Skip To Content

Configure NetIQ Access Manager

You can configure NetIQ Access Manager 3.2 and later versions as your identity provider (IDP) for enterprise logins in ArcGIS Online. The configuration process involves two main steps: registering your enterprise IDP with ArcGIS Online and registering ArcGIS Online with the enterprise IDP.

Required information

ArcGIS Online requires certain attribute information to be received from the IDP when a user signs in using enterprise logins. The NameID attribute is mandatory and must be sent by your IDP in the SAML response to make the federation with ArcGIS Online work. Since ArcGIS Online uses the value of NameID to uniquely identify a named user, it is recommended that you use a constant value that uniquely identifies the user. When a user from the IDP signs in, a new user with the user name NameID_<url_key_for_org> will be created by ArcGIS Online in its user store. The allowed characters for the value sent by NameID are alphanumeric, _ (underscore), . (dot), and @ (at sign). Any other characters will be escaped to contain underscores in the user name created by ArcGIS Online.

ArcGIS Online supports inflow of the givenName and email address attributes of the enterprise login from the enterprise IDP. When a user signs in using an enterprise login, and if ArcGIS Online receives attributes with the names givenname and email or mail (in any case), ArcGIS Online populates the full name and the email address of the user account with the values received from the IDP.

It's recommended that you pass in the email address from the enterprise IDP so the user can receive notifications. This helps if the user later becomes an administrator. Having an email address in the account entitles the user to receive notifications regarding any administrative activity and send invitations to other users to join the organization.

Register NetIQ Access Manager as the enterprise IDP with ArcGIS Online

  1. Verify that you are signed in as an administrator of your organization.
  2. At the top of the site, click Organization and click the Settings tab.
  3. Click Security on the left side of the page.
  4. In the Enterprise Logins section, select the One identity provider option, click the Set Enterprise Login button, and enter your organization's name in the window that appears (for example, City of Redlands). When users access the organization website, this text displays as part of the SAML sign in option (for example, Using your City of Redlands account).
    Note:

    Selecting the One identity provider option allows you to register one enterprise IDP for your ArcGIS Online organization. If you want to authenticate users with enterprise logins from multiple IDPs, register a SAML-based federation instead of a single IDP.

  5. Choose whether users will be able to join the organization Automatically or Upon invitation from an administrator. Selecting the first option enables users to sign in to the organization with their enterprise login without any intervention from an administrator; their account is registered with the organization automatically the first time they sign in. The second option requires the administrator to invite the necessary users to the organization. When the user receives the invitation, they will be able to sign in to the organization.
  6. Provide metadata information for the IDP using one of the three options below:
    • URL—Choose this option if the URL of NetIQ Access Manager federation metadata is accessible by ArcGIS Online. The URL is usually http(s)://<host>:<port>/nidp/saml2/metadata on the machine where NetIQ Access Manager is running.
    • File—If the URL is not accessible by ArcGIS Online, save the metadata obtained from the URL above as an XML file and upload the file.
    • Parameters—Choose this option if the URL or federation metadata file is not accessible. Enter the values manually and supply the requested parameters: the login URL and the certificate, encoded in the BASE 64 format. Contact your NetIQ Access Manager administrator to obtain these.
  7. Configure the advanced settings as applicable:
    • Encrypt Assertion—Select this option if NetIQ Access Managerwill be configured to encrypt SAML assertion responses.
    • Enable Signed Request—Select this option to have ArcGIS Online sign the SAML authentication request sent to NetIQ Access Manager.
    • Propagate logout to Identity Provider—Select this option to have ArcGIS Online use a Logout URL to sign out the user from Net IQ Access Manager. Enter the URL to use in the Logout URL setting. If the IDP requires the Logout URL to be signed, Enable Signed Request needs to be checked.
    • Update profiles on sign in—Select this option to automatically synchronize account information (full name and email address) stored in ArcGIS Online user profiles with the latest account information received from the IDP Checking this box allows your organization to verify, when a user signs in with an enterprise login, whether the IDP information has changed since the account was first created and if so, to update the user's ArcGIS Online account profile accordingly.
    • Enable SAML based group membership—Select this option to allow organization members to link specified SAML-based enterprise groups to ArcGIS Online groups during the group creation process.
    • Logout URL—The IDP URL is used to sign out the currently signed in user. This value is automatically populated if defined in the IDP's metadata file. You can update this URL as needed.
    • Entity ID—Update this value to use a new entity ID to uniquely identify your ArcGIS Online organization to NetIQ Access Manager.

Register ArcGIS Online as the trusted service provider with NetIQ Access Manager

  1. Configure an attribute set.

    Follow the steps below to create a new attribute set so the attributes can be sent to ArcGIS Online as part of the SAML assertion after authenticating the user. If you have an existing attribute set already configured in your NetIQ Access Manager, you can use that set instead.

    1. Sign in to the NetIQ Access Manager administration console. This is usually available at http(s)://<host>:<port>/nps.
    2. Browse to your identity server in the NetIQ admin console and click the Shared Settings tab. Under Attribute Sets, you'll see any attribute sets you've already created. Click New and create a new attribute set. Enter ArcGISOnline under Set Name and click Next.

      Create Attribute Set

    3. Define the attribute mappings and add them to the attribute set you created in the previous step.

      ArcGIS Online supports flow-in of the givenName and email address attributes of the enterprise login from the enterprise IDP. When a user signs in using an enterprise login and if ArcGIS Online receives attributes with the names givenname and email or mail (in any case), ArcGIS Online populates the full name and the email address of the user account with the values received from the identity provider.

      It is recommended that you pass in the email address from the enterprise IDP to ArcGIS Online. This helps if the user later becomes an administrator. Having an email address in the account entitles the user to receive notifications regarding any administrative activity and send invitations to other users to join the organization.

    Click the New link and add any new attribute mappings. The screen captures below show adding attribute mapping for givenName, email address, and uid. You can choose any attributes from your authentication source instead of these examples.

    givenName attribute
    email attribute
    uid attribute

    Click Finish in the Create Attribute Set wizard. This creates a new attribute set named ArcGISOnline.

  2. Follow the steps below to add ArcGIS Online as a trusted provider with NetIQ Access Manager.
    1. Sign in to the NetIQ admin console, choose your identity server, and click the Edit link.
      Admin console

      The General tab opens.

    2. Click the SAML 2.0 tab and click New > Service Provider.

      The Service Provider window is where you add ArcGIS Online as a trusted service provider with NetIQ Access Manager.

    3. In the Create Trusted Service Provider wizard, click Metadata Text as the Source and paste the metadata of your ArcGIS Online organization in the Text box.

      To get the metadata of your ArcGIS Online organization, sign in to your organization as an administrator, click the Settings tab, click Security on the left side of the page, and click the Get Service Provider button. Save the metadata as an XML file.

      Create Trust Service Provider

      Click Next and click Finish to finish adding the trusted service provider.

      Trusted Provider
  3. Follow the steps below to configure ArcGIS Online and NetIQ Access Manager federation properties.
    1. On the SAML 2.0 tab, click the service provider link under Service Providers. (For example, in the screen capture above, the link is named ArcGISOnlineSAMLTest.) The Configuration tab opens. Click the Metadata tab and verify that the metadata for your ArcGIS Online organization is correct.
    2. Click the Configuration tab to go back to the Trust section of the configuration. Select the Encrypt assertions option if you chose the advanced setting Encrypt Assertion when registering NetIQ Access Manager as the enterprise IDP with ArcGIS Online.
    3. Click the Attributes tab.

      In this step, you add the attribute mapping from the set you previously created so NetIQ Access Manager can send the attributes to ArcGIS Online in the SAML assertion.

      Select the attribute set you defined in step 2.1 above. After you select your attribute set, the attributes you defined in the set appear in the Available box. Move your givenName and email attributes to the Send with authentication box.

      Attribute set
    4. Click the Authentication Response tab under the Configuration tab of the service provider and set up the authentication response.

      Click Post from the Binding drop-down menu.

      In the Name Identifier column, check the box next to Unspecified.

      In the Default column, select the radio button next to Unspecified.

      In the Value column, choose Ldap Attribute uid.

      Note:

      You can configure any other unique attribute in the attribute set from your authentication source to be sent as NameID. The value of this parameter will be used as the user name in the organization.

      Click Apply. Verify that your page matches the screen capture below.

      Authentication Response
    5. Under Configuration, click the Options tab and choose your user authentication contract, for example, Name/Password - Form, and click Apply.

      Configuration Options

  4. Restart NetIQ Access Manager by browsing to your identity server and clicking the Update All link.

    Restart NetIQ