How the authentication flows between Twistlock and SAML
0
Created On 11/27/19 17:00 PM - Last Modified 07/19/22 23:15 PM
Objective
Twistlock supports SAML federation with SAML 2.0 compliant Identity Providers.
Environment
All versions.
Procedure
The steps in the authentication flow between Twistlock and SAML are:
- User browses to the Twistlock Console UI endpoint.
- Twistlock redirects the user’s browser sessions to the registered IdP configured in Manage > Authentication > SAML This is known as the Authentication Request.
- User authenticates at the IdP’s interface.
- The IdP redirects the user’s browser back to the Twistlock authentication endpoint (https://tl_console:8083/api/v1/authenticate) with the SAML Response, which contains a token of claims.
A claim can be attributes of the user (e.g. name, group membership)i, and how they have authenticated.
- Twistlock receives the SAML Response from the IdP.
- Twistlock validates the digital signature of the SAML Response.
- Twistlock validates that the Response Token’s Issuer value matches the Identity provider issuer value in the SAML settings for the IdP.
- Twistlock looks for the groups claim values and attempts to match the group name in Manage > Authentication > Groups that are marked as SAML.
- If the group assignment does not occur, Twistlock attempts to map the nameid claim value to SAML users in Manage > Authentication > Users.
- If these checks pass, the user is authenticated to Twistlock.