cancel
Showing results for 
Search instead for 
Did you mean: 

Do we need Conditional Authentication Rules if we use the default identity provider as PING FEDERATE

VL1
Active Contributor
0 Kudos
718

Hi @SoumyadiptaPal 

Hope you are doing good. I need your advice on the below:

I am reaching out to you as I’ve a query related to users logging in.

We already have three groups – SSO, PWD and MFA and our idea is by default all the users would be created as SSO users which is mentioned as part of the Target Transformation which is working well.

VL1_0-1722574092557.png

However, if we have to move the users later between the groups manually after the upgrade (SSO to PWD / PWD to SSO / SSO to MFA / MFA to SSO / MFA to PWD / PWD to MFA) how do we achieve it.

We do not have Conditional Authentication rules as we have the PING FEDERATE as the default identity provider. We can use authentication rules only if the default identity provide is Identity Authentication.

VL1_5-1722574523609.png

As per the KBA - https://me.sap.com/notes/3075413, we have to create conditional authentication rules in IAS for PWD & SSO Users.

VL1_2-1722574192593.png

However as per https://help.sap.com/docs/cloud-identity-services/cloud-identity-services/configure-conditional-auth...

VL1_3-1722574263629.png

I would like to know whether the existing configuration stands good as we are using PING FEDERATE as our identity provider and not the default Identity Authentication.

Does Conditional Authentication rules need to be created here?

--------------------------------------------------------------------------

Does changing a user from one group to another does not affect the logon?

Does user moving from PWD Group (G2_UN&PWD) to SSO Group (G1_Everyone else) does not affect the rest of the user attributes in the IAS.

============================================================================

For users logging in via entering the UN & PWD – they use the URL mentioned below:

VL1_6-1722574693575.png

For MFA, we already have created a risk- based authentication rule where two factor authentication method is used i.e., both UN & PWD and the external device (Yubi Key).

Please advise.

Regards,

Accepted Solutions (0)

Answers (2)

Answers (2)

VL1
Active Contributor
0 Kudos

Hi @sushilgupta857 - Thanks a lot for the reply.

We are using PING FEDERATE as our Corporate Idp which means PING FEDERATE is also the default authenticating identity provider.

We are using the SAML User Column in Provisioning. It is mapped to CUSTOM11 which is Corporate ID in the system. Corporate ID is the unique identifier for all the users. Every user in the system is mapped to a unique corporate ID. Sail Point generates a unique Q ID for each user which is linked to the corporate ID of the user. Custom11/Corporate ID is part of SF User (UDF) file which is being flown from BizX/EC to IAS when the IAS job is run.

In Applications - Trust - Conditional Authentication - Allow Identity Authentication Users Log On 

Allow users stored in Identity Authentication service to log on (Checkbox is selected).

The logon url is https://xxxxxx.accounts.cloud.sap/saml2/idp/sso?sp=https://www.successfactors.com/XXXXXXXintT3&idp=h...

the above logon url is being used for UN & PWD users to log in and also the MFA users.

You can enter the Email or User Name and the password to log in.

We have created 3 Groups - SSO, PWD and MFA.

We have added the below transformation which makes the SSO (Everyone Else) group as the default group and all users created in IAS would initially be part of Everyone Else group.

{
"targetPath": "$.groups[0].value",
"constant": "EVERYONE ELSE",
"scope": "createEntity"
},

Post the users are created, depending on the user if we want to change the user to PWD or MFA group, we would manually unassign the user from SSO group and assign it to PWD group. Post assigning the user to PWD group manually, setting the initial password to log in and changing the password when prompted.

However what is happening is when we move the users manually from one group (SSO) to other group (PWD) and try logging in with UN & PWD, we are not able to log in and the system comes up with Invalid Log in Message.

We have different scenarios which we want to achieve like moving of users from one group to other - SSO to PWD, PWD to SSO, PWD to MFA, MFA to PWD, SSO to MFA and MFA to SSO depending to which group user belongs or can be moved in future to either PWD / MFA.

For MFA - we are using the Web Authentication Method, user should enter the UN & PWD and also the external key (YubiKey) and enter his PIN to log in.

MFA group is added as an authentication rule to the Risk Based Authentication in the Applications & Resources - Applications - Authentication and Access.

How do we achieve successful log in of users when we manually assign the users to different groups since changing users from one group to another is not affecting the logon. 

Please advice.

Regards,

sushilgupta857
Active Participant
0 Kudos
Hi, I was occupied, just saw your comment. See i would not recommend to perform manual changes to users when you are syncing it using IPS from Source system. Create logic in transformation to use fields from source system to filter them to different groups, and control it in Source. For example - you can use standard loginMethod field in Successfactors to filter users to different SSO or PWD groups in IAS. now let's say you want to switch just update the field in SF and let the sync job do the magic. In your scenario - if you accidently run full sync job or if you have configured a property to run full sync after every 5 read job - it will bring your user back to SSO group even if you manually update it or may have different behaviour of users. It is recommended to either use Automated process of IPS or control everything manually. Let me know your thoughts on this.!
sushilgupta857
Active Participant
0 Kudos

Hi VL1,

Just saw the email.

Though screenshots are not clearly visible, i am able to understand that you are using IAS as proxy to corporate IDP. and you use a different URL for password users which gets visible when you enable the check box - allow IAS user to authenticate.. something.

 

Now you have 3 groups created - if you are not using conditional auth - so these groups are not serving any purpose. Will need help with more details on how you want to use these groups and how you are maintaining users inside these groups (manual or through transformations)

We have a loginMethod field in SF which can be used to put users to different groups in IAS as per it's type like SSO or PWD however if you just put them in groups and not use them then they will not serve any purpose except giving a count that these many users are SSO or PWD.

Changing users from one group to another will not impact logon as you are not using rules based conditional authentication or risk based auth to enable 2 factor or blocking the access.

Please let me know if it helps or if you have any other queries

Regards