Bridge | Getting Started
Unlike many of Cirrus Identity modules, the Cirrus Bridge is usually not provisioned before having a kickoff call, or at least a few email exchanges with customers. In most cases, Cirrus will need organizational information and to confer with you about integration decisions before the Bridge is set up. This does not imply the Bridge has more complexity -- quite the contrary. The Cirrus Bridge is often one of the quickest modules to deploy.
The following are the steps needed to get started using Cirrus Bridge:
Customers should plan out their Bridge deployment. Cirrus Identity can offer generally accepted practices, customer stories, and professional services to help. Reviewing the questions covered by the Cirrus Bridge | Planning Steps is a good first step:
Is the organization’s identity management (IdM) solution supported by the Cirrus Bridge?
What are the Service Providers (SPs) that will be accessed using the Bridge?
What capabilities of your IdM solution do you want to extend with the bridge?
Will the Bridge be registered with InCommon or one of the other eduGAIN federations?
Will the Bridge also function as a CAS identity provider?
If your organization doesn’t have a current registration, has your organization performed the needed administrative procedures to join the federation and has a site administrator been assigned?
If your organization does have a current registration, Cirrus Identity offers an add-on service that allows you to transition the existing federation registration to the Bridge. You will maintain your existing entityID and signing certificate in the process. A new TLS certificate will be requested. During setup, Cirrus will work with the organization to securely transfer the cryptographic material during setup of the Bridge.
Generally we ask organizations to provide the SP metadata in a local metadata aggregate that we can consume.
If organizations cannot provide an aggregate or there are only a handful of SPs, the metadata can be sent to the Cirrus Support Center.
If the Bridge is a migration from an existing IdP (for example Shibboleth or SimpleSAMLphp), the organization will need to provide certain configuration files to Cirrus Identity to support configuration of the Bridge. The files needed will depend on several factors related to the deployment and will be discussed during the initial kickoff call or email exchange.
If there are any SPs that require different SAML certs/keys, are looking for a different IdP entityId, or are looking for SAML V1 style inline scopes, we will configure the integration to accommodate those requirements.
Fairly early in the process, Cirrus Identity will ask the customer to create the needed integration in the organization’s identity management (IdM) solution. For example, both Azure Active Directory and Okta require the organization to create an “application” for the integration. Cirrus Identity will provide vendor specific instructions for the integration. See “Cirrus Bridge Setup in Authentication Source” for examples of this setup.
By default, the Cirrus Bridge is configured to comply with REFEDS Research and Scholarship basic attribute release. If a customer provides an attribute to map to eduPersonAffiliation, we will also include that. We work with customers to configure any additional SAML attribute mapping and release policies as needed and count against the caps defined by the Bridge subscription.
Attribute setup will also factor in older style attribute naming requirements specific to SPs.
If the organization is using a multi-factor authentication (MFA) solution, the Bridge can be configured to assert the AuthnContextClassRef as defined by REFEDS MFA standard. Depending on the organization’s IdM solution, some attribute configuration may be required.
If the Bridge is to support CAS services, we will set up an additional “CAS Bridge” for your environment (we offer this at a discounted price for campuses already using our SAML Bridge). You will need to define the “cas:user” value for services, and then send Cirrus Identity authorized service URLs.
Because the CAS protocol requires a back channel connection, Cirrus Identity will recommend an additional endpoint for the CAS services. This allows any critical services to be tested ahead of a production deployment.
If there are additional attributes to be included with the CAS response ticket, those will need to be mapped.
If the Bridge is taking over for an existing CAS installation, the existing configuration will need to be assessed much like the SAML IdP one outlined in Step 4.
Cirrus Identity will work with the organization to put together a testing plan before deployment. This will vary based on the migration needs, number of active service providers, and complexity of existing integrations.
If this Bridge deployment will be a new InCommon (or other federation registration), Cirrus Identity will provide the information and instructions needed for the customer to register their Bridge instance with the federation operator.
Once these steps are complete, you are ready to use Proxy with your service provider.