With ePO 5.10.0 CU11, the SAML SSO extension is available, but the documentation is far too sparse.
Product Documentation | McAfee Enterprise
I have setup quite a few SAML configurations using ADFS and Azure, but there are missing pieces here.
Maybe someone knows the answers.
What ePO user config needs to be created in order for the identity provider?
--authentication type? ePO, windows auth or certificate?
For the SAML claim, which value in the identity provider needs to be sent and which field in the ePO user record does it need to match?
Solved! Go to Solution.
Adding steps for clarity:
Beginning with (The test user does not exist in ePO.)
You need to configure first your IdP application and then once configured you will see the option to log in with a user, when you do you need to follow this instructions:
Using the Logon with IdP feature
After a successful configuration, you can click the Log On with IDP option on the McAfee ePO logon page (Service Provider initiated SSO), or click the configured application in the IdP console (Identity Provider initiated SSO), to test the logon option.
On successful authentication, you are navigated to a page that displays the following message — SAML authentication is successful. Close your browser to end your session and contact your administrator for ePO permissions grant..
You need to request the McAfee ePO administrator to grant the required permissions.
A new user is created in McAfee ePO with a user name which is similar to the email address used in your IdP application, the authentication type is set to SAML authentication and no permission sets are assigned.
Was my reply helpful?
If this information was helpful in any way or answered your question, will you please select Accept as Solution in my reply and together we can help other members?
That helps in terms of the username, though the SAML claims are not specified, I assume nameID is the email address/username... BUT. there is no SAML authentication type available in ePO.
The only options are ePO, Windows and Certificate auth.
Setting an existing administrator user name to email address/UPN format does not work. I assume because I am missing the SAML auth type.
correct, there is no option as you wont have to create a user manually, the user will be created automatically with the SAML authentication type once you finish the configuration
Was my reply helpful?
If this information was helpful in any way or answered your question, will you please select Accept as Solution in my reply and together we can help other members?
I re-imported the federation xml file and re-adjusted the IdP URL.
It works. meh.
Adding steps for clarity:
Beginning with (The test user does not exist in ePO.)
Great, thanks for the update
Corporate Headquarters
6220 America Center Drive
San Jose, CA 95002 USA