This article explains what to expect when the Enforce SAML Authentication for End User Applications setting is enabled in an Authentication Profile.
When to Use This Setting
Use this setting when you want users to use Single Sign-On to access a deployed Mimecast end-user application. Please see the section below for the impact this has on each application.
Impact
When Enforce SAML Authentication for End User Applications is enabled on a user's effective Authentication Profile, the authentication method is enforced for all applications that use the Mimecast API to gain access to Mimecast.
Users with the Authentication Profile applied will not be able to use a password-based authentication method to access Mimecast from an end-user application. The behavior observed for each Mimecast application is described below.
| Application | Description | ||
|---|---|---|---|
| Mimecast for Outlook | Mimecast for Outlook extends the capability to add an automated authentication attempt this allows users to be authenticated with Mimecast using your Identity Provider without any user intervention. For this automation to be attempted, the following conditions must be met:
New users:
|
||
| Mimecast Mobile |
New users: When the user enters their email address on the login screen and selects Next, they will be redirected to the Identity Provider login URL specified in the Mimecast Authentication Profile. Once successfully authenticated with the Identity Provider, the user will be granted access to the Mimecast application. Existing Users: If the user has already authenticated with either their cloud or domain password and you want to switch to using Single Sign-On, please use the Revoking Application Authentication Sessions function to log users out of applications. |
||
| Mimecast for Mac |
New users:
If the user has already authenticated with either their cloud or domain password and you want to switch to using Single Sign-On, use the Revoking Application Authentication Sessions function to log users out of applications. |
Authentication Tokens
When a user successfully authenticates using SAML Single Sign-On, they are granted a secure authentication token, also known as a secure binding. This creates a security association between the user, the device, the application, and the Mimecast API. The authentication token is used to verify the user in all subsequent requests made by the client to Mimecast.
The Authentication token issued by the Mimecast API as a result of a successful SAML authentication is considered secure. This means:
- The user only has to complete the login process once per device.
- The user will not be prompted to log in when their password changes.
- Additionally, the user's credentials are not cached on the device, as they are never required to access Mimecast.
| Note: | Disabling the user in the Mimecast Administration Console can block a user's access |
Continuity Considerations
In the scenario where your Identity Provider is unavailable, users with this setting applied who have not already authenticated will not be able to log in and use the application.
However, as a user only has to authenticate once per application, per device, when using SAML Single-Sign-On, as long as the user authenticates while your Identity Provider is available, they will be able to continue using the application from that point onwards, regardless of the availability of:
- The Identity Provider.
- Active Directory.
- Exchange / Microsoft 365.
| Note: | For the best experience in a continuity scenario, ensure that users are authenticated while your Identity Provider is available. |
Comments
Please sign in to leave a comment.