From the navigation menu, select Authentication Policies.Users that do not have an authentication policy for a specific resource cannot authenticate to log in to that resource. You can add this resource to your existing authentication policies. If you already have authentication policies, you do not have to create a new authentication policy. You must have at least one authentication policy in AuthPoint that includes the GoToMeeting resource. (Optional) In the Description text box, type a description of the group.Īdd an Authentication Policy to AuthPointĪuthentication policies specify which resources users can authenticate to and which authentication methods they can use (Push, QR code, and OTP).In the Name text box, type a descriptive name for the group.From the navigation menu, select Groups.If you already have a group, you do not have to add another group. You must have at least one user group in AuthPoint to configure MFA. This must be the same certificate that you downloaded the metadata for in the previous section. From the AuthPoint Certificate drop-down list, select the AuthPoint certificate to associate with your resource.In the Assertion Consumer Service text box, type.In the Service Provider Entity ID text box, type.From the Application Type drop-down list, select GoToMeeting, GoToAssist, or OpenVoice.From the Type drop-down list, select SAML.From the navigation menu, select Resources.for the GoToMeeting resource to determine which users can authenticate and log in to GoToMeeting and which authentication methods they can use (Push, QR code, and OTP). You must also create an authentication policy Authentication policies specify which resources users can authenticate to and which authentication methods they can use (Push, QR code, and OTP). Type the account information for the account that you want to require SAML authentication for and select a role.īefore AuthPoint can receive authentication requests from GoToMeeting, you must add a SAML resource In AuthPoint, resources are the applications and services that your users connect to.Click Upload SAML metadata file and upload the AuthPoint metadata file.From the How would you like to configure your SAML IDP drop-down list, select Upload SAML metadata file.Go to and log in with your LogMeIn account.The AuthPoint metadata provides your resource, in this case GoToMeeting, with information necessary to identify AuthPoint as a trusted identity provider. If you do not have a certificate, or if all of your certificates have expired, click Add Certificate and use the newly created certificate. We recommend that you choose the certificate with the latest expiration date. Next to AuthPoint certificate you will associate with your resource, click and select Download Metadata.If you have a Service Provider account, you must select an account from Account Manager. From the navigation menu, select Configure > AuthPoint.After you have the metadata file, you can configure GoToMeeting. To start, you must download the metadata file from the Resources page in the AuthPoint management UI. ![]() You have an AuthPoint identity provider (IdP) certificate An AuthPoint IdP certificate is required for SAML authentication.A token is assigned to a user in AuthPoint.īefore you begin these procedures, make sure that: This diagram shows the data flow of an MFA transaction for a GoToMeeting. GoToMeeting Authentication Data Flow with AuthPointĪuthPoint communicates with various cloud-based services and service providers with the SAML protocol. This integration guide can also be used as a reference to configure MFA for GoToAssist and OpenVoice. For this integration, we set up SAML with AuthPoint. ![]() ![]() GoToMeeting can be configured to support MFA in several modes. GoToMeeting must already be configured and deployed before you set up MFA with AuthPoint. ![]() This document describes how to set up multi-factor authentication (MFA) for GoToMeeting, GoToAssist, or OpenVoice with AuthPoint as an identity provider. GoToMeeting Integration with AuthPoint Deployment Overview
0 Comments
Leave a Reply. |