Chapter 2
Configuring SAML SSO for Aruba Central
Configuring SAML SSO for Aruba Central
The Single Sign On (SSO)solution simplifies user management by allowing users to access multiple
applications and services with a single set of login credentials. If the applications services are offered by
different vendors, IT administrators can use the SAMLauthentication and authorization framework to
provide a seamless login experience for their users.
To provide seamless login experience for users whose identity is managed by an external authentication
source, Aruba Central now offers a federated SSO solution based on the SAML 2.0 authentication and
authorization framework. SAML is an XML-based open standard for exchanging authentication and
authorization data between trusted partners; in particular, between an application service provider and
identity management system used by an enterprise. With Aruba Central's SAML SSOsolution, organizations
can manage user access using a single authentication and authorization source.
SAML SSO Solution Overview
The SAML SSO solution consists of the following key elements:
nService Provider (SP)—The provider of a business function or service; For example, Aruba Central. The
service provider requests and obtains an identity assertion from the IdP. Based on this assertion, the
service provider allows a user to access the service.
nIdentity Provider (IdP)—The Identity Management system that maintains identity information of the user
and authenticates the user.
nSAML request—The authentication request that is generated when a user tries to access the Aruba Central
portal.
nSAML Assertion—The authentication and authorization information issued by the IdP to allow access to the
service offered by the service (Aruba Central portal).
nRelying Party—The business service that relies on SAML assertion for authenticating a user; For example,
Aruba Central.
nAsserting Party—The Identity management system or the IdP that creates SAML assertions for a service
provider.
nMetadata—Data in the XML format that is exchanged between the trusted partners (IdP and Aruba
Central)for establishing interoperability.
nSAML attributes—The attributes associated with the user; for example, username, customer ID, role, and
group in which the devices belonging to a user account are provisioned. The SAML attributes must be
configured on the IdP according to specifications associated with a user account in Aruba Central. These
attributes are included in the SAML assertion when Aruba Central sends a SAML request to the IdP.
nEntity ID—A unique string to identify the service provider that issues a SAML SSO request. According to the
SAML specification, the string should be a URL, although not required as a URLby all providers.
nAssertion Services Consumer URL—The URL that sends the SAML request and receives the SAML response
from the IdP.
nUser—User with SSO credentials.
Aruba Central | Solution Guide 6