-
-
-
-
Importing and synchronizing StyleBooks from GitHub repository
-
Simplified migration of Citrix ADC application configuration using StyleBooks
-
-
Use ADM log messages for managing and monitoring your infrastructure
-
-
Citrix ADC automation using Citrix ADM in Cisco ACI hybrid mode
-
Citrix ADC device package in Cisco ACI's cloud orchestrator mode
-
This content has been machine translated dynamically.
Dieser Inhalt ist eine maschinelle Übersetzung, die dynamisch erstellt wurde. (Haftungsausschluss)
Cet article a été traduit automatiquement de manière dynamique. (Clause de non responsabilité)
Este artículo lo ha traducido una máquina de forma dinámica. (Aviso legal)
此内容已经过机器动态翻译。 放弃
このコンテンツは動的に機械翻訳されています。免責事項
이 콘텐츠는 동적으로 기계 번역되었습니다. 책임 부인
Este texto foi traduzido automaticamente. (Aviso legal)
Questo contenuto è stato tradotto dinamicamente con traduzione automatica.(Esclusione di responsabilità))
This article has been machine translated.
Dieser Artikel wurde maschinell übersetzt. (Haftungsausschluss)
Ce article a été traduit automatiquement. (Clause de non responsabilité)
Este artículo ha sido traducido automáticamente. (Aviso legal)
この記事は機械翻訳されています.免責事項
이 기사는 기계 번역되었습니다.책임 부인
Este artigo foi traduzido automaticamente.(Aviso legal)
这篇文章已经过机器翻译.放弃
Questo articolo è stato tradotto automaticamente.(Esclusione di responsabilità))
Translation failed!
SSO Google Apps StyleBook
Google Apps is a collection of cloud computing, productivity and collaboration tools, software and products that are developed by Google. Single Sign-On (SSO) enables users to access all of their enterprise cloud applications—including administrators signing in to the admin console—by signing in one time for all services using their enterprise credentials.
The Citrix ADM SSO Google Apps StyleBook allows you to enable SSO for Google Apps through Citrix ADC instances. The StyleBook configures the Citrix ADC instance as a SAML identity provider for authenticating users to access Google Apps.
Enabling SSO for Google apps in a Citrix ADC instance using this StyleBook results in the following steps:
- Configuring the authentication virtual server
- Configuring a SAML IdP policy and profile
- Binding the policy and profile to the authentication virtual server
- Configuring an LDAP authentication server and policy on the instance
- Binding the LDAP authentication server and policy to your authentication virtual server configured on the instance
Configuration details:
The table below lists the minimum required software versions for this integration to work successfully. The integration process will also supports the higher versions of the same.
Product | Minimum Required Version |
---|---|
Citrix ADC | Release 11.0, Advanced/Premium License |
The following instructions assume that you have already created the appropriate external or internal DNS entries to route authentication requests to a Citrix ADC-monitored IP address.
Deploying SSO Google apps StyleBook configurations:
The following task assists you in deploying the Microsoft SSO Google Apps StyleBook in your business network.
To deploy SSO Google apps StyleBook
-
In Citrix ADM, navigate to Applications > Configurations > StyleBooks. The StyleBooks page displays all the StyleBooks available for your use in Citrix ADM. Scroll down and find SSO Google Apps StyleBook. Click Create Configuration.
-
The StyleBook opens as a user interface page on which you can enter the values for all the parameters defined in this StyleBook.
-
Enter values for the following parameters:
-
Application Name. Name of the SSO Google apps configuration to deploy in your network.
-
Authentication Virtual IP address. Virtual IP address used by the authentication, authorization, and auditing virtual server to which the Google apps SAML IdP policy is bound.
-
SAML Rule Expression. By default, the following Citrix ADC Policy (PI) expression is used: HTTP.REQ.HEADER(“Referrer”).CONTAINS(“google”). Update this field with another expression if your requirement is different. This policy expression matches the traffic to which these SAML SSO settings are applied and makes sure that the Referrer header is coming from a Google domain.
-
-
The SAML IdP Settings section allows you to configure your Citrix ADC Instance as a SAML identity provider by creating the SAML IdP profile and policy that is used by the authentication, authorization, and auditing virtual server created in step 3.
-
SAML Issuer Name. In this field, enter the public FQDN of your authentication virtual server. Example:
https://<Citrix ADC Auth VIP>/saml/login
-
SAML Service Provider (SP) ID. (optional) Citrix ADC identity provider accepts SAML authentication requests from an issuer name that matches this ID.
-
Assertion Consumer Service URL. Enter the service provider’s URL where Citrix ADC identity provider needs to send the SAML assertions after successful user authentication. The assertion consumer service URL can be initiated at the identity provider server site or the service provider site.
-
There are other optional fields that you can enter in this section. For example, you can set the following options:
-
SAML binding profile (the default is the “POST” profile).
-
Signature algorithm to verify/sign SAML requests/responses (default is “RSA-SHA1”).
-
Method to digest hash for SAML requests/responses (default is “SHA-1”).
-
Encryption algorithm (default is AES256), and other settings.
Note
Citrix recommends that you retain the default settings as these settings have been tested to be compatible with Google Apps.
-
-
You can also enable User Attributes check box to enter the user details such as:
-
Name of the user attribute
-
Citrix ADC PI expression that is evaluated to extract the attribute’s value
-
User-friendly name of the attribute
-
Select the format of the user attribute.
These values are included in the issued SAML Assertion. You can include as many as five sets of user attributes in an Assertion issued by Citrix ADC using this StyleBook.
-
-
-
In LDAP Settings section, enter the following details to authenticate Google Apps users. For domain users to be able to log on to the Citrix ADC instance by using their corporate email addresses, you must configure the following:
-
LDAP (Active Directory) Base. Enter the base domain name for the domain in which the user accounts reside within the Active Directory (AD) for which you want to allow authentication. For example,
dc=netscaler
,dc=com
-
LDAP (Active Directory) Bind DN. Add a domain account (using an email address for ease of configuration) that has rights to browse the AD tree. For example,
cn=Manager,dc=netscaler,dc=com
-
LDAP (Active Directory) Bind DN Password. Enter the password of the domain account for authentication.
-
A few other fields that you need to enter in this section are as follows:
-
LDAP server IP Address that Citrix ADC connects to for authenticating users
-
LDAP server’s FQDN name
Note
You must specify at least one of the above two - the LDAP server IP address or the FQDN name.
-
LDAP server port that Citrix ADC connects to for authenticating users (default is 389).
-
LDAP host name. This is used to validate the LDAP Certificate if validation is turned on (by default, it is turned off).
-
LDAP login name attribute. The default attribute used to extract login names is “sAMAccountName.”
-
Other optional miscellaneous LDAP settings
-
-
-
In SAML IdP SSL Certificate section, you can specify the details of the SSL certificate:
-
Certificate Name. Enter the name of the SSL certificate.
-
Certificate File. Choose the SSL certificate file from the directory on your local system or on Citrix ADM.
-
CertKey Format. Select the format of the certificate and the private-key files from the drop-down list box. The formats supported are .pem and .der extensions.
-
Certificate Key Name. Enter the name of the certificate private key.
-
Certificate Key File. Select the file containing the private key of the certificate from your local system or from Citrix ADM.
-
Private Key Password. If your private key file is protected by a passphrase, enter it in this field.
-
You can also enable Advanced Certificate Settings check box to enter details such as certificate expiry notification period, enable or disable the certificate expiry monitor.
-
-
Optionally, you can select IdP SSL CA Certificate if the SAML IdP Certificate entered above requires a CA public Certificate to be installed on Citrix ADC. Make sure you select “Is a CA Certificate” in the advanced settings.
-
Optionally, you can select SAML SP SSL Certificate to specify Google SSL certificate (public key) used to validate authentication requests from Google Apps (SAML SP).
-
Click Target Instances and select the Citrix ADC instance(s) on which to deploy this Google Apps SSO configuration. Click Create to create the configuration and deploy the configuration on the selected Citrix ADC instance(s).
Note
You can also click the refresh icon to add recently discovered Citrix ADC instances in Citrix ADM to the available list of instances in this window.
Also,
Tip
Citrix recommends that before running the actual configuration, you select Dry Run to visually confirm the configuration objects that are created on the target Citrix ADC instance(s) by the StyleBook.
Share
Share
In this article
This Preview product documentation is Cloud Software Group Confidential.
You agree to hold this documentation confidential pursuant to the terms of your Cloud Software Group Beta/Tech Preview Agreement.
The development, release and timing of any features or functionality described in the Preview documentation remains at our sole discretion and are subject to change without notice or consultation.
The documentation is for informational purposes only and is not a commitment, promise or legal obligation to deliver any material, code or functionality and should not be relied upon in making Cloud Software Group product purchase decisions.
If you do not agree, select I DO NOT AGREE to exit.