This document describes how to set up multi-factor authentication (MFA) for Crucible with AuthPoint as an identity provider. Crucible must already be configured and deployed before you set up MFA with AuthPoint.
Crucible does not support SAML authentication. To use SAML MFA for Crucible, you must install the SAML Single Sign On for FishEye/Crucible (by miniOrange) add-on.
This integration was tested with version 4.5.3 of Crucible.
Crucible Authentication Data Flow with AuthPoint
AuthPoint communicates with various cloud-based services and service providers with the SAML protocol. This diagram shows the data flow of an MFA transaction for Crucible .
Before You Begin
Before you begin these procedures, make sure that:
- You have installed the SAML Single Sign On for FishEye/Crucible (by miniOrange) add-on
- End-users can log in to Crucible
- A token is assigned to a user in AuthPoint
- You have an AuthPoint identity provider (IdP) certificateAn AuthPoint IdP certificate is required for SAML authentication. (see Certificate Management)
To start, you must download the metadata file from the Resources page in the AuthPoint management UI. Once you have those, you can configure Crucible.
From the WatchGuard Cloud web UI:
- From the navigation menu, select Configure > AuthPoint. If you have a Service Provider account, you must first pivot to your Subscriber view.
- Select Resources.
- Click Certificate.
- Next to AuthPoint certificate you will associate with your resource, click and select Download Metadata.
We recommend that you choose the certificate with the latest expiration date.
The AuthPoint metadata provides your resource, in this case Crucible, with information necessary to identify AuthPoint as a trusted identity provider.
- Log in to Crucible as an administrator.
- Select Settings > Administration.
- Select Security Settings > SAML SSO Configuration.
- Go to the miniOrange SAML Single Sign-On Configuration page.
- Select Configure IDP. Leave the default settings.
- For Step 1, click Save.
- Select Configure SP.
- Click Import from Metadata.
- From the Select IDP drop-down list, select Import From Metadata File.
- Click Choose File and select the AuthPoint metadata file.
- Click Upload.
- Select Configure IDP.
- Copy the SP Entity ID / Issuer and ACS URL values. These values are needed when you create a SAML resource in AuthPoint.
- (Optional) Add users in Crucible. Crucible users must have the same user name and email that they do for AuthPoint.
Your Crucible server must have a public domain name or public IP address so AuthPoint can communicate with the Crucible server.
Before AuthPoint can receive authentication requests from Crucible, you must specify the Crucible client as a SAML resource in AuthPoint. You must also assign the Crucible resource to the AuthPoint user group that will authenticate through Crucible.
Add a Crucible Resource in AuthPoint
From the AuthPoint management UI:
- From the navigation menu, select Resources.
- From the Choose a Resource Type drop-down list, select SAML. Click Add Resource.
- In the Service Provider Entity ID text box, paste the SP Entity ID / Issuer value from Crucible.
- In the Assertion Consumer Service text box, paste the ACS URLvalue from Crucible.
- From the User ID drop-down list, select User name .
- Click Save.
Add an Access Policy to AuthPoint
You must have at least one user group in AuthPoint for authentication with Crucible , and you must assign an access policy for the Crucible resource to that group. If you already have a group, you do not have to add another group.
In the AuthPoint management UI:
- From the navigation menu, select Groups.
- To add a new group, click Add Group. If you already have a group that you want to use, select the group to edit it.
- In the Name text box, type a descriptive name for the group.
- (Optional) In the Description text box, type a description of the group.
- In the Access Policy section, click Add Policy.
- In the Add Policy dialog box, from the Resource drop-down list, select the resource you want to add an access policy for.
- (Optional) To require that users type their password before they authenticate for this resource, select the Require Password Authentication slider.
- Select the authentication options that users in this group can choose from when they authenticate.
For SAML resources, if you select more than one authentication option, users must choose one of the available options when they authenticate. For example, if you select OTP and Push, users can choose to type their OTP or approve a push to authenticate. You cannot require that they do both.
- Click Add.
- (Optional) Add one or more safe locations to your group. For more information about safe locations and detailed instructions to add them, see About Safe Locations.
- Click Save.
Before you assign users to a group, you must add them to AuthPoint. You can manually add user accounts or import user accounts from your LDAP database. For more information on how to add user accounts, see Add User Accounts.
Test the Integration
To test the integration of AuthPoint and your configuration of Crucible, you can authenticate with your mobile device. You can choose any method (one-time password, QR code, or push).
In this example, we show the push authentication method (users receive a push notification in the mobile app that they must approve to authenticate).
- In a web browser (we recommend Chrome), go to the Crucible URL.
- Click Use Corporate Login.
- Type your email address or AuthPoint user name. Click Next.
- If required, in the Password text box, type your AuthPoint password.
- For the authentication method, select Push.
- Click Send.
- Approve the authentication request that is sent to your mobile device.