15 | Configuring SAML SSO for Aruba Central Aruba Central | Solution Guide
nEntity ID—A unique string that identifies the service provider that issues a SAML SSO request. According to
the SAML specification, the string should be a URL, although not required as URLby all providers.
nAssertion Services Consumer URL—The URL that sends SAML SSO login requests and receives
authentication response from the IdP.
nNameID—The NameID attribute must include the email address of the user.
<NameID>johnnyadmin1@adfsaruba.com</NameID>
nIf the NameID attribute does not return the email address of the user, you can use the aruba_user_email
attribute. Ensure that you configure the NameID or the aruba_user_email attribute for each user.
nSAML Attributes—The following example shows the syntax structure for SAML attributes:
#customer 1
aruba_1_cid = <customer-id>
# app1, scope1
aruba_1_app_1 = central
aruba_1_app_1_role_1 = <readonly>
aruba_1_app_1_role_1_tenant = <admin>
aruba_1_app_1_group_1 = groupx, groupy
aruba_1_app_2 = device_profiling
aruba_1_app_2_role_1 = <readonly>
aruba_1_app_3 = account_setting
aruba_1_app_3_role_1 = <readonly>
#customer 2
aruba_2_cid = <customer-id>
# app1, scope1
aruba_2_app_1 = central
aruba_2_app_1_role_1 = <readonly>
aruba_2_app_1_role_1_tenant = <admin>
aruba_2_app_1_group_1 = groupx, groupy
aruba_2_app_2 = device_profiling
aruba_2_app_2_role_1 = <readonly>
aruba_2_app_3 = account_setting
aruba_2_app_3_role_1 = <readonly>
Note the following points when defining SAML attributes in the IdP server:
lcid—Customer ID. If you have multiple customers, define attributes separately for each customer ID.
lapp—Application. Set the value as per the following:
lNetwork Operations—central
lClear Pass Device Insight—device_profiling
lAccount Home—account_setting
lrole—User role. Specify the user role. If no role is defined, Aruba Central assigns read-only role to the
user.
ltenant role—Tenant user role. If the tenant role is not defined in the IdP, the MSP role is assigned to
the SAML user.
lgroup—Group in Aruba Central. When a group is specified in the attribute, the user is allowed to access
only the devices in that group. If the attribute does not include any group, Aruba Central allows SAML
SSO users to access all groups. You can also configure custom attributes to add multiple groups if the
user requires access to multiple groups.
Aruba Central recommends you to configure the Account Home. However, If you do not return the Account Home
application from the Idp, then the Network Operations role is applied by default.
See Also:
nConfiguring Service Provider Metadata in Microsoft ADFS on page 16