Configure NetScaler Gateway SAML to Google with Citrix Federated Authentication
Prerequisites
Description | |
* | Citrix FAS Service installation |
* | XA/XD 7.6 or newer |
* | StoreFront 3.6 or newer (I’ve tested with 3.9) |
* | SAML Provider acting as the iDP (Google in this instance) |
* | NetScaler Gateway configured as the SAML Service Provider (SP) |
* | Active Directory Certificate Services |
* | Access to edit Windows GPOS and OUs to assign the CFAS service its service location |
Install The Citrix Federated Authentication Service (CFAS)
Step | Description | Screenshot |
Mount the XA/XD ISO on your server and select the Federated Authentication Service | ||
Read the license agreement and make your choice | ||
Click Next | ||
Click Next | ||
Click Install | ||
Click Finish | ||
Create the GPO to point the FAS server to itself (see step 9)
When the GPO exists the ‘address’ field will be filled in for you automatically |
||
Copy the Citrix ADMX files from C:\Program Files\Citrix\Federated Authentication to Active Directory
c:\windows\policydefinitions Service\PolicyDefinitions |
to |
|
Edit group policy to have the server point to itself for FAS
open gpmc.msc browse to Computer > Administrative Templates: Policy> Citrix Components > Authentication Enter the DNS server address of the server hosting the FAS service (as per screenshot) Note: the VDA(s), the StoreFront and the FAS server all need to have this policy applied |
||
run gpupdate /force | ||
Right click the CFAS Administration console and always Run As Administrator | ||
You should now have the CFAS server listed
Click OK |
||
Click on Step 1 – Start Button | ||
Click OK | ||
You can verify the creation of the templates in ADCS | ||
Once this is completed without errors click Start on Step 2 | ||
Click OK | ||
Finally click Start on Step 3 | ||
Click OK | ||
The console is waiting for the request to be approved (issued) from the AD Certificate Services | ||
Log into the ADCS and Approve the pending Certificate request
Right click the Pending request Select All Tasks Select Issue |
||
Step 3 will go green | ||
Click the User Rules tab and configure CA, CT and Access Control Lists if appropriate | ||
Click Edit and Add the StoreFront Server to be able to use the ‘rule’
Remove domain computers as they will be set to ‘deny’ |
||
Click Apply |
Create NetScaler SAML Policy to 3rd Party iDP (Google)
In this section we will create a new SAML Policy for the NetScaler to use Google as the SAML iDP.
Note: this cannot currently be bound to a Gateway when using the NetScaler RFWebUI ‘theme’.
Step | Description | Screenshot |
Connect to admin.google.com | ||
Click Apps | ||
Click SAML Apps | ||
Click the + to add a new SAML Application | ||
Select Setup my own custom app | ||
Take note of the IDP data you are provided and copy and paste your URL
Be sure to DOWNLOAD the Certificate and save this for uploading to the NetScaler later. |
||
Describe your new app | ||
Note: the default ACS URL for the NetScalers must have a trailing /cgi/samlauth | ||
Click Finish | ||
Summary of the App SSO Setup in the Google admin panel | ||
Be sure to enable the new Application
click the three dots … Select ON for everyone Note: this new configuration will take up to 24 hours to be available. Prior to this being ready you may get a ‘user not found’ message. |
||
Note: users will have access to a shortcut to this new app in their Google Console | ||
Upload the Google IDP Certificate to the NetScaler | ||
Install the CA Certificate | ||
Here you can see the certificate installed as another CA Certificate | ||
Expand NetScaler > Security>AAA – Application Traffic>Policies>Authentication>Basic Policies>SAML>Policies>Servers
Enter appropriate details for your new SAML profile Note: the redirect URL and Single Logout URL will be unique to your Google account |
||
Create a new SAML Authentication Policy
set the expression of this policy to ns_true Link that to the newly created Google SAML Server |
||
Bind this policy to your NetScaler Gateway
Click the + against Basic Authentication Note: You may need to remove other Authentication policies (like LDAP) from the bound authentication before adding the SAML policy as the Primary method. |
||
Choose SAML
Choose Primary Click Continue |
||
Select the SAML binding | ||
Edit the NetScaler Gateway Session Profile (Session Server) and blank the Single Sign On Domain field
NetScaler Gateway > Click Session Policies |
||
Select the policy and edit the profile | ||
Ensure Single Sign-on Domain is empty | ||
Ensure your google email matches your AD User Logon Name | ||
If not you can add a new UPN for the domain from Active Directory Domains and Trusts | ||
Add any Additional UPN suffix you may require to match your google email sign-in |
Configure StoreFront to Delegate Authentication to NetScaler
Step | Description | Screenshot |
Open Citrix Studio or StoreFront management | ||
Select your Store and left click Manage Authentication Methods | ||
Click Passthrough from NetScaler Gateway > Configure Delegated Authentication | ||
Click OK | ||
Note: You will need to trust requests sent to the DDC XML Ports for all DDC Servers.
RDP to each Delivery Controller as a Citrix or local administrator Open Powershell type ‘asnp Citrix*’ type ‘Set-BrokerSite -TrustRequestsSentToTheXmlServicePort $true’ |
Set-BrokerSite -TrustRequestsSentToTheXmlServicePort $true |
|
Note: You can verify if this was successful by running get-brokersite |
If you want to learn more about Citrix NetScaler check out our online NetScaler course at www.mastersof.cloud
Sign-up to the Mastersof.cloud mailing list below to receive a free 200 page Citrix NetScaler Introduction guide!
[mc4wp_form id=”2763″]