Citrix Content Collaboration single sign-on configuration guide for dual identity providers
This document helps with the configuration of utilizing both Citrix Endpoint Management and Active Directory Federated Services (ADFS) as the Identity Provider (IdP) for a single Citrix Content Collaboration account. The resulting configuration allows the token signing certificate on the ADFS server to be the same as the SAML certificate on the Citrix Endpoint Management server. This provides a single Citrix Content Collaboration account to:
- Use Citrix Endpoint Management as the IdP for MDX-wrapped apps. Providing a true single sign-on (SSO) experience from a mobile device using Citrix Files MDX applications.
- Use ADFS as the SAML IdP for SSO to webapps.
Prerequisites
- Citrix Endpoint Management 10.x server with fully functioning single sign-on for MDX configured to the Citrix Content Collaboration account.
- ADFS installed and configured within the infrastructure.
- Access to an administrator account within Citrix Content Collaboration with the ability to configure single sign-on.
Preparing the ADFS Token Signing Certificate
When configuring ADFS for SSO to Citrix Content Collaboration, it is required to upload the ADFS token signing certificate to the Citrix Content Collaboration control panel without the private key. ADFS generates a self-signed certificate to be used for token signing and token decrypting with a 1-year expiration. However, the self-signed certificate does contain a private key.
At the one-year mark, the self-signed certificate is renewed using Automatic Certificate Rollover 15 days before expiration and becomes the primary certificate. This causes all existing SSO trust relationships to fail. For this configuration, the SAML certification from the Citrix Endpoint Management console is exported with an expiration of 3 years. The certificate validity period is customizable and mitigates the need to renew the token signing certificate at the 1-year mark.
Generate the SAML certificate
- Sign in to the Citrix Gateway GUI.
- Navigate to Traffic Management > SSL.
-
Under Getting Started section, select Root-CA Certificate Wizard.
You are now prompted to create the private key.
- In the Key Filename field, provide a name for your key.
- Key Size, 2048.
- Public Exponent Value, 3.
-
Click Create to create the key.
The next step is to create the Certificate Signing Request (CSR).
- In the Request File Name field, enter a name for the CSR.
- The Key Filename and PEM format are pre-populated.
- Set Digest Method to SHA256.
- In Distinguished Name Fields, provide information about your organization.
- In Attribute Fields, a Challenge Password is not needed. However, the Company Name can be added.
-
Click Create to complete the CSR Request.
The final step is to create the SAML certificate.
- In the Certificate File Name field, enter the name of your certificate.
- The Certificate Format is pre-populated with PEM.
- The Certificate Request File Name reflects the CSR you created in the previous step.
- The Key Format defaults to PEM.
- Specify the Validity Period (in days) you want the certificate to be valid for. In this example, the created certificate is a 3 year certificate, so enter 1095.
- The Key Filename is pre-populated from the first step.
-
Click Create to create the certificate.
- After creating the certificate, you can exit the Wizard as you do not need to install the certificate on Citrix Gateway.
- Click Cancel and click YES to confirm you would like to return back to the main SSL GUI screen.
Export the SAML certificate
You now need to export the newly created certificate and key off Citrix Gateway for use on the Citrix Endpoint Management server and on ADFS. For Citrix Endpoint Management, you need the saml_dualidp.cer file and saml_dualidp.key file created in the previous steps, as the cert and key are already properly formatted for Citrix Endpoint Management. Follow the steps to save the files to a location we can then use to upload them to your Citrix Endpoint Management server when replacing its built-in SAML certificate.
- In Citrix Gateway, under Traffic Management > SSL, under Tools, click Manage Certificates / Keys / CSRs.
-
From the Manage Certificates page, click Date Modified, which brings the newest files to the top. You now see the 3 newly created files from the previous steps. If you do not see them, you can show more than 25 items per page.
- Select the saml_dualidp.cer file and choose Download. Save to a location of your choice.
- Follow the previous step for the saml_dualidp.key file.
- Click Back to return to the previous page.
Next, export the certificate and key in a file format that the ADFS server understands.
- Under the same Tools section as earlier, select the option to Export PKCS#12.
- In the Choose File field, enter saml_dualidp.pfx.
- In the Certificate File Name field, select Choose File, Date Modified, and select the saml_dualidp.cer file. Click Open.
- In the Key Filename field, select Choose File, Date Modified, and select the saml_dualidp.key file. Click Open.
- Provide an Export Password.
- Provide the PEM Passphrase.
- Click OK to finish the export.
Now you need to copy the .pfx file off Citrix Gateway and onto a network location.
- From the Tools menu once again, select the option to Manage Certificates / Keys / CSRs.
- Select the newly created saml_dualidp.pfx file, and choose Download.
- Save the file somewhere locally accessible.
- Close the windows in Citrix Gateway.
The SAML certificate creation process is complete.
Upload newly created token signing certificate to ADFS
The first step is to disable certificate rollover on the ADFS server.
- Create a remote connection to your ADFS server.
- By default, ADFS enables AutoCertificateRollover to renew the self-signed certificate at the 1-year mark. This feature must be disabled to upload the newly created token signing certificate.
- Run PowerShell as Administrator on the ADFS server.
- Type:
Get-ADFSProperties
. - To disable AutoCertificateRollover:
Set-ADFSProperties -AutoCertificateRollover $false
You need to then import the previously exported saml_dualidp.pfx file onto the ADFS server so we can use it as the token signing certificate.
- On the ADFS server, right-click, Start > Click Run > Type mmc, and select enter to open a Snap-in.
- Click File > Add/Remove Snap-in.
- From the available snap-ins section, select Certificates, then click Add.
- Select Computer Account, click Next.
- Select Local Computer and then Finish, click OK.
- Under Console Root, Expand Certificates > Personal > Certificates.
- Right-click the Certificates folder and select All Tasks > Import.
- From the Welcome screen, click Next.
- Browse to the saml_dualidp.pfx file you saved earlier, click Open.
- Select Next, type the password for the private key, select Next again.
- Select Place all certificates in the following store, Personal and click Next.
- Click Finish to complete the import and close the MMC Snap-in.
Now you need to change the token signing certificate in ADFS.
- On the ADFS server, from the Server Manager Dashboard, select Tools > ADFS Management.
- On the left hand side of the ADFS Management Console, expand Service > Certificates.
- Under the Actions menu, select Add Token-Signing Certificate, and select the newly imported token signing certificate.
- The newly added token signing certificate is added as a secondary certificate. You must make it the primary.
- Expand Service and then select Certificates.
- Click the Secondary token signing certificate.
- In the Actions pane on the right, select Set As Primary. Click Yes at the confirmation prompt.
Citrix Endpoint Management configuration
To use the same certificate on Citrix Endpoint Management, you only need to perform two actions.
Backup Citrix Endpoint Management SAML certificate
- Sign into the Citrix Endpoint Management server, click the gear icon towards the top right, then under Settings, select Certificates.
- Highlight the SAML certificate, then click Export.
- Choose to also export the private key, then click OK.
- Store the certificate in a safe location.
Install new SAML certificate
- Sign into the Citrix Endpoint Management server, click the gear icon, then under Settings click Certificates.
- Click Import, then select the following options:
- Import: Certificate
- Use as: SAML
- Certificate import: Browse your workstation or network for the previously exported saml_dualidp.cer file.
- Private key file: Browse your workstation for the previously exported saml_dualidp.key file.
- Password: enter the password for the private key.
- Description: enter enough detail for others to know its function.
-
Click Import to complete.
- On the Citrix Endpoint Management server, click Configure, then ShareFile.
- If you have a previous configuration, click Save on the bottom right of the screen. This step updates the Citrix Content Collaboration account with the X.509 certificate that has been created in the previous steps. It also overrides the current SSO configuration settings, which are changed in the steps outlined in the next section.
- If Citrix Content Collaboration has not yet been configured, in the Domain field, enter your Citrix Content Collaboration account.
- Select a delivery group that has access to the Citrix Files MDX application.
- Provide your Citrix Content Collaboration user name. This is a local administrative user account.
- Enter the Citrix Content Collaboration password (not your Active Directory password).
- Leave User account provisioning OFF (especially if you are using the User Management Tool).
-
Click Save to complete the Citrix Content Collaboration configuration on Citrix Endpoint Management.
Citrix Content Collaboration single sign-on configuration check
Once both Citrix Endpoint Management and ADFS have been configured for Citrix Content Collaboration, follow the steps below to validate the SSO settings.
- Sign into your Citrix Content Collaboration account using the web UI, click Admin, then Configure Single Sign-on page.
- Issuer/Entity ID: this needs to be identical to the Identifier Name within the ADFS configuration.
-
Login URL: Login URL to ADFS (example:
https://adfs.company.com/adfs/ls
). -
Logout URL: Logout URL to ADFS (example:
https://adfs.company.com/adfs/ls/?wa=wsignout1.0
). This needs to be added as a logout point on ADFS, if not done so already. - Enable Web Authentication: Yes
-
SP-Initiated Auth Context: Select the option User Name and Password for Forms Authentication, or Integrated Authentication (according to what your ADFS server is configured with).
Testing
Re-enroll your device to Citrix Endpoint Management, download the app and check if MDX SSO is working. You can also perform testing using SP initiated authentication: https://[subdomain].sharefile.com/saml/login
.