SecureAuth Arculix
Arculix by SecureAuth allows BeyondTrust customers to securely enable efficient access to Remote Support, while providing a flexible and frictionless user experience.
This integration is based on Arculix SAML (SP-initiated) integration, and is supported for Representatives and Public Portals.
This integration requires a working Arculix test User with the Arculix mobile App that can connect to the Arculix SAML Applications portal.
Before setting up the integration, create a Group Policy in BeyondTrust Remote Support for Arculix users to authenticate to Remote Support.
Note
For more information, see
- Arculix SAML (SP-initiated) integration](https://docs.secureauth.com/arculix/en/arculix-saml--sp-initiated--integration.html)
- Manage users in Acrulix
- Arculix by SecureAuth overview.
- Use SAML for Single Sign-On Authentication
- Group Policies
Configure BeyondTrust for integration with Arculix
Go to the administrative /login interface of your BeyondTrust Remote Support instance and follow these steps:
- Click Users & Security, then click Security Providers.
- Click +ADD.
- Select SAML For Representatives or SAML for Public Portals. Steps and images below are for SAML for representatives. The process is similar for public portals.
- Enter your desired name, such as Arculix.
- Refer to the Arculix documentation (link above) to obtain the Entity ID, Single Sign-on Service URL, and the Certificate.
- Note the information in the Service Provider Settings. This is required when configuring Arculix.
- Verify that User Attribute Settings match the information in Arculix.
- Configure Authorization Settings to match Arculix and assign the default Group Policy. This step is not applicable to SAML for Public Portals.
Configure SecureAuth Arculix
Log in to your Arculix instance and follow these steps:
- Create a new Application. Use a recognizable name, such as BeyondTrust Remote Support.
- Click SAML Service Provider Configuration.
- Do not check Upstream IdP or IdP Initiated.
- Select Email for the Name Identifier.
- For Issuer or Entity ID, use generated Entity ID from the SAML Configuration in Remote Support, in the Service Provider Settings.
- For Assertion Consumer Service (ACS) URL, use generated Assertion Consumer Service URL from the SAML Configuration in Remote Support, in the Service Provider Settings.
- Include the following Asserted Attributes:
- Name: e.g. [email protected]
- EmailAddress
- GivenName
- Surname
- Group: This needs to correspond to a Group Policy in Name in Remote Support.
- For SAML for Public Portals, one more configuration step is required in BeyondTrust Remote Support.
- Click Public Portals, then click Public Sites.
- Edit the portal.
- Ensure Require SAML Authentication and Display Customer Notices are checked.
- This step does not apply to SAML for Representatives.
- Assign the new application to a test user.
- Test the application:
- Click the App in the Arculix portal for the test user.
- Single Sign-On authenticates to Remote Support.
- The test user should have access to Remote Support as per the Group Policy.
For assistance, log into the Customer Portal to chat with BeyondTrust Technical Support.
Updated 5 days ago