SAML Authentication Support
Veeam Backup Enterprise Manager supports single sign-on authentication based on the SAML 2.0 protocol. Enterprise organizations who use a single sign-on service in their IT infrastructure can extend single sign-on capabilities to Veeam Backup Enterprise Manager. Once a user of the organization is logged in to the single sign-on service, the user can access Enterprise Manager without the need to provide a password of the Enterprise Manager user account.
SAML authentication scenario in Veeam Backup Enterprise Manager comprises the following parties:
- Veeam Backup Enterprise Manager user.
- Service provider (SP) — an application accessed by the user. In the Veeam backup infrastructure, the service provider is Veeam Backup Enterprise Manager itself.
- Identity provider (IdP) — an external service (hosted on premises or in the public cloud) that facilitates single sign-on capabilities for Veeam Backup Enterprise Manager. The IdP keeps user identity data in a user store (or attribute store). Upon requests from the SP, the IdP issues SAML authentication assertions, that is, identifies the user and provides the SP with required information about the user.
Veeam Backup Enterprise Manager supports identity providers that support the SAML 2.0 protocol, for example, Active Directory Federation Services (AD FS), Azure Active Directory (Azure AD), Okta, Auth0, Keycloak and so on.
The SP and IdP exchange information in the XML format in accordance with the SAML V2.0 Standard. The Enterprise Manager administrator can specify what information is required from the IdP to set up SAML authentication in Enterprise Manager and how SAML requests and responses are sent.
How It Works
In Veeam Backup Enterprise Manager, SAML authentication is performed in the following way:
- The user accesses Veeam Backup Enterprise Manager web UI under an account of the External type. The account must be registered in advance in Enterprise Manager by the Enterprise Manager administrator.
- Veeam Backup Enterprise Manager redirects a SAML authentication request to the IdP.
- If the user was not previously logged in with the single sign-on service of the IdP, the IdP redirects the user to the URL of the single sign-on webpage.
Alternatively, if the user is already logged in with the single sign-on service, the user proceeds directly to the step 6.
- If the user was not previously logged in with the single sign-on service, the user specifies the password of their account on the single sign-on webpage.
- The IdP issues a SAML assertion and redirects it to Veeam Backup Enterprise Manager in the SAML response. The SAML assertion must meet the following requirements:
- Contain a User Principal Name (UPN) of the user in the <NameID> element of the SAML response.
- Specify that the UPN type is Persistent.
- The user gains access to Veeam Backup Enterprise Manager and can perform operations in Enterprise Manager according to the role and restore scope specified for the user account.
To set up SAML authentication, the Enterprise Manager administrator must complete the following tasks in Enterprise Manager:
- Obtain SAML metadata from the IdP and import this metadata to Veeam Backup Enterprise Manager. The IdP metadata includes the IdP entity ID, login URL, SAML binding and public key certificate that will be used to validate authentication assertions sent by the IdP. For more information, see Specifying Identity Provider Settings.
- [Optional] If you want to use a digital certificate to encrypt and sign SP SAML requests, specify certificate settings. For more information, see Selecting SP Certificate.
- [Optional] Specify advanced settings for SAML authentication. These settings define how the SP and IdP will exchange SAML information. You may want to adjust the settings to strengthen SAML information exchange between the SP and IdP. For more information, see Specifying Advanced SAML Authentication Settings.
- Export SP SAML metadata in Veeam Backup Enterprise Manager and pass this metadata to the IdP. The SP metadata includes the SP entity ID, assertion consumer URL and public key certificate that will be used to encrypt SAML responses sent by the IdP. For more information, see Specifying Service Provider Settings.
- Create user accounts. To provide users of a single sign-on service with access to Enterprise Manager, the administrator must create for these users accounts of the External User or External Group type. For more information, see Managing Accounts and Roles.
On the IdP side, the IdP must configure trust relationship with Veeam Backup Enterprise Manager and configure rules that define what information to provide to the SP. Depending on the IdP, these rules may be configured in the form of claims, attribute statements and so on. For an example of how to perform this task in AD FS, see Appendix B. Configuring AD FS for SAML Authentication.