VMware Workspace One: Imprivata Web SSO with OpenID Connect Setup

Configuring Imprivata Web SSO with OpenID Connect establishes trust between Imprivata as the Identity Provider (IdP) and VMware Workspace One as the Relying Party (RP).

Add VMware Workspace One as OpenID Connect Application

Only the superadmin role is able to configure Web SSO application profiles:

  1. In the Imprivata Admin Console, go to Applications > Single sign-on application profiles.

    All Single sign-on application profiles, including conventional Imprivata APG profiles, Mobile app profiles, and SAML application profiles, are all managed from this page.

  2. Click Add App Profile Web application using OpenID Connect. The Add web application using OpenID Connect page opens.

  3. Give the application profile a name. This name is visible only to administrators.

    Give the application a user-friendly name. This is the name your users will see when they log in.

  4. Click Generate client credentials. Copy the Client ID and Client Secret values locally.

  5. Click View and copy Imprivata (IdP) OpenID Connect metadata. Copy the Metadata URL locally.

    Leave the Imprivata Admin Console open; Open VMware Workspace One in another window.

NOTE:

The IdP certificate for your Imprivata enterprise expires two years after it is enabled. You will receive an alert on the Imprivata Admin Console beginning 60 days before it expires. When the Service Provider or Relying Party certificate is expiring for a web app enabled for Web SSO, you will receive an alert 90 days in advance.

VMware Workspace One: Identity Provider Configuration

  1. In the VMware Workspace One console, confirm you are in Manage mode.

  2. Navigate to the Identity & Access Management tab > Identity Providers.

  3. Click Add Identity Provider and select Create OpenID Connect IDP.

  4. On the next page, provide the following information:

    • Identity Provider Name: a label for your Imprivata IdP configuration

    • Authentication Configuration: keep Automatic Discovery set, and provide the Imprivata IdP metadata URL in the Configuration URL

    • Enter the Client ID and Client Secret you saved earlier.

    • User Lookup Attribute: Specify how VMware Workspace One will map users. Use email → email.

    • Just-in-Time User Provisioning: unchecked

    • Authentication Method Name: this name will appear in authentication policy configuration.

    • Pass through Claims: unchecked

    • Copy the Redirect URI from WMware Workspace One and enter it in the Imprivata Admin Console.

  5. Click Save.

VMware Workspace One — Create Authentication Policy

Configure the authentication policy to enable user authentication using the newly created Imprivata IdP:

  1. Go to the Identity & Access Management tab > Policies.

  2. Click Add Policy.

  3. On the new page, provide a policy name, and click Next.

  4. Click Add Policy Rule

  5. On the new page, fill in the following fields:

  • If a user's network range is: ALL RANGES

  • and the user accessing content from: you can select All Device Types or be specific, like Android or Windows.

  • and user belongs to group(s): leave this field unfilled to apply the policy to all users

  • Then perform this action: Authenticate using...

  • then the user may authenticate using: select the authentication method name you created for Imprivata IdP earlier.

  • If the preceding method fails or is not applicable, then: Select a fallback authentication method

6. Click Save, then Next and Save again

Optional — VMware Workspace One as Proxy

You can also set up VMware Workspace One as a proxy, when a target application is configured to authenticate against VMware Workspace One using OpenID Connect, and VMware Workspace One delegates authentication to Imprivata as the external OpenID Connect provider.

  1. In the VMware Workspace One console, navigate to the Catalog tab, and click New.

  2. Create a SaaS application using predefined settings from the catalog, or create settings manually.

  3. During the application configuration, ensure that your IdP policy is set as the Access Policy for this application.

  4. Save the application.

  5. Assign users to the created application: Go to the application and click Assign.

  6. Select the users or groups to assign.

  7. Click Save.

Deploy Imprivata Web SSO App Profile

  1. In the Imprivata Admin Console, click Save.

    After you are redirected to the Single sign-on application profiles page, select your new Application profile, and click Deploy.

IT Pilot — Deploy to Select Users

Imprivata Web SSO application profiles offer flexible deployment options.

Deploy your profile to select users for testing:

  1. In the Imprivata Admin Console, go to ApplicationsSingle sign-on application profiles, find your App Profile, and click Not Deployed.

  2. Click Deploy This Application?

  3. Un-check Deploy to All Users and Groups.

  4. Check the domain your test users are located in.

  5. Check These OUs, groups and users

  6. Specify your test users.

  7. Click Save.

  8. On the list of application profiles, check the box next to the profile and click Deploy.

Deploy To Users and Groups

Imprivata Web SSO application profiles offer flexible deployment options.

Deploy your profile to specific OUs, users, and groups as needed:

  1. In the Imprivata Admin Console, go to ApplicationsSingle sign-on application profiles, find your App Profile, and click Not Deployed or Not Deployed.
  2. Check Deploy This Application.
  3. You can Deploy to All Users and Groups, or uncheck this option and deploy to select OUs, users, and groups.
  4. Check the domain your users are located in.
  5. Select For All Users (in this domain) or check These OUs, groups and users
  6. Select specific OUs, groups, and users as needed.
  7. Click Save.
  8. On the list of application profiles, check the box next to the profile and click Deploy.

For complete details, see Deploying Application Profiles.

NOTE:

All Imprivata users synced to the same domain in Active Directory as the Service Provider or Relying Party users, who are licensed for Single Sign On with Imprivata, will immediately be able to log into the Web SSO app using their username and password authenticated by Imprivata Web SSO.

When the workstation has the Imprivata agent online and the user is already logged into the workstation, the user will not be prompted for their credentials.

For complete Web SSO workflow details, see Expected Endpoint Workflows.

Expected Endpoint Workflows

The expected Imprivata Web SSO workflow has the following variations:

Imprivata Agent Online

  1. The user logs into desktop with Imprivata OneSign.

  2. The user provides the URL for an app enabled for Imprivata Web SSO.

  3. The app opens. The user does not need to log into it manually.

    Subsequent apps are automatically authenticated within the same browser and the same session.

    If the user closes an app without logging out of the app, he can return to the app during the same session without logging in again.

Imprivata Agent Not Present or Unavailable

  1. The user provides the URL for an app enabled for Imprivata Web SSO.

  2. The user is prompted to log in:

    • If the enterprise does not have an Imprivata Confirm ID Remote Access license, he will be prompted to authenticate with username and password.
    • If the user is included in a user policy associated with the Imprivata Confirm ID Remote Access Log In workflow, he will be prompted to complete the Log In workflow.
    • If the user is not included in a user policy associated with the Imprivata Confirm ID Remote Access Log In workflow, he will be prompted to authenticate with username and password.
  3. The app opens.

    Subsequent apps are automatically authenticated within the same browser and the same session.

    If the user closes an app without logging out of the app, he can return to the app during the same session without logging in again.

Imprivata Web SSO on a Imprivata-enabled Mobile Device

  1. The user logs into the device with Imprivata OneSign.

  2. The user launches an app enabled for Imprivata Web SSO.

  3. The user is prompted to authenticate.

  4. The app opens. The user does not need to log into it manually.

    Subsequent apps are automatically authenticated within the same browser and the same session.

    If the user closes an app without logging out of the app, he can return to the app during the same session without logging in again.

Imprivata Web SSO on an Unsupported Browser

The expected Imprivata Web SSO workflow on any unsupported browser is the same as when the Imprivata agent is not present or unavailable:

  1. The user provides the URL for an app enabled for Imprivata Web SSO.

  2. The user is prompted to log in:

    • If the enterprise does not have an Imprivata Confirm ID Remote Access license, he will be prompted to authenticate with username and password.
    • If the user is included in a user policy associated with the Imprivata Confirm ID Remote Access Log In workflow, he will be prompted to complete the Log In workflow.
    • If the user is not included in a user policy associated with the Imprivata Confirm ID Remote Access Log In workflow, he will be prompted to authenticate with username and password.
  3. The app opens.

    Subsequent apps are automatically authenticated within the same browser and the same session.

    If the user closes an app without logging out of the app, he can return to the app during the same session without logging in again.

For details on supported browsers, see Imprivata OneSign Supported Components.

When Another User Logs In

When a subsequent user logs into a workstation, the Imprivata agent terminates the IdP session of the previous user.

Imprivata Web SSO cannot terminate user sessions:

  • In unsupported browsers;
  • On workstations where the Imprivata agent is not present or unavailable;
  • For applications not enabled for Imprivata Web SSO;
  • For OIDC applications that track the RP session with a persistent cookie.
BEST PRACTICE:

Implement Single Log Out for your Web SSO-enabled applications (where supported);

Turn off persistent cookies for Service Providers and Relying Parties; this prevents a user from accessing another user's session after a Fast User Switch.

Manually log out of applications where Imprivata Web SSO cannot terminate the user session;

Close browser windows.

Optional — Web Login Customization

Configure the appearance of the web login application screens with the logo and color of your enterprise, and set a custom session log out value:

  1. In the Imprivata Admin Console, go to the gear iconWeb app login configuration

    • Select a background color for the login screen (hexidecimal value);
    • Upload a PNG, GIF, or JPG logo (200 x 150 pixels, 250 KB max)
  2. User sessions are logged out after 2 hours by default. Turn off this automatic logout, or select a value between 30 minutes and 4 days.
  3. Click Save.