Centrify IdP with VMware UAG

OPSWAT MetaAccess can be easily integrated with an existing Centrify & VMware UAG SSO workflow to ensure that a device complies with the organization's security policy before it is granted access to VMware UAG. This ensures that the device is not only authenticated by Centrify, but also tested for risks and vulnerabilities such as infections or unpatched versions of operating systems, BEFORE it access an organization's services.

To get started with implementing OPSWAT MetaAccess integration to enforce device posture check before granting a device to access VMware UAG with Centrify Single Sign On (SSO) service, you need to set up SSO between Centrify and VMware UAG.

You can learn more details for each step here at 3.1.1. How to set it up?

Step 1. Enable Access Control on your MetaAccess account

  1. Login to the MetaAccess console

  2. Navigate to Access Control and then Configurations

  3. Check on the box "Enable access control".

  4. Click SAVE.


Step 2. Add protected applications with IdP Method

  1. Download Centrify IdP certificate: the next step is importing an Centrify X.509 certificate to MetaAccess. This allows MetaAccess to verify users signing though a trusted IdP, Centrify. Each identity provider has a unique X.509 certificate. Download the Centrify X509 certificate by following these steps:

    1. Login to Centrify as Administrator

    2. Navigate to Apps, then select the VMware UAG application


    3. Go to Trust > Identity Provider Configuration > Signing Certificate


    4. Click on Download Certificate to download the Centrify certificate

  2. Collect Single Sign On URL:

    1. Go to Trust > Identity Provider Configuration. Then click on Manual Configuration

    2. Copy Single Sign On URL field


  3. Add the Centrify Identity Provider. If you already have Centrify IdP settings on your MetaAccess account, go to 4 to add VMware UAG application.

    1. Login to the MetaAccess console

    2. Navigate to Access Control and then Configurations

    3. On the Identity Providers tab, click "Add New Identity Provider" to add your IdP

    4. Fill in required fields for the Identity Provider

      1. Identity Provider: Centrify

      2. IdP Name: an IdP name, for example: Centrify

      3. IdP Certificate: upload Centrify certificate you downloaded in Step 2.1


    5. Click Add IDP

    6. Click SAVE

  4. Add VMware UAG application:

    1. Expand the Centrify IdP settings you have just added in Step 2.3 above.

    2. Click Add New Application

    3. Enter required field

      1. Application: application name, for example: UAG

      2. IDP Login URL: login UAG Portal URL, for example: https://<UAG port domain:port>/portal

      3. Application ACS URL: URL which you have from Step 2.2

      4. Access Mode: pick an access mode you prefer. See details on the access modes at Step 2. Add protected applications with IdP Method

    4. Click SAVE

  5. After saving your changes successfully, click the Setup Instructions button of the VMware UAG application you have just added and then copy the URL MetaAccess generated there.


Note: you can add VMware UAG application (step 2.4) when you add Centrify IdP settings in step 2.3.

Step 3. Configure Access Rules

  1. On MetaAccess console, navigate to Access Control and then Configurations

  2. On Access Rules tab, click "ADD NEW RULE" to add a new rule for this application OR you can update existing access rules to add this application

  3. With a new access rule, you need to specify how you would like to block/allow access a device from the application

    1. Rule name: a rule name, for example Block non-compliant devices

    2. Action: Block or Allow

    3. Configure conditions to do the action. Details at Step 3. Configure Access Rules

  4. Click ADD RULE


Step 4. Update Applications settings on Identity Provider

  1. Login to Centrify as administrator

  2. Switch to Admin portal

  3. Navigate to Apps

  4. Select VMware UAG application

  5. Go to Trust > Service Provider Configuration, select Manual Configuration

  6. Replace Assertion Consumer Service (ACS) URL with the URL MetaAccess generated for your app from Step 2.5


  7. Click Save

Step 5. Configure SSO settings on VMware UAG

  1. On MetaAccess console, navigate to Access Control > Configurations

  2. Download OPSWAT certificate


  3. Edit the IDP metadata file you used to configured SSO on VMware UAG with Centrify in the past

    1. Replace X509Certificate with the certificate downloaded in step 5.1

    2. Replace SingleSignOnService.Location with the link you get in step 2.5

  4. Login to VMware UAG admin console

  5. Navigate to Identity Bridging Settings > Upload Identity Provider Metadata and upload the IdP metadata file you modified in step 5.3. Then click Save


Step 6: Test your integration

Follow guideline at Step 6: Test your integration to test your integration to verify if it works as your expectation.