Using SSW to Access an Internal Device42 Instance with SAML SSO

Prev Next

This guide explains how to connect to a web service that is only accessible within a private network using SSW. It uses Device42 as an example and enables SAML SSO login through a public SAML application.


Scenario Overview

  • Internal Service: Device42 web application
  • Internal IP: ip-172-31-28-185.us-west-1.compute.internal
  • Access Method: Through SSW Private App
  • Authentication Method: SAML SSO

Step 1: Create a Private App in SSW

  1. Go to the SSW Admin Console.
  2. Create a Private App:
    • App Type: HTTPS
    • Connector: Choose one that has access to ip-172-31-28-185.us-west-1.compute.internal
    • FQDN: ⚠️ Make sure to record the FQDN you use here (e.g., mjizzwfim2et.app.e1-sanfrancisco-c1-usw2.stage.ztw.splashtop.com) . You'll need it for the SAML configuration.
    • Fill in the rest of the details as needed.

image.png

image.png


Step 2: Create a Public SAML App in SSW

  1. Create a Public App:
    • ACS URL: https://<Private App's FQDN>/saml2_auth/acs/
      Replace <Private App's FQDN> with the hostname obtained from the previous step (your IDP configuration).
    • Sign-in Redirect URIs: The URI you want users to land on after a successful login (e.g., a dashboard or homepage).
    • EntityID: https://<Device42 URL>/saml2_auth/acs/
      Use the original Device42 URL here without replacing the hostname.
    • Companion Private App: Select the Private App you created in Step 1.
  2. SAML Attributes:
    • Add one attribute:
      • Key: username(This can be customized based on your Device42 config)
      • Value: firstName (Please ensure this field in the user profile in SSW matches the username in Device42)
  3. Save the app.
  4. Copy the Metadata URL from the right-hand panel. You'll need this in Device42.
    image.png

Step 3: Set User Profile Fields

Since Device42 does not support Just-in-Time (JIT) user provisioning, the user must already exist in Device42.

If you mapped the SAML attribute username to firstName, make sure the First Name field in the user profile on SSW matches the Device42 username exactly.
image.png


Step 4: Configure SAML in Device42

  1. Go to Device42’s SAML settings page.

  2. Metadata URL:

    • Paste the Metadata URL from the SAML app created in Step 2.
  3. Username Field:

    • Set this to username (this must match the key used in SSW SAML Attributes).
  4. Login Options:

    • Select Auto Login.
  5. Require Signed Response (optional):

    • If you enable this, ensure that Sign SAML Response is also enabled in the second tab of your SAML app in SSW.
      image.png
  6. Save and Restart:

    • Navigate to Application → Restart Application
    • Click Restart Application to apply the new configuration.
      image.png

image.png


Result

Users can now access the internal Device42 service through the FQDN configured in the Private App, with SAML SSO authentication managed by SSW.


Optional Enhancement

Consider enhancing your SAML app integration logic to auto-update the ACS URL based on the bound Private App's FQDN.


Let us know if you'd like a diagram to accompany this guide.