Radiant Logic RadiantOne FID 7.3.12 - Identity Source with CAS Configuration - SecurID Access Implementation Guide
2 years ago
Originally Published: 2021-09-28

Radiant Logic RadiantOne FID 7.3.12 - Identity Source with CAS Configuration - SecurID Access Implementation Guide

This section describes how to integrate Radiant Logic RadiantOne FID HDAP Store with SecurID Access Cloud Authentication Service as an identity source.

Architecture Diagram

Admin_Dharani_0-1632855674085.png

 

 

Configure Radiant Logic RadiantOne FID

Follow the steps below to enable paged results, get the user base DN for the sample data in HDAP Store and to get the default server SSL certificate included with Radiantone FID required for establishing secure ldap connection.

Procedure

1. Log on to the RadiantOne Main Control Panel as directory administrator.

Admin_Dharani_1-1632855718962.png

 

2. Go to Settings > Server Front End > Supported Controls and select Enable paged results and click Save.

Admin_Dharani_2-1632855819983.png

 

3. Click on Directory Browser tab, browse to o=companydirectory (HDAP store) and note down the DN for any of the sample OUs, for example "ou=Accounting,o=companydirectory".

Admin_Dharani_0-1632928815490.png

 

4. Click vds_server on the Main Control Panel bar to open the Server Control Panel.

Admin_Dharani_1-1632929026381.png

 

5. On the Server Control Panel, click on the Settings tab and click on View button to view server certificate.

Admin_Dharani_2-1632929058298.png

 

 

6. On Certificate Details windows, click Save to File button and save the certificate to file.

Admin_Dharani_3-1632929145302.png

 

 

Configure SecurID Access Cloud Authentication Service

Follow the steps below to add RadiantOne FID HDAP Store as identity source to SecurID Access Cloud Authentication Service(CAS).

1. Log in to the SecurID Access Administration Console.

2. Navigate to Users > Identity Sources.

Admin_Dharani_4-1632929324068.png

 

3. Click on Add an Identity Source.

Admin_Dharani_5-1632929344411.png

 

4. For New Identity Source type, select LDAP.

Admin_Dharani_6-1632929456535.png

 

5. For Identity Source Details, under Basic Information section, enter name in the Identity Source Name field.

Admin_Dharani_7-1632929529315.png

 

6. Under Connection Settings section,

  • For Root, enter the value of the DN for the sample OU obtained in step 3 in previous section.
  • for User Tag (SSO Agent Only), enter UID.

    Admin_Dharani_8-1632929566849.png

     

7. Under Directory Servers, click ADD.

Admin_Dharani_9-1632929671235.png

 

8. On the Directory Server window, specify the following and click Save.

  • Server field - enter either IP address or hostname of the FID directory server.
  • Port - 636.
  • Cluster - select the cluster in which this identity source is configured.
  • Username - Directory Administrator name.
  • Password - Directory Administrator password.

Admin_Dharani_10-1632929810322.png

 

9. Under SSL/TLS Certificates (optional) section, enable checkbox for both Use SSL/TLS encryption to connect to the directory servers and Allow Users to Change Passwords and click Add.

Admin_Dharani_11-1632929851984.png

 

10. Browse and upload the certificate obtained in step 6 in previous section and make sure certificate is added successfully.

Admin_Dharani_12-1632929983640.png

 

11. Under Directory Servers, click on Test Connection option.

Admin_Dharani_13-1632930016662.png

 

12. Make sure Test Connection is successful, directory attributes are displayed under Results and click Close.

Admin_Dharani_14-1632930046157.png

 

13. Click Next Step.

Admin_Dharani_15-1632930073023.png

 

14. Under User Atttibutes section, click on Refresh Attributes.

Admin_Dharani_16-1632930115472.png

 

15. Enable Synchronize the selected policy attributes with the Cloud Authentication Service and then enable check boxes for Policies and Apps for attributes that need to be synchronized with Cloud Authentication Service.

Admin_Dharani_17-1632930136430.png

 

16. Then click Next Step.

Admin_Dharani_18-1632930181553.png

 

17. Under Synchronize User Attributes section, specify the following and click Save and Finish.

  • First Name: givenname
  • Primary Usename: uid
  • Last Name: sn
  • Primary Unique Identifier: entryDN
  • Email Address: mail
  • Secondary Unique Identifier: employeeNumber
  • User Account Status: nsAccountLock

Admin_Dharani_19-1632930211683.png

 

Note:  nsAccountLock has to be set on the server manually by administrator to lock the user account. During client side password lockout, pwdAccountLockedTime attribute is set for the user and indicates the time at which account was locked and is managed by the FID server. For more information please refer to FID documentation.

18. Click on Publish Changes.

Admin_Dharani_20-1632930244195.png

 

19. Under Identity Sources, for the FID directory Server, from the Edit drop-down, select Synchronization.

Admin_Dharani_21-1632930279862.png

 

20. On the Synchronization Page, click Synchronize Now.

Admin_Dharani_22-1632930313745.png

 

21. Wait for sometime and click Refresh Status.

Admin_Dharani_23-1632930347161.png

 

22. Make sure Synchronization is completed successfully and users are added.

Admin_Dharani_24-1632930373174.png

 

23. Navigate to Users > Management.

Admin_Dharani_25-1632930445528.png

 

24. Search for any user from the directory server and make sure user information is displayed.

Admin_Dharani_26-1632930466356.png

 

 

Configuration is complete.

 

Return to the main page for more certification related information.