Web Auth Wi-Fi for Cloud IDPs

1. Introduction

Web Auth Wi-Fi for Cloud Core Providers empowers authorized end-users to use their enterprise identities, like Azure AD, Okta, Google, OneLogin, or any other SAML vendors, to log into your network. This feature is mainly used to onboard users’ devices or unmanaged devices onto the secure Wi-Fi network after a Single Sign-On event.

It works by presenting a captive portal when users join the network, and after their credentials are validated, they are authorized access to the network. The MAC Address is saved for subsequent authentications, and for admins to understand and track the users and devices using the network.

This document describes how to configure Web Auth Wi-Fi for Cloud Core Providers in the JoinNow Management Portal and integrate it with your infrastructure.

2. Prerequisites

The following are the prerequisites for setting up a Web Authentication provider in the JoinNow Management portal:

  1. Active subscription with Cloud Connector and Web Auth Wi-Fi with Cloud Core Providers.

    NOTE: Please contact sales@securew2.com to purchase or renew a license.

  2. Active subscription with an Access Point. The Access Point vendors covered in this doc are:

Not Supported OS Versions:

  1. Android 7 and below
  2. macOS Catalina and below
  3. iOS 14 and below

3. Configuring SecureW2 JoinNow Management portal

The high-level steps to set up SAML authentication are:

  • Creating a Core Provider in SecureW2
  • Creating a SAML application in Okta
  • Configuring a Policy Workflow
  • Configuring Attribute Mapping
  • Web Authentication

This feature can be configured to work with all the SAML vendors. This document provides a step-by-step integration with OKTA as an example. Please refer to the SecureW2 JoinNow Integration Guide (section 2.3) for information regarding other SAML vendors.

3.1 Configuring a Core Provider in SecureW2

To create a core provider in SecureW2:

  1. Log in to the JoinNow Management Portal.
  2. Navigate to Integration Hub > Core Platforms.
  3. Click Add.
  4. In the Name and Description fields, enter the name and a suitable description for the core provider.
  5. From the Type drop-down list, select Okta SAML.
  6. Click Save.
  7. The page refreshes, and the Configuration, Attribute Mapping, and Groups tabs are displayed.
  8. In the Configuration tab, under the Service Provider (SP) Info section, copy the Entity ID and ACS URL values to your console or clipboard. This will be used later while connecting with your SAML application.

3.2 Creating a SAML application in Okta

To create a SAML application in Okta:

  1. Log in to the Okta portal.
  2. Navigate to Applications > Applications.
  3. Click Create App Integration.
  4. In the Create a new app integration pop-up window, select SAML 2.0 as the sign-in method.

  5. Click Next.
  6. Under the General Settings tab, in the App name field, enter a unique name for the application.

  7. Click Next.
  8. Under the Configure SAML tab, in the SAML Settings section, copy the ACS URL value from the JoinNow Management Portal and paste it into the Single sign-on URL field.
  9. Copy the Entity ID value from the JoinNow Management Portal and paste the value in the Audience URI (SP Entity ID) field.

    NOTE: To obtain the ACS URL and the Entity ID values, log in to the JoinNow Management Portal. Navigate to Integration Hub > Core Platforms > click the Edit link of the core provider you created, and then select the Configuration tab (refer to the Configuring a Core Provider in SecureW2 section, step 8).
  10. Scroll down to the bottom of the page and click Next.
  11. Enter the optional details on the Feedback page and click Finish.

3.3 Configuring Attribute Mapping in SecureW2

Attribute mapping defines the attributes provided by your core provider, which are used to grant user access. Once your core provider identifies a user, it sends the attributes to your SAML application, which then sends the attributes to SecureW2.

To map attributes in the SAML provider:

  1. Log in to the Okta portal.
  2. Navigate to Applications > Applications.
  3. On the Applications page, open the newly created app integration and then select the General tab.

  4. Under the General tab, scroll down to the SAML Settings section and click the Edit link.

  5. Click Next.

  6. Under the Configure SAML tab, scroll down to the Attribute Statements (optional) section and enter the following attributes in the fields:

    NameValue
    emailuser.email
    firstnameuser.firstname
    lastnameuser.lastname

  7. Scroll down to the Preview the SAML assertion generated from the information above section and click the Preview the SAML Assertion button. The IdP metadata is displayed in a new tab.

  8. Copy the entire content, paste it into a text editor, and then save the metadata as an .xml file on your computer. You can use this metadata to integrate the JoinNow Management Portal with Okta.

  9. To configure the JoinNow Management Portal for attribute mapping:
    1. Navigate to Integration Hub > Core Platforms and click the Edit link of the core provider you created earlier (refer to the Configuring a Core Provider in SecureW2 section).

    2. Select the Attribute Mapping tab and then click Add.

    3. In the Local Attribute field, enter email as the name of the variable.
    4. From the Remote Attribute drop-down list, select User Defined.
    5. In the field next to the Remote Attribute field, enter Email and click Next.

    6. Click Add.
    7. In the Local Attribute field, enter upn as the name of the variable.
    8. From the Remote Attribute drop-down list, select User Defined.
    9. In the field next to the Remote Attribute field, enter Email and click Next.

    10. Click Add.
    11. In the Local Attribute field, enter displayName as the name of the variable.
    12. From the Remote Attribute drop-down list, select User Defined.
    13. In the field next to the Remote Attribute field, enter firstName and click Next.
    14. Click Update.

3.4 Configuring the Core Provider with Okta Metadata

To upload the Okta metadata to SecureW2:

  1. Log in to the JoinNow Management Portal.
  2. Navigate to Integration Hub > Core Platforms.
  3. On the Core Platforms page, click the Edit link for the IdP you created earlier (refer to the Configuring a Core Provider in SecureW2 section).

  4. Select the Configuration tab.
  5. Under the Core Provider Info section, in the Metadata field, click the Choose file button to upload the metadata file obtained from Okta (refer to the 3.3 Configuring Attribute Mapping in SecureW2 section, step 8).

  6. Click Upload and then click Update.

3.5 Adding Users to the SAML Application

To assign a user to the application:

  1. Log in to the Okta portal.
  2. Navigate to Applications > Applications and then select the newly created app.
    1. Under the Assignments tab, from the Assign drop-down menu, click Assign to People.

    2. On the Assign Okta SAML to People pop-up window, click Assign for the corresponding users.

To assign a group to the application:

  1. Navigate to Applications > Applications and then select the newly created app.
    1. Under the Assignments tab, from the Assign drop-down menu, click Assign to Groups.

    2. On the Assign Okta SAML to Groups pop-up window, click Assign for the corresponding groups.

3.6 Configuring Policies in SecureW2

3.6.1 Configuring an Authentication Policy

To add an authentication policy, perform the following steps:

  1. Navigate to Policy Management > Authentication.
  2. On the Authentication page, click the Edit link for your network profile’s authentication policy.
  3. Select the Conditions tab and make sure that your network profile is displayed in the Profile field.
  4. Select the Settings tab.
  5. From the Core Provider drop-down list, select the core provider that you created earlier (refer to the Configuring a Core Provider in SecureW2 section).
  6. Select the Enable User Self Service checkbox, if required.

  7. Click Update.

3.6.2 Configuring a Policy Workflow

To add a policy workflow in SecureW2:

  1. Navigate to Policy Management > Policy Workflows.
  2. Click Add Policy Workflow.
  3. In the Name and Display Description fields, enter the name and a suitable description for the Policy Workflow.
  4. Click Save.
  5. The page refreshes, and the Conditions tab is displayed.
  6. Select the Conditions tab.
  7. From the Core Provider drop-down list, select the core provider you created earlier (refer to the Configuring a Core Provider in SecureW2 section).

  8. Click Update.

3.6.3 Configuring Network Policy

A network Policy specifies how Cloud RADIUS will authorize access to a particular User Role.

To configure the Network Policy, perform the following steps:

  1. Navigate to Policy Management > Network.
  2. Click Add Network Policy.

  3. In the Name and Display Description fields, enter the name and a suitable description for the network policy.

  4. Click Save.
  5. The page refreshes, and the Conditions and Settings tabs are displayed.
  6. Select the Conditions tab.
  7. In the Conditions section, select Match All or Match Any based on your requirement to set authentication criteria. In the case explained here, we are selecting Match All.

     

  8. Click the Add rule and select the policy workflow you want to assign to this network policy. It is essential to select the appropriate policy workflow, as it triggers the network policy. This menu offers various rules that you can select based on your business requirements.

  9. Click Save.
  10. The Policy Workflow option appears under the Conditions tab.
  11. From the Policy Workflow Equals drop-down list, select the policy workflow you created earlier. You can select multiple User Roles to assign to a Network Policy.

  12. Select the Settings tab.
    1. From the Access drop-down list, select any one of the options to allow or deny authentication requests. The default value is “Allow”.
    2. To configure MFA, select the checkbox to enable MFA.
    3. From the Perform MFA Using drop-down list, select a Core Provider for MFA.

    4. Click Add Attribute.
      1. From the Dictionary drop-down list, select an option:
        • Radius: IETF This is what we will use for the following attributes, as we are using standard RADIUS attributes for VLAN assignment.
        • Custom: Used for any VSAs (Vendor-Specific Attributes).
    5. From the Attribute drop-down list, select any of the following options:
      1. Framed-Protocol
      2. Framed-IP-Address
      3. Framed-IP-NetMask
      4. Framed-Routing
      5. Filter-Id
      6. Framed-MTU
      7. Framed-Compression
      8. Reply-Message
      9. Framed-Route
      10. Framed-IPX-Network
      11. State
      12. Class
      13. Session-Timeout
      14. Tunnel-Type
      15. Tunnel-Medium-Type
      16. Tunnel-Private-Group-ID
      17. Framed-Pool
      18. User-Name
    6. In the Value field, enter the appropriate value for the attribute.

    7. Click Save.

    8. Repeat for any other RADIUS attribute you would like to send. For reference, here is what is commonly required for VLAN Assignment:
      1. Tunnel-Medium-Type: IEE-802
      2. Tunnel-Private-Group-ID:  {VLAN Name}
      3. Server
Tunnel-Type: VLAN
    9. Click Update.

4. Configuring Web Authentication

To configure Web Authentication:

  1. Navigate to Device Onboarding > Web Authentication.
  2. Click Add Web Authentication.

  3. In the Name field, enter a name for your Web Authentication.
  4. In the Display Description field, enter a welcome message for your users.
  5. From the Vendor drop-down list, select your WLC vendor.

  6. Click Save.
  7. The page refreshes, and the Configuration, Authentication, and Customization tabs are displayed.
  8. Select the Configuration tab.
  9. In the URL field, enter the web authentication redirect URL. An example with Cisco is used for this demonstration.
  10. In the Username Parameter field, enter the username to be entered by the users.
  11. In the Password Parameter field, enter the password to be entered by the users.

  12. Select the Authentication tab.
  13. From the Core Provider drop-down list, select the core provider created earlier (refer to the Configuring a Core Provider in SecureW2 section).
  14. Select the Force Authentication checkbox to re-authenticate the device after a set time period.
  15. In the Re-authenticate after field, enter the number of days after which the device must undergo re-authentication to maintain device trust. This practice minimizes frequent authentication while ensuring ongoing authorization for WiFi connectivity at specified intervals.

  16. Select the Customization tab.
  17. In the Stylesheet field, click Choose file and upload the necessary stylesheet from your computer, and click Upload.

  18. Click Update.

5. Configuring RADIUS Servers in Meraki

The network SSID for onboarding the users has been configured to point to CloudRADIUS for RADIUS authentication.

To set up RADIUS servers:

  1. Navigate to Wireless > Access Control.
  2. From the SSID drop-down list, select the required SSID.
  3. In the Network access section, select the Open (no encryption) radio button.
  4. Scroll down to the Splash page section and select the Sign-on with radio button.
  5. From Sign-on with drop-down list, select my RADIUS server.

  6. In the RADIUS for splash page section, click Add a server.

  7. Navigate to RADIUS > RADIUS Configuration in the JoinNow Management Portal. Copy the values from the Primary IP Address, Authentication Port, and Shared Secret values.

  8. Paste the Host (IP Address), Port (Authentication Port), and Secret values in the Meraki Portal.

  9. From the Walled garden drop-down list, select Walled garden is enabled.
  10. In the Walled garden ranges field, enter *.securew2.com

  11. Scroll to the bottom of the page and click Save Changes.

6. Configuring RADIUS Servers in Aruba

The network SSID for onboarding the users has been configured to point to CloudRADIUS for RADIUS authentication.

  1. Log in to the Aruba management portal.
  2. On the left pane, navigate to Configuration > WLANs and click the (+) icon.

  3. On the General tab:
    1.  In the Name (ssid) field, enter a name for the SSID.
    2. For Primary usage, select the Guest option.

  4. Click Next.
  5. On the VLANs tab, select your VLAN ID.

  6. Click Next.
  7. On the Security tab:
    1. Select ClearPass or other external captive portal.

    2. In the Auth servers section, click the (+) icon.

    3. On the Add Existing Server pop-up window, click the (+) icon.

    4. On the Create new server pop-up window, add the following details:
      • Select the RADIUS radio box.
      • In the Name field, enter the name of the RADIUS server.
      • Navigate to RADIUS > RADIUS Configuration in the JoinNow Management Portal. Copy the values from the Primary IP Address, Authentication Port, and Shared Secret values.

      • Paste the IP Address, Auth Port, Accounting port, Shared key, and Retype key values in the Aruba Portal.


        NOTE: Contact SecureW2 Support for IP Address, Auth Port, Accounting port, and Shared Secret values.
      • Click Submit.

    5. Enter the Web Auth SSO landing page URL in the CPPM host and CPPM page fields.
      • CPPM host: https://cloud.securew2.com
      • CPPM page: /public/{orgid}/webauth/{profilename}/
      • For example, if the network profile to onboard users is https://cloud.securew2.com/public/12345/webauth/Cisco, the CPPM Page will be /public/16862/webauth/Cisco/.

      • Click Next.
  8. On the Access tab, the Default role is displayed.

  9. Click Finish. The new SSID appears in the WLANs section.
  10. Navigate to Roles & Policies and update this role to allow https and http access to *.securew2.com.

7. Sample Workflow

7.1 Onboarding Process for New Devices

7. 2 Onboarding Process for Registered Devices

The connected devices and their details can be tracked on the Devices page in the JoinNow Management Portal (navigate to Data and Monitoring -> Devices).

You can also generate a report on web-authenticated devices using the JoinNow Management Portal. It is available under the Predefined Reports section (Data and Monitoring > Reports > Predefined Reports).

To view the RADIUS Events, navigate to Data and Monitoring > RADIUS Events.