Skip to the content.

Configuring Azure AD as the SAML IDP with Greenlake Cloud Platform and Aruba Central

Single sign-on (SSO) enables users to securely authenticate with multiple applications and websites by logging in only once—with just one set of credentials (username and password). With SSO, the application or website that the user is trying to access relies on a trusted third party (Identity provider) to verify that users are who they say they are.

This is the general process for configuring Azure AD to authenticate users into Greenlake Cloud Platform (GLCP) and Aruba Central using SAML IDP.

The Okta version of this guide can be found on WIFI-GUYS

Contents

Before you Begin

This document references the following documentation:

If you’re looking for the Central 2.5.4 SAML integration guide, it has been moved.

Terms used in this document

Steps to Configure SSO/SAML Application in Azure AD

To configure SSO in Aruba Central, first download the metadata file from Azure AD.

  1. Create an Enteprise Application in the [Azure Portal](https://portal.azure.com)
  2. Configure the Enterprise Application for GLCP
  3. Download the federated metadata XML file from Enterprise Application
  4. Claim and Configure your domain within GLCP
  5. Upload the federated metadata XML file to GLCP
  6. Create recovery account

Step 1: Create an Azure AD Enterprise Application

azure-saml-ccs-urls

azure-saml-custom-attributes-img1

Image

azure-saml-hpe_ccs_attribute

azure-saml-federation-metadata-download

Step 2: Configure GCLP for SAML Federation

manage

ccs_authentication

claim_domain

metadatasummary

saml-settings

Login to GLCP and Aruba Central using Azure AD

ccs_loginccs_login_saml

Using Azure AD MFA

Troubleshooting

Image

Appendix: Generating the hpe_ccs_attribute

The hpe_ccs_attribute is used to determine your GLCP account. The format for the hpe_ccs_attribute is as follows:

hpe_ccs_attribute-img1

An Example hpe_ccs_attribute for a single GLCP and Aruba Central account would be:

version_1#2fd5f97acbc211ecadc006baf610dd36:00000000-0000-0000-0000-000000000000:Account Administrator:ALL_SCOPES:683da368-66cb-4ee7-90a9-ec1964768092:Aruba Central Administrator:ALL_SCOPES

or

version_1#5b0ec0e8b4f411eca432ba72799953ac:00000000-0000-0000-0000-000000000000:Account Administrator:ALL_SCOPES:683da368-66cb-4ee7-90a9-ec1964768092:Aruba Central Administrator:ALL_SCOPES#5b0ec0e8b4f411eca432ba72799953ac:00000000-0000-0000-0000-000000000000:Account Administrator:ALL_SCOPES

If you’re a Managed Service Provider (MSP), then the hpe_ccs_attribute for Administrator rights to GLCP and Aruba Central for all customer tenant accounts:

version_1#d951f8c8c67711eca2cf9efb55836a4d:00000000-0000-0000-0000-000000000000:Account Administrator|TENANT|:ALL_SCOPES:00000000-0000-0000-0000-000000000000:Account Administrator|MSP|:ALL_SCOPES:683da368-66cb-4ee7-90a9-ec1964768092:Aruba Central Administrator|TENANT| : ALL_SCOPES:683da368-66cb-4ee7-90a9-ec1964768092:Aruba Central Administrator|MSP| : ALL_SCOPES

The hpe_ccs_attribute string for a tenant under a MSP account, would be below. However, you must have the SAML domain configuration configured for that tenant account using the same setting as the MSP account. To say it another way, you must go through this configuration for each tenant account under the MSP.

version_1#f9ee1cdecc1611ecb00e9e24ed17d2a7:00000000-0000-0000-0000-000000000000:Observer|TENANT| :ALL_SCOPES:683da368-66cb-4ee7-90a9-ec1964768092:Aruba Central Administrator|TENANT| :ALL_SCOPES