Unlock a world of possibilities! Login now and discover the exclusive benefits awaiting you.
Hi mighty forum,
For Qlik Sense on premise published via Azure Application Proxy we have problems when Azure Pre-authentication is enabled, we get stuck in an endless loop.
The goal is to be able to reach QS on premise from internet for any user authenticated in the Azure AD.
We have enabled SAML authentication and now would like to get rid of the requirement of VPN as well.
We have read the instructions from 2018 about disable the Pre-Authentication, but IT do not prefer that option at all since they see it as a potential security risk to allow unauthenticated traffic into the corporate network.
https://community.qlik.com/t5/Technology-Partners-Ecosystem-Documents/Azure-AD-Single-Sign-on-SAML-O...
Anyone knows a way to configure this with Azure Pre-authentication enabled?
Any help is highly appreciated
Hi again
Finally we found the missing link.
The issue was solved by setting the "Translate URLs in headers" setting in Azure as in the attached image.
Hi again,
Got answer from Qlik support which states that it shall be possible to achieve. Unfortunately we have been unsuccessful so far to get the settings right.
"Based on the feedback received from R&D pre-authentication should work just fine with the latest QS releases.
At the time that the article was written, it required two enterprise apps, since an enterprise app at the time didn’t support both SAML and the azure app proxy. Pre-authentication should work fine, as that happens before logging into Qlik. You would need to use a single enterprise app."
Anyone who have done this and can share which settings were done in Azure and the virtual proxy?
Any help is still highly appreciated.
Now the loop is gone but this error is thrown when being outside the corporate network (it works when on the corporate network)
Hello @andy ,
Thanks for posting.
I assume you already reviewed Error AADSTS50011 the redirect URI not match the redirect URIs configured for the application - Acti...
Cheers,
Albert
Hi, I thought that we had read everything about it but I cannot remember we tested this so we'll test it on Monday when the Azure admin is back.
Thanks for the hint!
Sure @andy , let us know how it goes!
Cheers,
Albert
Hi again
Finally we found the missing link.
The issue was solved by setting the "Translate URLs in headers" setting in Azure as in the attached image.
Excellent @andy , I am glad you have found it! Thanks for sharing it.
Cheers,
Albert
Here are the settings in Azure. We also needed to separate the url's on the internal network from the one used to reach the Azure proxy.
Thanks Andy for sharing! Appreciate by the Community!