Introduction

Authentication Management is the first line of defense and one of the critical building blocks of the organization’s security as it is necessary for user accountability. It allows access to valuable data only to those who the organization approves. This whitepaper provides insights on one of the authentication configurations (SAML) of the TCPWave IPAM application.

About SAML Authentication

The SAML protocol, or the Security Assertion Markup Language (SAML), was released in 2002 by OASIS. It is an assertion protocol used for Single Sign-On (SSO) that exchanges authentication and authorization data between an Identity Provider (IdP) and a Service Provider (SP). The current version of SAML is SAML 2.0.

The SAML specifies three roles:

Workflow

The general SAML authentication workflow is as follows:

Text

Description automatically generated

Configurations

TCPWave IPAM supports integration with Identity and Access Management -  SAML 2.0 compliant, such as Okta. TCPWave IPAM acts as SP, whereas the Okta acts as the SAML IdP and uses SSO to authenticate the users. You must configure TCPWave IPAM as Service Provider in Okta and configure IdP (SAML) in the TCPWave IPAM through the global options.

Service Provider Configuration in Okta

To configure TCPWave IPAM as SP in Okta:

Graphical user interface, text, application, email

Description automatically generated

SAML Configuration in the TCPWave IPAM

To enable SAML:

Graphical user interface, application

Description automatically generated

If all the following global options required for configuring SAML IdP are set, TIMS switches the authentication mechanism to SAML.

Global Options

The following global options are added to facilitate IdP integration.

Graphical user interface, application

Description automatically generated

The organization name, application name, etc., are from the values configured in IdP. Once the credentials of the user-created in IdP are entered, TIMS UI comes up.

Benefits – SAML Authentication

Conclusion

TCPWave leverages authentication protocols that provide most organizations access to more IT resources. It in turn, supports the business objectives. For information on how TCPWave and its extensive security features can meet your needs, contact the TCPWave Sales Team.