SAML Configuration for MFA and SSO

The Security Assertion Markup Language (SAML) configuration enables administrators to enforce Multi-Factor Authentication (MFA) and configure a Single Sign On (SSO) option for server users to access a server. The configuration also enables users to access the Nexus application: a secure broker that connects VPAM and CPAM servers. When administrators use SAML to enforce MFA and configure the SSO option, the configuration immediately changes the authentication methods on both types of servers.

IMPORTANT:
The SAML configuration changes the authentication method at a server-level and the change is immediate. Imprivata recommends that you follow this procedure in a schedule maintenance session to prevent down-time for your users.
TIP:
Create a local administrator to maintain access to your server in case the configuration locks you out. Remember to contact Imprivata Customer Service if you encounter any problems.

This document contains the requirements and step-by-step guide on how administrators set up SAML to enforce MFA and configure a SSO option for their users.

Requirements

To complete the configuration of SAML for enforcing MFA and providing a SSO option, ensure that you meet the following requirements. If these requirements are not met, the configuration will fail and you risk down-time for your users.

  • Permissions and Access

    • You must be an administrator at server-level to access to the SAML configuration page.

    • You must have access to your Identity Provider (IdP) configuration.

  • Authentication Methods

    • Your Identity Provider (IdP) must be able to request MFA to your users.

    • You must be able to configure MFA with your Identity Provider (IdP).

  • Server Version:

    • Your server must be version 23.1.12. Find your version at the footer of your server's Administrator Console.
      Contact success@imprivata.com to receive assistance in updating your server.

Failing to meet these requirements results in errors during the configuration.

Step-by-Step Guide

The SAML configuration has the following steps:

  1. Download your server's data.

  2. Upload your server's XML to your Identity Provider (IdP).

  3. Configure SSO and MFA in your server and IdP.

  4. Finalize the configuration.

Each step is its own process and administrators must follow each one properly to secure the configuration.

External Links

Imprivata has curated external links that might help you set up your SAML configuration for SSO and MFA. Remember to contact success@imprivata.com for additional assistance.

Customize SAML token claims - Microsoft Entra ID

Enable SAML singe sign-on for an enterprise application - Microsoft Entra ID

REFEDS MFA Profile - REFEDS

A Quick Guide to Onboard Service Provide for SingleSignOn at Stanford - Stanford

How to Configure a Custom SAML App - Okta

Assertions and Protocols for the OASIS Security Assertion Markup Language (SAMLS) V2.0 - OASIS