Report errors or omissions

Integrate Forest Admin

Forest Admin enables organizations to easily create an Admin panel to manage their data. See https://www.forestadmin.com/. You can protect access to Forest Admin by integrating Forest Admin with Identity as a Service. Once integrated, users can use single sign-on to log in to their LogMeIn account through Identity as a Service.

Note: This integration was tested using Identity as a Service version 5.32 and Forest Admin version September 2023. Other versions of Forest Admin may require integration and configuration steps that differ from those documented in this procedure. For other versions of Forest Admin, this integration guide may be used as an initial approach for integrating Forest Admin. In the event of other issues, contact support@entrust.com for assistance.

Prerequisites

To use these instructions, you must first create a project for IDaaS in Forest Admin. Consult the Forest Admin documentation for instructions.

To integrate Forest Admin with Identity as a Service, you must do the following:

Before you begin, open two browser windows. In one window, log in to your Forest Admin project. In the other window, log in to your IDaaS administrator account.

Step 1: Copy the ACS URL, SP Entity ID, and relay state from Forest AdminStep 1: Copy the ACS URL, SP Entity ID, and relay state from Forest Admin

Log in to Forest Admin. The Forest Admin home page appears.

Click your project and select Organization from the login account menu at the top-right of the screen.

Click the Security tab. The Security page appears.

Click Configure Single Sign-on. The Information to configure single sign-on appears.

Copy the following to a text file, such as Notepad:

ACS URL (the default is https://forestadmin.com/sso/saml)

SP Entity ID (the default is https://app.forestadmin.com)

Default relay state

Leave this window open.

 

Step 2:  Add Forest Admin to Identity as a ServiceStep 2:  Add Forest Admin to Identity as a Service

Add Forest Admin as an application to Identity as a Service

Log into your Identity as a Service administrator account.

Click > Resources > Applications. The Applications Lists page appears.

Click Add. The Select an Application Template page appears.

Do one of the following:

Select SAML Cloud Integrations from the search drop-down list and scroll to find the application you want to add to IDaaS.

- or -

In the Search bar, enter a search option to filter for the application you want to add to IDaaS.

Click Forest Admin. The Forest Admin page appears.

Enter an Application Name.

Enter an Application Description.

Optional. Add a custom application logo.

Click next to Application Logo. The Upload Logo dialog box appears.

Click  to select an image file to upload.

Browse to select your file and click Open. The Upload Logo dialog box reappears showing your selected image.

If required, resize your image.

Click OK.

Select the Authentication Flow that appears to users during login.

Click Next. The General page appears.

In the Default Assertion Consumer Service URL field, enter the ACS URL you copied in Step 1: Copy the ACS URL, SP Entity ID, and Relay State from Forest Admin.

In the Service Provider Entity ID (Issuer)  field, enter the SP Entity ID you copied in Step 1: Copy the ACS URL, SP Entity ID, and Relay State from Forest Admin.

Leave the Single Logout Service URL field empty.

Enter the SAML Session Timeout to the time when the SAML Assertion times out. The maximum is 720 minutes.

Enter the Max Authentication Age (seconds) to set the maximum amount of time that can elapse before a user is required to reauthenticate during a new login attempt. This applies for both SP-initiated and IDP-initiated login. Set this field to -1 to disable this feature.

From the SAML NameID Attribute drop-down list, select Email.

From the SAML NameID Encoding Format drop-down list, select Email.

From the SAML Signing Certificate from the drop-down list, select the signing certificate.

From the SAML Signature Algorithm drop-down list, select SHA512.

Optional: Select Respond Immediately for Unsuccessful Responses to return to the application immediately after a login failure, rather than allow user to try again with a different userID.

Deselect Enable Go Back Button if you do not want users to be able to go back to the Forest Admin login page to log in.

Select Show Default Assertion Consumer URL Service in the My Profile. When selected, the Default Assertion Consumer URL appears in a user's My Profile page in addition to relay states and Alternative Assertion Consumer URLs.

Optional. Add Alternative Assertion Consumer Service URLs, as follows:

Click Add.

Enter a Name.

Enter a URL Value.

Select Show in My Profile to display the Alternative Consumer Service URL in a user's My profile page.

Optional. Add an Application Logo.

Click Add.

Repeat these steps to add more Alternative Assertion Consumer Service URLs.

Relay states appear on the user's My Profile page.

To add a relay state.

Under Relay State, click Add. The Add Relay State dialog box appears.

Enter ForestAdmin-RelayState in the relay Name field.

Enter the Value for the relay state. This setting specifies the application or URL that a user is redirected to after successful authentication. For Forest Admin, enter the Default Relay State you copied in Step 1: Copy the ACS URL, SP Entity ID, and Relay State from Forest Admin.

Click Add.

Click Submit.

Step 3: Add a resource ruleStep 3: Add a resource rule

See Create resource rules.

Step 4: Download the metadata from Identity as a ServiceStep 4: Download the metadata from Identity as a Service

Download the Metadata file from Identity as a Service

In Identity as a Service, click > Security > Applications. The Applications List page appears.

Do one of the following:

Click next to the application you are integrating with Identity as a Service.

–or–

Click next to the application you are integrating with Identity as a Service and select SAML IDP Metadata.

 The SAML Application Metadata dialog box appears.

Select the certificate to include in the SAML IDP Metadata file from the drop-down list.

If applicable, Select the domain to include in the SAML IDP Metadata file from the drop-down list.

Enter the Lifetime, in days, for the SAML IDP Metadata file. The value must be between 2 and 730.

Do one of the following, as required:

Copy the Public Endpoint to paste into your SAML application being used Identity Provider authentication.

Click Download.

Note:  If you are using multiple domains, you must download each domain's metadata file separately because the values in the metadata file vary for each domain.

Step 5: Configure Forest Admin for Identity as a Service authenticationStep 5: Configure Forest Admin for Identity as a Service authentication

Configure Forest Admin for Identity as a Service single sign-on

Return to the page you left open in Step 1: Copy the ACS URL, SP Entity ID, and Relay State from Forest Admin.

Scroll to Choose a method.

Select XML file upload or XML file endpoint.

Click Configure. The Configure Single Sign-on page appears.

Click Add a metadata XML.

Browse to locate and upload the XML file you downloaded in Step 4: Download the metadata from Identity as a Service.

Click Test Configuration. When configuration is complete, you are returned to the Security page.

Click Enable Single Sign-on. The Single Sign-On /SAML page appears.

Scroll to Options.

Toggle ON Enable Identity Provider initiated login.

Click Save.

Log out of your Forest Admin project.

Step 6: Test the integrationStep 6: Test the integration

Testing Service Provider Login

Open a Web browser and enter the URL for your Forest Admin account.

Click Single Sign-on. You are redirected to Identity as a Service.

Log in to IDaaS.

Respond to the second factor authentication. If you respond successfully, you are logged into Forest Admin.

Testing Identity as a Service redirect log in

Log in to your Identity as a Service account.

Go to your My Profile page if you are not already there.

Under Applications, click Forest Admin.

Respond to the second factor authentication challenge. If you respond successfully, you are logged in to Forest Admin.