Integrate Imprivata Enterprise Access Management

Mobile Access Management's Check Out feature requires customers to connect to a web service to handle the translation of proximity badge IDs to user IDs.

This topic describes how to integrate with Imprivata Enterprise Access Management (formerly Imprivata OneSign) for identity lookup.

If you don’t have EAM, you may use a custom identity lookup service.

Prerequisites

Take note of the following prerequisites:

Configure Imprivata Enterprise Access Management

Configure Mobile Access Management

In the MAM admin console, configure the integration with Imprivata Enterprise Access Management:

  1. In Admin > Check Out, select Imprivata Enterprise Access Management from the Identity Provider list and click Configure.

    Click to enlarge

  2. In the dialog, add the hostname of your Imprivata appliance.

    NOTE:

    Use the FQDN when specifying the Imprivata appliance hostname. DNS names ending in '.local' are not supported.

    Click to enlarge

  3. If your organization uses a root certificate authority, upload that CA certificate to this dialog, in PEM, CER, CRT, or DER format. Otherwise leave Disable SSL checks selected. Click Save.

  4. Restart any Launchpads as prompted.

    To test this configuration, in the MAM console, click the Launchpads tab, then open one of your Launchpads. In Launchpad Actions, select Test Identity Web Service.

About Certificates

Certificates are not required for Check Out or Password AutoFill Workflows. But if your organization would like to enable SSL trust certificates, these requirements must be met:

  1. As per Apple’s trust certificate requirements, certificates must have a validity period of 825 days or fewer. If the certificate applied to EAM has a longer validity, it will be need to be updated at the Imprivata appliance level first.

    After that change has been made, follow the instructions below to obtain the root certificate for use in Mobile Access Management.

    See EAM's documentation on how to update certificates on the Imprivata appliance.

  2. Mobile Access Management requires a root certificate (self signed or issued by a CA authority).

    1. Use any web browser to download the root certificate from the appliance. Make sure you are downloading the Root certificate, not the certificate installed on the Imprivata appliance.

    2. Upload this certificate this certificate to Mobile Access Management.

Allow New Badge and Imprivata PIN Enrollments to EAM

Mobile Access Management allows new badge enrollments and Imprivata PIN enrollments during checkout. This is useful when users have a new or replacement badge that is not already enrolled in EAM.

Applies to iOS and Android devices. Requires Imprivata Locker iOS 3.12 (and later) or Locker Android 1.3 (and later).

  1. In Admin > Check Out > Available Authentication Methods section, select Proximity Badges.

  2. To allow new badge enrollments to EAM from the Locker app, switch the Allow users to enroll new badges to Enterprise Access Management from Lock app setting to ON.

    NOTE:

    This setting is only available when Imprivata Enterprise Access Management is set as the Identity Provider (IdP), and is not supported for other custom web services.

    You do not need to enable check out via network username and password for badge enrollment to work.

    Click to enlarge

  1. To enable a second factor of authentication, switch the Password AutoFill setting to ON and select the authentication method:

    1. Imprivata PIN with numeric keyboard.

    2. Imprivata PIN with alphanumeric keyboard.

    3. Domain password.

  2. When prompted, restart the Launchpads.

Check Out with Username and Password

Mobile Access Management also allows checking out using a username and password as an additional authentication method. This is useful when users forget to bring their badges to work.

BEST PRACTICE:

Imprivata recommends setting Network Username and Password as an available authentication method.

  1. In Admin > Check Out > Available Authentication Methods, select Network Username and Password.

  1. Some organizations use special terms for username, such as "Network ID", "Net ID", or similar. You may customize the terms you use by editing the Username Label and Password Label fields.

    When enabled, the Locker app lock screen adds a button to unlock with the network password.

This button allows users to type their network username and password to unlock the device.

For EAM enterprises configured with multiple domains, the user selects the correct domain above the username input.

On successful checkout, Mobile Access Management can automate a Workflow. The automation must use the trigger Unlocked via Network Username and Password, and the Workflow use the Over the Air Workflow model.

Click to enlarge

Next

Configure Password Autofill