SAML Authentication XML Configuration Examples
Tip: Review the Tenable SAML Configuration Quick-Reference guide for a step-by-step guide of how to configure SAML for use with Tenable Security Center Director.
Identity provider SAML configurations vary widely, but you can use the following examples to guide your SAML-side configurations.
OneLogin Example
In the OneLogin SAML configuration, paste data from your .xml download file.
| OneLogin Field | Description |
|---|---|
| Relay State |
Leave this field blank. |
| Audience | Type |
| Recipient | Type https://<Tenable Security Center host>/saml/module.php/saml/sp/saml2-acs.php/1, where <Tenable Security Center host> is the IP address or hostname for Tenable Security Center Director. |
| ACS (Consumer) URL Validatior | Type -*. |
| ACS (Consumer) URL | Type https://<Tenable Security Center host>/saml/module.php/saml/sp/saml2-acs.php/1, where <Tenable Security Center host> is the IP address or hostname for Tenable Security Center Director. |
| Single Logout URL | Type https://<Tenable Security Center host>/saml/module.php/saml/index.php?sls, where <Tenable Security Center host> is the IP address or hostname for Tenable Security Center Director. |
Okta Example
In the Okta SAML configuration, paste data from your .xml download file.
| Okta Field | Description |
|---|---|
| General | |
| Single Sign On URL | Type https://<Tenable Security Center host>/saml/module.php/saml/sp/saml2-acs.php/1, where <Tenable Security Center host> is the IP address or hostname for Tenable Security Center Director. |
| Recipient URL | Type https://<Tenable Security Center host>/saml/module.php/saml/sp/saml2-acs.php/1, where <Tenable Security Center host> is the IP address or hostname for Tenable Security Center Director. |
| Destination URL | Type https://<Tenable Security Center host>/saml/module.php/saml/sp/saml2-acs.php/1, where <Tenable Security Center host> is the IP address or hostname for Tenable Security Center Director. |
| Audience Restriction | Type |
| Default Relay State | Leave this field blank. |
| Name ID Format | Set to Unspecified. |
| Response | Set to Signed. |
| Assertion Signature | Set to Signed. |
| Signature Algorithm | Set to RSA_SHA256. |
| Digest Algorithm | Set to SHA256. |
| Assertion Encryption | Set to Unencrypted. |
| SAML Single Logout | Set to Disabled. |
| authnContextClassRef | Set to PasswordProtectedTransport. |
| Honor Force Authentication | Set to Yes. |
| SAML Issuer ID | Type http://www.okta.com/${org.externalKey}. |
| Attribute Statements | |
| FirstName | Set to Name Format: Unspecified and Value: user.firstName. |
| LastName | Set to Name Format: Unspecified and Value: user.lastName. |
| Set to Name Format: Unspecified and Value: user.email. | |
| username |
Set to Name Format: Unspecified and one of the following:
|
Microsoft ADFS Example
In the Microsoft ADFS configuration, paste data from your .xml download file.
| Microsoft ADFS Configuration | Description |
|---|---|
| Edit Authentication Methods window | |
| Extranet | Select, at minimum, the Forms Authentication check box. |
| Intranet | Select, at minimum, the Forms Authentication check box. |
| Add Relying Party Trust wizard | |
|
Welcome section |
|
|
Specify Display Name section |
In the Display Name box, type your Tenable Security Center Director FQDN. |
|
Configure Certificate section |
Browse to and select the encryption certificate you want to use. |
|
Choose Access Control Policy section |
Select the Permit everyone policy. |
| Ready to Add Trust section |
|
| Finish section | Select the Configure claims issuance policy for this application check box. |
| Edit Claim Issuance Policy window |
Add one or more claim rules to specify the ADFS value you want Tenable Security Center Director to use when authenticating SAML users. For example: To transform an incoming claim:
To send LDAP attributes as claim:
Note:Tenable Support does not assist with claim rules. |