Parallels RAS Reference Architecture
ProductsSupportPartnersDocumentation
  • Introduction
    • Parallels RAS release history
    • What is Parallels RAS
    • Advantages of Parallels RAS Solution
    • Parallels RAS Components
    • Understanding Deployment Scenario Diagrams
    • Parallels RAS Basic Concepts
  • Deployment Scenarios
    • General Considerations
    • Parallels RAS Deployment Scenarios
      • Single Farm with One RD Session Host
      • Single Farm with Two RD Session Hosts
      • Single Farm with RD Session Host Auto Scaling
      • Single Farm with VDI Hosts
      • Single Farm with Remote PC Hosts
      • Single Farm with Mixed Hosts
      • Single Farm with Public & Private RAS Secure Gateways
      • Single Farm with Dual RAS Secure Gateways
      • High Availability with Multiple Gateways
      • High Availability with Single-hop or Double-hop DMZ
        • Single-hop DMZ (two firewalls)
        • Double-hop DMZ (three firewalls)
      • RAS on Microsoft Azure
      • Azure Virtual Desktop integration
      • Mixed Scenarios
        • Multi-Site Scenario
        • Business Continuity and Disaster Recovery
        • Secure Setup with Double-hop DMZ and Second-Level Authentication
        • SAML SSO authentication
      • Multi-Tenant Architecture
      • Management Portal
    • Client Manager and Desktop Replacement
  • Capacity Considerations
  • Deploying Parallels RAS Reporting
    • One Site with Multiple RD Session Hosts
    • Multiple Sites with Multiple RD Session Hosts and Remote SQL Server
  • Port Reference and SSL Certificates
    • Port reference
      • Parallels Client
      • Web browsers
      • HALB
      • RAS Secure Gateway
      • RAS Connection Broker
      • RAS Console
      • SSRS
      • RAS Reporting
      • RAS Web Administration Service (REST/Management Portal)
      • RAS PowerShell
      • RAS Provider Agent
      • RAS Enrollment Server
      • RAS RD Session Host Agent
      • RAS Guest Agent
      • RAS Remote PC Agent
      • Tenant Broker
      • Active Directory and Domain Services ports
    • SSL Certificates
      • Using a Third-Party Trusted Certificate Authority
      • Using Enterprise Certificate Authority
      • Assign a Certificate to a Gateway
      • Parallels Client Configuration
Powered by GitBook

Social media

  • Facebook
  • Twitter
  • LinkedIn
  • YouTube

Other Resources

  • Feedback

© 2025 Parallels International GmbH. All rights reserved.

On this page

Was this helpful?

Export as PDF
  1. Deployment Scenarios
  2. Parallels RAS Deployment Scenarios
  3. Mixed Scenarios

SAML SSO authentication

PreviousSecure Setup with Double-hop DMZ and Second-Level AuthenticationNextMulti-Tenant Architecture

Last updated 9 months ago

Was this helpful?

SAML authentication allows Service providers and enterprises with multiple subsidiaries to reduce costs by offload the Identity Management burden to the identity providers. Integrating with third party Identity Providers allows customers and partners to provide end users with a true SSO experience.

Comparing to previously described scenarios, the new server role needs to be added the Farm. As part of the SAML SSO process, the new host with RAS Enrollment Server component communicates with Microsoft Certificate Authority (CA) to request, enroll, and manage digital certificates on behalf of the user to complete authentication without requiring the users to put in their Active Directory credentials.

Parallels RAS supports the following delivery options:

  • Web Client

  • Web Client portal initiated SAML for Windows

  • Web Client initiated SAML for Mac and Linux

  • Web Client initiated SAML for Android and iOS

  • Parallels Client for Windows initiated SAML Authentication

  • Parallels Client for Mac initiated SAML Authentication

The below high-level logical diagram depicts SAML authentication and login process within a Parallels RAS environment:

The SAML authentication and login steps on the diagram above are:

  1. RAS Secure Gateway redirects the Parallels Client login request to the IdP site.

  2. The user authenticates with IdP.

  3. IdP redirects the user to the RAS Secure Gateway with the SAML Assertion.

  4. The user is authenticated using the SAML Assertion and the user is logged in.

  5. The list of the available RAS published resources is retrieved.

  6. The user chooses a published resource and launches it from Parallels Client.

  7. The launch request from the user is sent to the server side and the resource is started on the available server.

  8. A Parallels RAS session is established.

  9. User certificate is processed:

    • Certificate is requested.

    • Certificate is created.

    • Encryption is preformed using the certificate.

  10. Smartcard logon.