Summary: Azure Active Directory's Application Proxy provides secure remote access to on-premises web applications. After a single sign-on to Azure AD, users can access both cloud and on-premises applications through an external URL or an internal application portal.
This article explains how to configure Cayosoft Administrator for remote access through Application Proxy in Azure Active Directory
Applies to: Cayosoft Administrator 7.3.0 and later
ID: KB20200819-1
Content:
Check the required prerequisites
-
You should have Microsoft Azure AD premium subscription in your tenant.
-
You should use an application administrator account for configuration.
-
User identities must be synchronized from an on-premises directory or created directly within your Azure AD tenants.
-
Using Application Proxy requires Windows server running Windows Server 2012 R2 or later. For details please see Windows Server section in Microsoft article.
-
Check the TLS requirements.
-
Prepare your on-premises environment:
-
Open ports to outbound traffic.
-
Install and register the connector
-
To use Application Proxy, install a connector on each Windows server you're using with the Application Proxy service. During installation specify credentials of an application administrator account.
Add Cayosoft Administrator application to Azure AD
-
Sign in as an administrator in the Azure portal.
-
In the left navigation panel, select Azure Active Directory.
-
Select Enterprise applications, and then select New application.
-
In the On-premises applications section, select Add an on-premises application.
-
In the Add your own on-premises application section, provide the following information about your application:
- Name: specify the Application Proxy name. For example, CayoAdmin.
- Internal URL: specify Cayosoft Administrator endpoint URL with the server name and trailing "/" in the end. For example, https://cayoadminserver.domain.com/CayosoftWebAdmin/
- External URL: generates automatically. You will need to copy\paste it for Cayosoft Administrator Web Portal Settings.
- Pre Authentication: use default value Azure Active Directory.
Note: Users or groups must first be assigned to this application before being able to access it.
-
Leave default values for other application proxy optional parameters.
- Click Save
Assign users or groups to CayoAdmin proxy application
Before adding a user or group to the CayoAdmin proxy application, verify that they already have permissions to access the application from inside the corporate network.
-
Select Enterprise applications, and then select created CayoAdmin proxy application.test.
-
Select Getting started, and then select Assign a user for testing.
-
Under Users and groups, select Add user.
-
Under Add assignment, select Users and groups. The User and groups section appears.
-
Choose the users and groups you want to add.
-
Choose Select, and then select Assign.
Configure CayoAdmin Application Proxy when Automatic Single Sign-on (SSO) for Azure Active Directory is used
-
In Admin Console navigate to Home > Configuration > Web Portal > Web Portal Settings
-
In Server URL paste External URL from CayoAdmin application proxy.
-
Ensure that User sign-in authentication method is set to Automatic Sign-in (SSO) for Azure Active Directory / Office 365 accounts.
-
Set Enable integration with Azure AD Application Proxy to Yes.
-
Save changes.
-
Perform IIS reset.
Test the sign-in
- In Web browser specify External URL from CayoAdmin application proxy.
- Sign-in to Azure AD using credentials of the user that is assigned to CayoAdmin proxy application.
- Ensure that Cayosoft Administrator Web Portal home page appears.
Configure CayoAdmin Application Proxy when Automatic Single Sign-on (SSO) for Active Directory is used
Configure Active Directory
- If the connector and application server in the same domain, perform these steps that enable the Application Proxy Connector to impersonate users in AD against the applications defined in the list.
- If the connector and application server in different domains, you should perform these steps.
Configure single sign-on
- In the Azure portal select created CayoAdmin application and click Single sign-on.
- Select Integrated Windows Authentication as Single sign-on method.
- In Internal Application SPN specify http/cayoadminserver.domain.com
- Delegated Login Identity is the value which connector service takes to authenticate a user using Key Distribution Center (KDC). It must match to UserPrincipalName or samAccountName user attributes in the on-prem Active Directory. If Azure AD UserPrincipalName matches to on-prem Active Directory UserPrincipalName, you can use User principal name as Delegated Login Identity.
- Click Save
Configure Cayosoft Administrator
-
In Admin Console navigate to Home > Configuration > Web Portal > Web Portal Settings
-
In Server URL paste External URL from CayoAdmin application proxy.
- Ensure that User sign-in authentication method is set to Automatic Sign-in (SSO) + Sign-in form for Active Directory accounts.
-
Set Enable integration with Azure AD Application Proxy to Yes.
-
Save changes.
-
Perform IIS reset.
Test the sign-in
- In Web browser specify External URL from CayoAdmin application proxy.
- Sign-in to Azure AD using credentials of the user that is assigned to CayoAdmin proxy application.
Note: Ensure that the user that is assigned to CayoAdmin proxy application is hybrid and has Active Directory account that is synced to Azure AD.
- Ensure that Cayosoft Administrator Web Portal home page appears.
Comments
0 comments
Please sign in to leave a comment.