![](//vs1.manuzoid.com/store/data-gzf/0dad1527955aafe27911a94ef8c3acdc/2/002086798.htmlex.zip/bg7.jpg)
Chapter 2
Configuring SAML SSO for Aruba Central
Configuring SAML SSO for Aruba Central
The SSO solution simplifies user management by allowing users to access multiple applications and services
with a single set of login credentials. If the applications services are offered by different vendors, IT
administrators can use the SAMLauthentication and authorization framework to provide a seamless login
experience for their users.
To provide seamless login experience for users whose identity is managed by an external authentication
source, Aruba Central now offers a federated SSO solution based on the SAML 2.0 authentication and
authorization framework. SAML is an XML-based open standard for exchanging authentication and
authorization data between trusted partners; in particular, between an application service provider and
identity management system used by an enterprise. With Aruba Central's SAML SSOsolution, organizations
can manage user access using a single authentication and authorization source.
SAML SSO Solution Overview
The SAML SSO solution consists of the following key elements:
nService Provider (SP)—The provider of a business function or service; For example, Aruba Central. The
service provider requests and obtains an identity assertion from the IdP. Based on this assertion, the
service provider allows a user to access the service.
nIdentity Provider (IdP)—The Identity Management system that maintains identity information of the
user and authenticates the user.
nSAML Request—The authentication request that is generated when a user tries to access the Aruba
Central portal.
nSAML Assertion—The authentication and authorization information issued by the IdP to allow access to
the service offered by the service (Aruba Central portal).
nRelying Party—The business service that relies on SAML assertion for authenticating a user; For
example, Aruba Central.
nAsserting Party—The Identity management system or the IdP that creates SAML assertions for a
service provider.
nMetadata—Data in the XML format that is exchanged between the trusted partners (IdP and Aruba
Central)for establishing interoperability.
nSAML Attributes—The attributes associated with the user; for example, username, customer ID, role,
and group in which the devices belonging to a user account are provisioned. The SAML attributes must be
configured on the IdP according to specifications associated with a user account in Aruba Central. These
attributes are included in the SAML assertion when Aruba Central sends a SAML request to the IdP.
nEntity ID—A unique string to identify the service provider that issues a SAML SSO request. According to
the SAML specification, the string should be a URL, although not required as a URLby all providers.
nAssertion Services Consumer URL—The URL that sends the SAML request and receives the SAML
response from the IdP.
nUser—User with SSO credentials.
SAML SSO | Solution Guide 7