch the Toggle from OFF to ON
        • select Save
    • scroll back up to the top of UAG admin console
  1. In the VMware Unified Access Gateway admin console
    • In the General Settings area
      • next to Edge Service Settings
        • turn the TOGGLE from OFF to ON
      • to the right of Horizon Settings
        • select the GEAR icon
  1. In the Horizon Settings window
    • scroll down to the bottom
      • next to More
        • select the expand icon
  1. In the Horizon Settings window
    • next to Auth Methods
      • from the dropdown
        • select SAML
  1. In the Horizon Settings window
    • below Auth Methods
      • next to Identity Provider*
        • from the dropdown
          • select Workspace ONE Access
  1. In the Horizon Settings window
    • scroll down to the bottom of the window
      • select Save
Step 5. Enabling SAML Federation on Site 2 , UAG-HZN-02b
  1. On your ControlCenter server
    • on your Site 2 Browser profile
      • In the Favourites bar
        • select the UAG-HZN-02b shortcut
  1. In the VMware Unified Access Gateway login
    • in the Username area
      • enter admin
    • in the Password area
      • enter VMware1!
    • select Login
  1. In the VMware Unified Access Gateway admin console
    • below Configure Manually
      • click Select
  1. In the VMware Unified Access Gateway admin console
    • scroll down to Identity Bridging Settings
      • to the right of Upload Identity Provider Metadata
        • select the GEAR icon
  1. In the Upload Identity Provider Metadata window
    • next to Entity ID
      • enter Workspace ONE Access
    • next to IDP Metadata
      • click Select
  1. In the File Explorer - Open window
    • Quick Access > Downloads folder
      • (this should be the default)
        • select idp.xml
    • in the bottom right corner
      • select Open
  1. In the Upload Identity Provider Metadata window
    • next to Always force SAML auth
      • switch the Toggle from OFF to ON
        • select Save
    • scroll back up to the top of UAG admin console
  1. In the VMware Unified Access Gateway admin console
    • In the General Settings area
      • next to Edge Service Settings
        • turn the TOGGLE from OFF to ON
      • to the right of Horizon Settings
        • select the GEAR icon
  1. In the Horizon Settings window
    • scroll down to the bottom
      • next to More
        • select the expand icon
  1. In the Horizon Settings window
    • next to Auth Methods
      • from the dropdown
        • select SAML
  1. In the Horizon Settings window
    • below Auth Methods
      • next to Identity Provider*
        • from the dropdown
          • select Workspace ONE Access
  1. In the Horizon Settings window
    • scroll down to the bottom of the window
      • select Save

Part 2. Configuring the SAML Federation for Horizon

For TrueSSO to work the Horizon SAML authenticator is required.
We configure this on both Site 1 and Site 2

Step 1. Configuring the SAML federation with VMware Horizon on Site 1
  1. On your ControlCenter desktop
    • On your Site 1 Chrome Browser
      • Open a new tab
    • In the Favourites bar
      • Select the Horizon shortcut
    • In the User Name area
      • enter administrator
    • In the Password area
      • enter  VMware1! 
    • Select Sign in
Configuring VMware Identity Manager to deliver remote Applications and Desktops
  1. In the Horizon Admin Console
    • In the Inventory
      • expand Settings,
        • select Servers
      • In the Servers area
        • select the Connection Servers tab
  1. Under Servers
    • Select the radio button to next HORIZON-01a
    • Select  Edit 
  1. On the Edit Connection Server Settings page
    • Select the Authentication tab.
  1. On the Authentication tab
    • below Delegation of authentication to VMware Horizon (SAML 2.0 Authenticator):
      • On the Drop down Arrow
        • Select Allowed,
    • Select the Manage SAML Authenticators box
  1. On the Manage SAML Authenticators box
    • Select Add
  1. In the Add SAML 2.0 Authenticator window.
    • Ensure Dynamic radio button is selected,
    • Enter the following:
      • Under Label:
        • type Workspace ONE Access
      • Under Metadata URL : enter
        • https://YOUR CUSTOM Access URL/SAAS/API/1.0/GET/metadata/idp.xml
          • e.g. https://aw-euclivefirefran.vidmpreview.com/SAAS/API/1.0/GET/metadata/idp.xml
      • Under * TrueSSO Trigger Mode
        • from the dropdown
          • select Enabled
      • Select OK
  1. In the Manage SAML Authenticators window
    • Select OK to close
  1. In the Connection Server Settings
    • Select OK
Step 2. Configuring the SAML federation with VMware Horizon on Site 2
  1. On your ControlCenter desktop
    • switch to your Site 2  Chrome browser
      • Open a new tab
    • from the Favourites bar
      • select the Horizon Site 2 shortcut
    • In the User Name area
      • login as administrator
    • In the Password area
      • type  VMware1! 
    • Select Sign in
Configuring VMware Identity Manager to deliver remote Applications and Desktops
  1. In the Horizon Admin Console
    • Inventory pane
      • expand Settings,
        • select Servers
        • In the middle pane
          • select the Connection Servers tab
  1. Under Servers
    • select the radio button to next HORIZON-02a
    • select  Edit 
  1. On the Edit Connection Server Settings page
    • select the Authentication tab.
  1. In the Edit Connection Server Settings window
    • on the Authentication tab,
      • under Delegation of authentication to VMware Horizon (SAML 2.0 Authenticator):
        • from the Drop down Arrow
          • select Allowed,
      • below SAML Authenticator
        • select the Manage SAML Authenticators box
  1. On the Manage SAML Authenticators box
    • Select Add
  1. In the Add SAML 2.0 Authenticator window.
    • ensure Dynamic radio button is selected,
      • enter the following:
        • under Label:
          • type Workspace ONE Access
        • Under Metadata URL : enter
          • https://YOUR CUSTOM Access URL/SAAS/API/1.0/GET/metadata/idp.xml
            • e.g. https://aw-euclivefirefran.vidmpreview.com/SAAS/API/1.0/GET/metadata/idp.xml
        • under * TrueSSO Trigger Mode
          • from the dropdown
            • select Enabled
        • select OK
  1. In the Manage SAML Authenticators window
    • Select OK to close
  1. In the Connection Server Settings
    • Select OK

Part 3. Configuring Workspace ONE Access for VMware Unified Access as the Service Provider

In this section perform the Workspace ONE Access part of the SAML Federation process with VMware Unified Access Gateway

Configuring Workspace ONE Access for VMware Unified Access as the Service Provider
  1. On your ControlCenter server
    • Open your Workspace ONE Access, Admin console URL
      • Under Username
        • enter Administrator
      • Under Password
        • enter VMware1!
      • Select Sign In
  1. In the Web Intelligent Hub Console
    • To the right,
      • select TA
    • From the dropdown
      • select Workspace ONE Access Console
  1. In the Workspace ONE Access Console
    • select Resources
    • Under the Resources > WEB Apps area
      • select NEW
  1. In the New SaaS Application window
    1. In the Definition area
      • under Name
        • enter Unified Access Gateway SAML SP
      • Under Icon
        • select SELECT FILE ...
  1. In the File Explorer > Open window
    • In the Quick Access pane
      • select Desktop
      • in the Desktop area
        • select software > UAG > Icons
          • in the Icons folder
            • select UAG.png
          • select Open
  1. In the New SaaS Application window
    1. In the Definition area
      • Select NEXT
  1. On the ControlCenter server
    • from the Taskbar
      • select the Folder icon
  1. In the File Explorer window
    • from the Quick Access pane
      • select Downloads
  1. In the File Explorer window
    • Downloads folder
      • select corp.euc-livefire.com
        • select & right-click Edit with Notepad++
  1. In the Notepad++ application
    • with your keyboard
      • enter CTRL + A
      • enter CTRL + C
    • switch back to the New SaaS Application wizard
  1. In the New SaaS Application window
    1. In the Configuration area
      • the box below URL / XML
        • paste your corp.euc-livefire.com.xml metadata
      • scroll down the Configuration area to the bottom
        • below Show in User Portal
          • change the Toggle from ON to OFF
      • select NEXT
  1. In the New Saas Application window,
    1. In the Access Policies section
      • Select NEXT
  1. In the New Saas Application window,
    1. In the Summary section
      • Select SAVE & ASSIGN
  1. In the Assign window
    • Under Users / Groups
    • Under Deployment type
      • From the dropdowns
        • Ensure both Sales and Developers are set to
          • Automatic
    • In the bottom right corner
      • select SAVE
  1. In your Workspace ONE Access Console
    • Web Apps interface
      • Note your Unified Access Gateway SAML SP Web APP

As we are not using the Workspace ONE Access Connector to sync entitlements, we will create Deep Links for our Entitlements and assign these to our Security Groups

In this Part we will create Deep Links for existing entitlements

0 Comments

Add your comment

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.