After enabling VMware Identity Services for your Workspace ONE tenant, set up the integration with your SCIM 2.0-based identity provider.
- In the VMware Identity Services Getting Started wizard, click Start in step 2, Integrate a SCIM 2.0-Based Identity Provider.
- Click Set Up on the SCIM 2.0 Identity Provider card.
- Follow the wizard to set up the integration with your identity provider.
Step 1: Create a Directory
As the first step in setting up user provisioning and identity federation with VMware Identity Services, create a directory in the Workspace ONE console for users and groups provisioned from your identity provider.
Procedure
What to do next
Set up user and group provisioning.
Step 2: Set up User and Group Provisioning
After you create a directory in VMware Identity Services, set up user and group provisioning. You start the process in VMware Identity Services by generating the admin credentials required for provisioning, then configure provisioning in the identity provider using those credentials.
Prerequisites
You have an administrator account in the identity provider with the privileges required to set up user provisioning.
Procedure
What to do next
Return to the Workspace ONE console to continue with the VMware Identity Services wizard.
Step 3: Map SCIM User Attributes
Map the user attributes to synchronize from your identity provider to Workspace ONE services. In your identity provider console, add the required SCIM user attributes and map them to your identity provider attributes. At a minimum, synchronize the attributes that VMware Identity Services and Workspace ONE services require.
VMware Identity Services and Workspace ONE services require the following SCIM user attributes:
- userName
- emails
- name.givenName
- name.familyName
- externalId
- active
For more information about these attributes and their mapping to Workspace ONE attributes, see User Attribute Mapping for VMware Identity Services.
In addition to the required attributes, you can synchronize optional attributes and custom attributes. For the list of supported optional and custom attributes, see User Attribute Mapping for VMware Identity Services.
Procedure
- In the Workspace ONE console, in step 3, Map SCIM User Attributes, of the VMware Identity Services wizard, review the list of attributes that VMware Identity Services supports.
- In your identity provider admin console, navigate to the provisioning configuration for Workspace ONE.
- Navigate to the attribute mapping page.
- Map the required SCIM user attributes to your identity provider attributes.
- Add and map optional and custom SCIM user attributes, as needed.
What to do next
Return to the Workspace ONE console to continue with the VMware Identity Services wizard.
Step 4: Select the Authentication Protocol
Select the protocol to use for federated authentication. VMware Identity Services supports the OpenID Connect and SAML protocols.
Procedure
What to do next
Configure VMware Identity Services and the identity provider for federated authentication.
Step 5: Configure Authentication (Generic SCIM Identity Provider)
To configure federated authentication with your identity provider, you set up an OpenID Connect or SAML app in the identity provider using the service provider metadata from VMware Identity Services, and configure VMware Identity Services with the values from the app.
OpenID Connect
If you selected OpenID Connect as the authentication protocol, follow these steps.
- From step 5, Configure OpenID Connect, of the VMware Identity Services wizard, copy the Redirect URI value.
You need this value for the next step, when you create an OpenID Connect app in your identity provider.
- In the identity provider admin console, create an OpenID Connect app.
- Find the Redirect URI section in the app, and copy and paste the Redirect URI value that you copied from the VMware Identity Services wizard.
- Create a client secret for the app, and copy it.
You will enter the secret in the VMware Identity Services wizard in the next step.
- Return to the VMware Identity Services wizard in the Workspace ONE console, and complete the configuration in the Configure OpenID Connect section.
Client ID Copy and paste the client ID value from the identity provider app. Client Secret Copy and paste the client secret from the identity provider app. Configuration URL Copy and paste the OpenID Connect well-known configuration URL of the identity provider app. For example: https://example.com/.well-known/openid-configuration OIDC User Identifier Attribute Specify the OpenID Connect attribute to map to the Workspace ONE attribute for user lookups. Workspace ONE User Identifier Attribute Specify the Workspace ONE attribute to map to the OpenID Connect attribute for user lookups. - In the VMware Identity Services wizard, click Finish to complete setting up the integration between VMware Identity Services and your identity provider.
SAML
If you selected SAML as the authentication protocol, follow these steps.
- Get the service provider metadata from the Workspace ONE console.
From step 5, Configure SAML Single Sign-On, of the VMware Identity Services wizard, either copy or view and download the SAML service provider metadata.
- In the identity provider admin console, navigate to the single sign-on configuration page.
Important: If you are integrating VMware Identity Services with Okta, you must create a separate SAML app in Okta for authentication. You cannot use the same app for provisioning and authentication.
- Configure single sign-on using values from the VMware Identity Services wizard.
Typical configuration steps include one of the following, based on what the identity provider supports:
- Find the Service Provider metadata option, and upload or copy and paste the SAML service provider metadata from the VMware Identity Services wizard.
- If the identity provider does not have an option for uploading the metadata, copy and paste the following values from the VMware Identity Services SAML service provider metadata to the corresponding fields in the identity provider console:
entityID value: For example, https://yourVMwareIdentityServicesFQDN/SAAS/API/1.0/GET/metadata/sp.xml.
AssertionConsumerService HTTP-POST Location value: For example, https://yourVMwareIdentityServicesFQDN/SAAS/auth/saml/response.
- Find and copy the Identity Provider SAML metadata from the identity provider console.
- In the Workspace ONE console, in step 5, Configure SAML Single Sign-On, of the VMware Identity Services wizard, paste the Identity Provider metadata into the Identity provider metadata text box.
- Configure the rest of the options in the Configure SAML Single Sign-On section.
- Single sign-out: Select this option if you want to log users out of their identity provider session after they sign out of Workspace ONE Intelligent Hub.
- Binding protocol: Select the SAML binding protocol, HTTP POST or HTTP Redirect.
- Name ID format: Specify the Name ID format to use to map users between your identity provider and Workspace ONE services.
- Name ID value: Select the user attribute for users in Workspace ONE.
- Send Subject in SAML request (when available): Select this option if you want the identity provider to send the subject to VMware Identity Services as a login hint, when available. If you select this option, you can also select Use Name ID format mapping for Subject.
- Use Name ID format mapping for Subject: Select this option to use the Name ID format to map the login hint provided by the identity provider to the Name ID value.
Caution: Enabling this option might increase the risk of a security vulnerability known as user enumeration.
- Click Finish in the wizard to complete setting up the integration between VMware Identity Services and your identity provider.
Results
The integration between VMware Identity Services and your identity provider is complete.
The directory is created in VMware Identity Services and will be populated when you push users and groups from the provisioning app in the identity provider. Provisioned users and groups will automatically appear in the Workspace ONE services you choose to integrate with the identity provider, such as Workspace ONE Access and Workspace ONE UEM.
You cannot edit the directory in the Workspace ONE Access and Workspace ONE UEM consoles. Directory, users, user groups, user attributes, and identity provider pages are read-only.
What to do next
Next, select the Workspace ONE services to which you want to provision users and groups.
Then, push users and groups from your identity provider. See Provisioning Users to Workspace ONE.