Single Sign On

Single Sign-On (SSO) is an authentication mechanism that allows users to access multiple applications by using a single ID and password.

IBM webMethods iPaaS supports SSO that allows users to authenticate themselves against an Identity Provider (IdP) rather than obtain and use a separate username and password. Once the IdP authenticates the users, it informs IBM webMethods iPaaS about it, which in turn lets the users access the applications without having to sign in using their IBM webMethods iPaaS credentials. This makes the login process easier, faster, and more secure.

IBM webMethods iPaaS supports the following Single Sign-On Providers:

Note
IBM webMethods iPaaS supports only Service Provider Initiated SSO.

How It Works

Let us see an example on how to configure OKTA as a SAML based external identity provider, to authenticate {IBM webMethods iPaaS users.

To set up SSO for IBM webMethods iPaaS, ensure that you have:

Overview of Steps

  1. Create the URI for connecting IdPs to IBM webMethods iPaaS

  2. Configure IdPs (OKTA) to connect to IBM webMethods iPaaS

  3. Import IdPs SAML settings into IBM webMethods iPaaS

  4. Configure IdP details in IBM webMethods iPaaS

Important
You cannot use an external IDP user as a technical user for API authentication. Instead, use an internal user for technical API calls.

Detailed Steps

1. Create the URI for connecting IdPs to IBM webMethods iPaaS

a. Log in to your IBM webMethods iPaaS account. Go to the Administration page, and click the Single sign-on tab.

b. Click Add Identity provider. A new screen appears where you add an Identity Provider to authenticate IBM webMethods iPaaS users.

c. Enter the following details in the Add Identity Provider screen:

Note
Keep this window open, as you will need these details for setting up the IBM webMethods iPaaS application in your IdP in the next step.

2. Configure IdPs (OKTA) to connect to IBM webMethods iPaaS

a. Log in to your IdP account as a user with Administrator privileges.

b. Go to Admin > Applications to create a new application integration. Click Add Application to add the IBM webMethods iPaaS application.

c. Select SAML 2.0 as the sign-on method.

d. In the App name field, enter an application name. After this, click Next.

e. In the Configure SAML settings tab, enter the following details:

f. After configuring SAML settings, click Next to proceed to the Feedback section. For this tutorial, we will configure the following details:

g. Once you have configured the Feedback options, click Finish.
After configuring SAML settings, you assign Users/People to the application. If you have created OKTA groups (under Okta Directory), assign Users/People to that group and assign the groups to the application.

3. Import IdP SAML settings into IBM webMethods iPaaS

To import the SAML settings of IdP into IBM webMethods iPaaS:

a. Go to the newly created OKTA application, click Sign On, click Identity provider metadata link, and then either copy the URI or save the metadata to file.

4. Configure IdP details in IBM webMethods iPaaS

a. Switch back to the IBM webMethods iPaaS SSO Settings window and complete the configuration in IBM webMethods iPaaS. If you copied the OKTA metadata URI or saved the metadata to file, choose to import, and then specify the URI or file.
Click Next.

b. On the Configuration page, complete the fields as necessary. If you imported the OKTA metadata, some of the fields are pre-populated with that metadata.

c. If you did not import the OKTA metadata, the IBM webMethods iPaaS fields map to OKTA fields as follows. Let’s understand what these fields are:

d. On the Attributes page, map the “Identity provider user attributes” to the “IBM webMethods iPaaS user attributes”.

e. On the Roles page, grant access to IdP users as follows by assigning default IBM webMethods iPaaS roles to OKTA users or by assigning IBM webMethods iPaaS roles to OKTA users based on OKTA group membership.
For the second case, click Assign IBM webMethods iPaaS Roles to users by mapping to identity provider roles. Click +, select a IBM webMethods iPaaS role, and then type the name of the OKTA group that corresponds to the role. You can later go to individual IBM webMethods iPaaS products and modify access.

f. Save the Identity Provider configuration. Now the configuration for Identity Provider in IBM webMethods iPaaS is complete.

On successful configuration of the Identity Provider, you will see the Identity Provider name on the IBM webMethods iPaaS login page.

On successful authentication by the SSO server, you are redirected to IBM webMethods Integration and you will be able to access IBM webMethods Integration without requiring additional authentication.