/

Pulse Secure

Pulse Secure

1Kosmos integrates with Pulse Secure (now Ivanti Connect Secure) as a SAML 2.0 identity provider, replacing password-based VPN login with biometric authentication.

Integration type

Auth/IDP

Overview

Ivanti Connect Secure (formerly Pulse Connect Secure) is an SSL VPN gateway for enterprise remote access. 1Kosmos integrates as a SAML 2.0 identity provider, replacing password-based VPN authentication with biometric verification via the 1Kosmos mobile app. Users are redirected to 1Kosmos, authenticate biometrically, and return with a valid SAML assertion.

What we solve

Enterprises using Pulse Secure/Ivanti Connect Secure for SSL VPN need phishing-resistant authentication for remote access so VPN credentials can’t be easily stolen or reused. This integration enables SAML 2.0 SSO from the VPN gateway to 1Kosmos so users authenticate biometrically before gaining VPN access.

The SAML configuration on Ivanti Connect Secure is performed through the admin portal under System → Configuration → SAML, followed by Authentication → Auth Servers → New SAML Server. The gateway's FQDN is set as the Host FQDN for SAML and is used to generate the SP Entity ID and ACS URL. The ACS URL follows the pattern https://[FQDN]/dana-na/auth/saml-consumer.cgi and the Entity ID pattern is https://[FQDN]/dana-na/auth/saml-endpoint.cgi?p=sp1.


Prerequisites

  • Active 1Kosmos tenant: Administrator access to the AdminX portal. Contact 1kosmos.com/contact if not yet provisioned.

  • Ivanti Connect Secure administrator access: Admin access to the Connect Secure admin portal. SAML SP configuration requires admin rights to Authentication and System → Configuration settings.

  • Valid SSL certificate on the Connect Secure gateway: The FQDN used for SAML must match the SSL certificate on the gateway's external interface.

  • 1Kosmos mobile app installed: Users must have the app on iOS or Android with biometrics enrolled before testing.


Configuration values

Values to collect from 1Kosmos AdminX (IdP) for Pulse Secure / Ivanti Connect Secure:

Field

Where to find it

SAML Metadata URL or XML

AdminX → Settings → IdP Configuration → Metadata URL

SSO URL

AdminX → Settings → IdP Configuration → Single SignOn Service URL

IdP Entity ID

AdminX → Settings → IdP Configuration → Core Configuration

Signing Certificate (PEM)

AdminX → Settings → IdP Configuration → View Certificate → Public Key

Ivanti Connect Secure SP values (calculated from gateway FQDN):

Field

Pattern

SP Entity ID

https://[FQDN]/dana-na/auth/saml-endpoint.cgi?p=sp1

ACS URL

https://[FQDN]/dana-na/auth/saml-consumer.cgi

Integration steps

Step 1: Configure system-wide SAML settings on Ivanti Connect Secure

  • Log in to the Ivanti Connect Secure admin portal and navigate to System → Configuration → SAML → Settings.

  • Set the Timeout value to 300 and enter your gateway's Fully Qualified Domain Name in the Host FQDN for SAML field. This FQDN determines the SP Entity ID and ACS URL used for the SAML service provider configuration.

  • Click Save Changes.

Step 2: Add a metadata provider for 1Kosmos

  • Navigate to System → Configuration → SAML and click New Metadata Provider.

  • Enter the 1Kosmos metadata URL and set the role to Identity Provider. Click Save Changes. The system fetches and stores the 1Kosmos metadata.

Step 3: Create a SAML Authentication Server

  • Navigate to Authentication → Auth Servers and select SAML Server from the New Server dropdown. Click New Server.

  • On the New SAML Server page, select the 1Kosmos metadata provider from the Identity Provider drop-down. Review the auto-populated fields and click Save Changes.

  • Click Download Metadata to export the Ivanti Connect Secure SP metadata for use in AdminX.

Step 4: Add Ivanti Connect Secure as a SAML application in AdminX

  • Log in to the AdminX portal and navigate to Applications → Add Application.

  • Select SAML 2.0 Generic and click Add integration. Enter "Ivanti Connect Secure" as the Application Name and your VPN portal URL as the Application Access URL.

  • Set NameID Format to urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress and NameID Value to email. Enable Assertion signing.

  • Enter the SP Entity ID and ACS URL calculated from your gateway FQDN. Click Save.

Step 5: Configure the authentication realm

  • In the Ivanti Connect Secure admin portal, navigate to Users → User Realms. Edit or create the realm used for VPN access.

  • Under Authentication, select the SAML Server created in Step 3 as the authentication server.

  • Configure the realm's sign-in URL and role mapping rules as needed.

Step 6: Test the integration

  • Navigate to the Ivanti Connect Secure VPN portal URL in a browser. Select the SAML-configured realm. You are redirected to 1Kosmos for biometric authentication.

  • Authenticate biometrically and confirm you are returned to the VPN portal with access to the configured resources.


Attribute mappings

Source (1Kosmos)

Target (Ivanti Connect Secure)

Description

user.email

NameID (emailAddress)

Primary identifier for VPN user account lookup


Integration notes

Pulse Connect Secure was rebranded as Ivanti Connect Secure in 2022 following Ivanti's acquisition of Pulse Secure.

If your gateway still shows Pulse Secure branding, the configuration path and SP value patterns described here remain accurate. The sp1 suffix in the Entity ID pattern indicates the first SAML service provider configured on the gateway.

If additional SAML SP entries already exist on the gateway, the number increments (sp2, sp3, etc.). Check the existing configuration to confirm the correct SP number for your environment.

Transform how you verify and authenticate

Secure onboarding, eliminate passwords, and stop fraud on one platform. Schedule a demo and see it in action.

Transform how you verify and authenticate

Secure onboarding, eliminate passwords, and stop fraud on one platform. Schedule a demo and see it in action.

Transform how you verify and authenticate

Secure onboarding, eliminate passwords, and stop fraud on one platform. Schedule a demo and see it in action.