You are viewing an old version of this page. View the current version.

Compare with Current View Page History

Version 1 Next »

This documentation will help you integrate your identity services with Blue Jeans through Internet2’s NET+ program. Associated portions of the NET+ Identity Guidance Services are noted below.

Discovery and Authentication

Blue Jeans offers Service Provider (SP) Initiated logins using dedicated customer landing pages. Each customer will have a dedicated landing page that is exposed to end-users. The landing page typically will have a “Login” button that will re-direct the user to a page hosted by the customer where the user will enter their credentials. Once authenticated, the user gets re-directed to Blue Jeans web-app where the user will get access to the service.

Blue Jeans also supports Identity Provider (IdP) initiated logins.

Attributes

Blue Jeans can consume the following attributes in a SAML response:

Blue Jeans Attribute

Recommended SAML Attribute Name

Optional

User ID

SAML 2.0 Persistent NameID

Yes, if no email

Email

urn:oid:0.9.2342.19200300.100.1.3

Yes, if no persistent Id

First Name

urn:oid:2.5.4.42

Yes

Last Name

urn:oid:2.5.4.4

Yes

Title

urn:oid:2.5.4.12

Yes

Phone

urn:oid:2.5.4.20

Yes

Company

urn:oid:2.5.4.11

Yes

Mapping of incoming SAML attributes to attribute fields persisted by Blue Jeans can be configured via the Blue Jeans admin console by each organization.

Blue Jeans requires a unique, persistent identifier per user that can be sent as either an attribute or a SAML 2.0 Persistent NameID.

The attribute mapped to email should contain a routable email address in order to receive important service related communication sent by Blue Jeans.

Privileges

Blue Jeans does not support any explicit attribute to manage user access control. The IdP can enforce a policy to not release attributes to Blue Jeans for unprivileged users, and users without required attributes will not be able to use the application.

Provisioning

Blue Jeans user representations are provisioned using dynamic front channel provisioning (3.1), so any user that can successfully authenticate to the IdP with release of the attributes required for the Blue Jeans service are provisioned in Blue Jeans. The primary key for the user record will be the persistent identifier from the assertion.

Users are able to change any visible attribute(e.g. first name, last name, etc.) in their Blue Jeans account independent of the values sent by the IdP. Changes to user attributes received from the IdP after a user has been initially provisioned will overwrite prior IdP-supplied values but not user-supplied values.

Deprovisioning

Deprovisioning of user data is a manual process and can only be initiated by contacting the Blue Jeans support team.

Logout

Blue Jeans logs out a user locally and supports the ability for organizations to configure a URL to redirect a user to upon successful local logout. Blue Jeans does not support single logout through SAML 2.0 or back-channel mechanisms.

Implementation

Blue Jeans uses SAML 2.0 software that has known compatibility with most commonly used SAML 2.0 implementations, including Shibboleth, simpleSAMLphp, ADFS, Okta, OneLogin, AssureBridge, VMWare Horizon, Ping Identity, and more.

Blue Jeans only supports unencrypted SAML assertions at this time.

Metadata

SAML 2.0 metadata for the Blue Jeans SP is available at http://bluejeans.com/support/saml-metadata.xml

Example Configuration for SAML Implementations

Please add example Shibboleth configuration here.

Blue Jeans has written some general instructions for a standard ADFS configuration which are available at http://c.na9.content.force.com/servlet/servlet.FileDownloadPkb?file=00PE0000003YyeL&orgId=00DE0000000IOFe&pPid=501E00000008xQv

  • No labels