Aviatrix User VPN with SAML Authentication on OneLogin IdP
This guide provides an example on how to configure Aviatrix to authenticate against a OneLogin IdP. When SAML client is used, your Aviatrix CoPilot acts as the Identity Service Provider (ISP) that redirects browser traffic from client to IdP (e.g., OneLogin) for authentication.
Pre-Deployment Checklist
Before configuring SAML integration between Aviatrix and OneLogin, make sure the following is completed:
- 
The Aviatrix Controller is deployed. 
- 
Have a valid OneLogin Account with admin access. 
- 
Download and install the Aviatrix SAML VPN client. 
OneLogin Account
A valid OneLogin account with admin access is required to configure the integration.
Aviatrix CoPilot
All users must use the Aviatrix VPN client to connect to the system. Download the client for your OS here.
Configuration Steps
Follow these steps to configure Aviatrix to authenticate against your OneLogin IDP:
- 
Create a OneLogin SAML App for Aviatrix. 
- 
Create a SAML Endpoint in Aviatrix CoPilot. 
OneLogin SAML App
Before you start, pick a short name to be used for the SAML application name. In the notes below, we will refer to this as aviatrix_onelogin, but it can be any string.
We will use the string you select for the SAML application name to generate a URL for OneLogin to connect with Aviatrix. This URL is defined below as SP_ACS_URL. This URL should be constructed as:
"https://<your coPilot ip or host name>/flask/saml/sso/<aviatrix_onelogin>"
| Replace <your CoPilot IP or host name> with the actual host name or IP address of your CoPilot and <aviatrix_onelogin> with the string you chose to refer to the SAML application. | 
- 
Log in to OneLogin as an administrator. 
- 
Add a new App (Apps > Add Apps). 
- 
Search for "SAML Test Connector." 
- 
Select SAML Test Connector (Advanced). 
- 
Enter the Configuration values and click Save.   You can download the rectangular image from here: 
 
You can download the square image from here:
 
- 
Click on Configuration tab. 
- 
Enter the values. Field Value RelayState Blank Audience(Entity ID) SP Entity ID Recipient SP_ACS_URL ACS (Consumer) URL Validator SP_ACS_URL ACS (Consumer) URL SP_ACS_URL Single Logout URL Blank Login URL SP Login(Test) URL SAML not valid before 3 (default) SAML not valid on or after 3 (default) SAML initiator Service Provider SAML nameID format Transient SAML issuer type Specific (default) SAML signature element Assertion Encrypt assertion Unmarked checkbox (default) SAML encryption method TRIPLEDES-CBC (default) Sign SLO Response Unmarked checkbox (default) SAML sessionNotOnOrAfter 1440 (default) Generate AttributeValue tag for empty values Unmarked checkbox (default) Sign SLO Request Unmarked checkbox (default)   
- 
Click Save. 
- 
Select the Parameters tab. 
- 
Add the following custom parameters (case sensitive). Field Value Flags Email Email Include in SAML assertion FirstName First Name Include in SAML assertion LastName Last Name Include in SAML assertion   
- 
Optionally, add a field to map to the profile in Aviatrix. Field Value Flags Profile (User Defined) Include in SAML assertion 
- 
Click Save. 
- 
Click on More actions dropdown menu. 
- 
Copy the Metadata URL.   
Aviatrix CoPilot SAML Endpoint
- 
Go to Aviatrix CoPilot > CloudFabric > UserVPN > select the Settings tab. 
- 
Under SAML, click + SAML Endpoint. 
- 
Enter the following information: Field Description Name Pick IPD Metadata Type URL IDP Metadata Text/URL Paste in the Metadata URL obtained from the OneLogin app. Entity ID Select Hostname. Custom SAML Request Template Turn this setting off. 
Creating a VPN User
- 
Create a new VPN user. Use the VPN gateway created above.