For SAML authentication we need to change the authenticator used to be SAMLUidOneTouch. Login to the WebUI and go to the advance tab, click on the pen besides Authentication - HTTP:
Find your SAML authenticator:
Change the name value to SAMLUidOneTouch, stage changes and commit.
Next we need to remove some Valves from the execution flow since we still expect a password but there is no way for the user to enter a password. Go to Scenarios → Federation and click on your Username, Password and OneTouch scenario. Go to the Execution Flow tab. Delete the InputParameterExistValve and the LDAPBindValve. Click save.
We are now done the user will now see the following page when surfing to the authenticator URL:
With RADIUS authentication it will be different we can’t control client it self that connects, for example the OneConnect client (at the moment) will always show the password field even though we do this change on the EasyAccess server. The only thing we need to do here is to remove the LDAPBindValve from the Execution flow on the normal Username, Password and OneTouch RADIUS scenario.
Go to Scenarios → RADIUS and click on the Username, Password and OneTouch scenario. Go to the Execution Flow tab and delete the LDAPBindValve:
Click save. The users will now be able to login without password.
4 May, 2021 easyaccess incenter syslog
30 Mar, 2021 linux easyaccess
21 Jan, 2021 easyaccess radius
24 Feb, 2021 easyaccess radius
22 Aug, 2022 onetouch sslvpn oneconnect
21 Jan, 2021 easyaccess
18 May, 2021 easyaccess myapps
14 Dec, 2021 easyaccess log4j
18 Jan, 2021 easyaccess hotp