Configuring Azure AD Federation

Configuring Azure Active Directory federation overview

This section provides information on federating Lexmark Cloud Services with Microsoft Azure Active Directory. For more information, contact the Lexmark Professional Services team.

Prerequisites

Before you begin, make sure that you have administrator access to the following portals:

Understanding federation

Federation is the process of creating a trust relationship between a customer’s identity provider (IdP) and an external service, such as Lexmark Cloud Services. The following are examples of an IdP:

After establishing a trust relationship, users can access Lexmark Cloud Services using the same user name and password for other internal sites and services. The customer’s IdP manages all aspects of credential management, such as password validation, complexity requirements, expiration, and potential use of multifactor authentication. The IdP also supports single sign-on (SSO), which reduces the number of times users are required to authenticate as they switch between services.

User experience

Customer’s environment with IdP

The first time a user accesses Lexmark Cloud Services, an e-mail address prompt appears, and then the user is redirected to the IdP.

If the user has already signed in to the IdP and it supports SSO, then the user is not required to enter the password. Multifactor authentication challenges are prevented. This process creates a quick sign-in experience for the end user.

Customer’s environment without IdP

If the user has not signed in to the IdP, then the user name and password prompts appear. Multifactor authentication challenges are encountered. After logging in, the user is redirected to Lexmark Cloud Services.

Workflow for federated login

  1. Lexmark Cloud Services requests the user’s e-mail address. This information lets Lexmark Cloud Services determine the user’s organization within Lexmark Cloud Services.

    Note: The federation settings for the organization include the URL of the customer's identity provider.
  2. Lexmark Cloud Services redirects the user to the IdP. Lexmark Cloud Services passes an Entity ID field.

  3. The IdP uses the Entity ID to determine which settings apply to this login attempt. Depending on the settings, the IdP authenticates the user name and password, and may perform multifactor authentication. If the IdP supports SSO, and the user is already logged in to the IdP, then the user is logged in automatically.

  4. The IdP redirects the user to Lexmark Cloud Services and passes the following predefined claims:

    • User name

    • E-mail address

    • Organization

    • Optional information, such as the user’s department and cost center

    The IdP signs these claims using a private certificate.

  5. Lexmark Cloud Services has been pre-configured with the public certificate and uses it to verify that this information came from the expected source. This process lets Lexmark Cloud Services trust the information that the IdP passes and completes the login process.

Configuring Azure Active Directory

The images below may vary in practice.

  1. From the Azure portal, navigate to the Azure Active Directory.

    A screenshot showing the navigation to Azure Active Directory.
  2. Click Enterprise applications > New application.

    A screenshot showing the navigation to the enterprise applications setting.
    A screenshot showing the New Application button.
  3. Click Create your own application > Integrate any other application you don’t find in the gallery (Non-gallery).

    A screenshot showing the navigation to the non-gallery applications.
  4. Type an application name.

  5. From the Enterprise Applications Overview screen, click Set up single sign on, and then select SAML.

    A screenshot showing the setting up of the single sign-on method.
    A screnshot showing SAML as the single sign-on method.
  6. From the Basic SAML Configuration section, configure the following settings:

    A screenshot showing the configuration of user attributes.
    Note: Obtain the settings from the service provider.
    • Identifier (Entity ID)

      Note: The default Lexmark Cloud Services entity ID is https://idp.iss.lexmark.com. Make sure that the entity ID in Azure matches the entity ID in the Lexmark Cloud Services portal.
    • Reply URL (Assertion Consumer Service URL)

      Depending on your location, the following are examples of a full reply URL:

      • https://idp.us.iss.lexmark.com/users/auth/saml/callback?organization_id=XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXXX

      • https://idp.eu.iss.lexmark.com/users/auth/saml/callback?organization_id=XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXXX

      Note: To determine the value for the organization_id parameter, log in to the Lexmark Cloud Services portal, and then click Account Management. The organization_id appears in the URL.
      A screenshot showing the location of the organization ID.
  7. From the User Attributes & Claims section, click Edit.

    A screenshot showing the User Attributes & Claims section.
  8. Click Add new claim, and then type the name and source for each claim.

    A screenshot showing the creation of new claims.
    Required claims

    Attribute

    Source

    Namespace

    firstname

    user.givenname

    Leave this field blank.

    lastname

    user.surname

    Leave this field blank.

    email

    user.mail

    Leave this field blank.


    Optional claims

    Attribute

    Source

    Namespace

    badge

    Source attribute for your organization

    Leave this field blank.

    pin

    Source attribute for your organization

    Leave this field blank.

    costCenter

    Source attribute for your organization

    Leave this field blank.

    department

    user.department

    Leave this field blank.


  9. From the SAML Signing Certificate section, do the following:

    • Download the Base64 certificate.

    • Copy the login and logout URLs.

    A screenshot showing where to download the certificate and copy the login and logut URLs.
  10. Depending on your Azure configuration, assign users to the created enterprise application.

    A screenshot showing where to assign users and groups.
  11. Save the settings.

Configuring Lexmark Cloud Services

  1. From the Account Management web portal, click Organization > Authentication Provider > Configure an Authentication Provider.

    A screenshot showing the Authentication Provider setting.
  2. From the Domains section, type the domain of the identity provider, and then click Add.

    A screenshot showing the Lexmark Cloud Services homepage.
  3. From the Authentication Provider Type menu, select SAML.

  4. From the SAML Authentication Provider section, select Without Metadata URL.

  5. From the Single Sign-On Settings section, type the correct information in the following fields:

    • Service provider entity ID

      Note: The default Lexmark Cloud Services entity ID is https://idp.iss.lexmark.com. Make sure that the Entity ID in Azure matches the Entity ID in the Lexmark Cloud Services portal.
    • SSO target URL—The login URL of the Azure enterprise application that you created.

    • SSO Logout URL—This URL determines the behavior when a user logs out of the Lexmark Cloud Services portal.

      • If you want the user logged out of your Azure tenant completely, then type the logout URL of the Azure enterprise application that you created.

      • If you want the user to be signed out only of Lexmark Cloud Services, then type another URL. The URL can point to a page that you maintain (“You have successfully logged out”) or you can use the appropriate Lexmark Cloud Services login page for your organization. Depending on your location, the URL can be https://idp.us.iss.lexmark.com or https://idp.eu.iss.lexmark.com.

    From the SSO name identifier format menu, select E-mail address.

  6. In the Certificate field, copy and paste the base-64 certificate key from the token-signing certificate of the identity provider.

    A screenshot showing the certificate information.

    If you instead have a metadata.xml file containing the URLs and certificate data, add the header and footer manually.

    -----BEGIN CERTIFICATE----
    MIIC8DCCAdigAwIBAgIQdzA…
    -----END CERTIFICATE-----
  7. Click Configure Authentication Provider.

    Note: Do not exit the Lexmark Cloud Services portal or allow it to time out. You may be unable to log in to correct any problems you discover while testing.

Accessing Lexmark Cloud Services

Test the federation settings by having any user log in using one of the following methods:

  1. Access Lexmark Cloud Services using the correct URL that is provided by your Lexmark representative.

    A screenshot showing the Lexmark Cloud Services portal.
  2. From the identity provider, type your user name and password.

    A screenshot showing the identity provider prompt.
    Note: The user name must be your full e-mail address. For more information, see Accessing the Lexmark Cloud Services dashboard.