Configure Browser Selection for SAML Authentication and Web Applications
Applies To: Accops Workspace Windows Client 7.2.0.1040 and above
Category: User Experience & Interface
Feature Status: Stable
Overview
This guide explains how to configure explicit browser selection for SAML authentication pages and web application launches in Accops Workspace Windows Client. This feature enables administrators to specify which browser launches for SAML authentication and web applications, overriding previous gateway browser settings and removing limitations such as default browser configuration requirements and automatic browser closure on logout. This enhancement provides greater flexibility and consistency in user experience across different enterprise environments.
Prerequisites
- Gateway Version: HySecure Gateway 5.4 SP6 or HySecure Gateway 7.0 and above
- Client Version: Accops Workspace Windows Client 7.2.0.1040 or higher
- Administrative Access: Security Officer or Administrator access to HySecure Management Console
- Browser Installation: Target browsers installed on client devices (Chrome, Edge, Firefox, etc.)
- SAML Configuration: Existing SAML identity provider integration configured
- Network Connectivity: HTTPS connectivity to SAML identity providers and web applications
- Knowledge Requirement: Understanding of SAML authentication workflows and web application deployment
Benefits
- Enhanced User Experience: Consistent browser experience eliminates confusion from unpredictable browser behavior
- Administrative Control: Centralized browser selection removes dependency on individual user default browser settings
- Security Standardization: Enforced browser choice ensures consistent security policies and certificate handling across organization
- Deployment Flexibility: Accommodates enterprise browser policies and specialized browser requirements for different applications
Browser Selection Options
Supported Browser Types
Microsoft Edge:
- Description: Microsoft's modern browser with enhanced security features and enterprise integration
- Use Case: Organizations using Microsoft 365 ecosystem with integrated security policies
- Requirements: Microsoft Edge installed on client devices (typically pre-installed on Windows 10/11)
Google Chrome:
- Description: Widely-used browser with extensive extension support and cloud integration
- Use Case: Organizations preferring Google Workspace integration or specific Chrome-based applications
- Requirements: Google Chrome installed on client devices with appropriate version support
Mozilla Firefox:
- Description: Open-source browser with strong privacy features and customization options
- Use Case: Organizations requiring specific privacy controls or Firefox-only compatible applications
- Requirements: Mozilla Firefox installed on client devices with current security updates
Internet Explorer Mode (Edge):
- Description: Legacy application support through Internet Explorer mode in Microsoft Edge
- Use Case: Organizations with legacy web applications requiring Internet Explorer compatibility
- Requirements: Microsoft Edge with Internet Explorer mode enabled
Platform Support
| Client Mode | Windows 8/8.1 | Windows 10/11 | Server 2016-2025 | Support Level |
|---|---|---|---|---|
| Full Admin Client | Yes | Yes | Yes | Full Support |
| HyBrid Mode | No | No | No | Not Supported |
| HyLite Mode | No | No | No | Not Supported |
| On-Demand Client | Yes | Yes | Yes | Full Support |
Procedure Part 1: Gateway Configuration
Step 1: Access Browser Configuration Settings
⚠️ Important: Contact the Accops support team for assistance with the Gateway Configuration due to specialized configuration requirements and version-specific implementation details.
Configuration Requirements:
- SAML Browser Selection: Specify browser for SAML authentication page launches
- Web Application Browser Selection: Define browser for web application launches from client launchpad
- Override Settings: Configuration overrides previous gateway browser settings
- Compatibility Validation: Verify browser selection compatibility with SAML providers
Step 2: Configure SAML Authentication Browser
- SAML Authentication Browser Settings
- Browser Type Selection: Choose from available browser options (Edge, Chrome, Firefox)
- Browser Path Configuration: Specify browser executable path if non-standard installation
- Launch Parameters: Configure browser startup parameters for SAML authentication
-
Session Management: Define browser session handling for authentication workflows
-
Identity Provider Compatibility
- Browser Testing: Verify selected browser compatibility with configured SAML identity providers
- Certificate Handling: Ensure browser properly handles SSL certificates for SAML endpoints
- JavaScript Support: Confirm browser JavaScript functionality for SAML authentication flows
- Popup Management: Configure popup handling for SAML authentication processes
Step 3: Configure Web Application Browser
- Web Application Launch Settings
- Default Application Browser: Set browser for web application launches from client launchpad
- Application-Specific Settings: Configure different browsers for specific web applications if supported
- Session Isolation: Define browser session isolation between different web applications
-
Security Policies: Apply browser security policies for web application access
-
Application Compatibility Testing
- Web Application Validation: Test web applications with selected browser configuration
- Performance Optimization: Verify browser performance with corporate web applications
- Plugin Support: Ensure required browser plugins/extensions are available
- Mobile Responsiveness: Test web application compatibility across different screen sizes
Procedure Part 2: Browser Installation and Configuration
Step 1: Standardize Browser Deployment
- Enterprise Browser Installation
- Deployment Method: Use organizational software deployment tools (SCCM, Intune, etc.)
- Version Standardization: Deploy consistent browser versions across all client devices
- Configuration Management: Apply standardized browser configurations and security policies
-
Update Management: Establish browser update procedures and testing protocols
-
Browser Policy Configuration
powershell # Example: Configure Chrome enterprise policies via Group Policy # Set homepage and security settings $ChromePolicies = @{ "HomepageLocation" = "about:blank" "DefaultBrowserSettingEnabled" = $false "BlockThirdPartyCookies" = $true "SSLErrorOverrideAllowed" = $false } -
Security Hardening
- Certificate Store Configuration: Ensure proper certificate trust store setup
- Privacy Settings: Configure privacy settings appropriate for corporate environment
- Extension Management: Control browser extension installation and usage
- Download Restrictions: Apply download policies for security compliance
Step 2: Browser Compatibility Validation
- SAML Provider Testing
- Authentication Flow Testing: Verify complete SAML authentication workflow with selected browser
- Multi-Factor Authentication: Test MFA integration with browser selection
- Single Sign-On: Validate SSO functionality across different SAML applications
-
Error Handling: Test error scenarios and browser behavior during authentication failures
-
Web Application Compatibility
- Application Functionality: Test all web applications with selected browser configuration
- Performance Benchmarking: Measure application load times and responsiveness
- Feature Support: Verify advanced web application features function correctly
- Cross-Browser Testing: Document any application-specific browser requirements
Configuration Examples
Example 1: Microsoft-Centric Enterprise
Configuration:
- SAML Authentication Browser: Microsoft Edge
- Web Application Browser: Microsoft Edge
- Identity Provider: Azure AD SAML
- Enterprise Integration: Microsoft 365 ecosystem
- Security Policies: Microsoft Defender Application Guard integration
Use Case: Organizations heavily invested in Microsoft ecosystem with Azure AD integration
Benefits: Seamless integration with Microsoft security features and enterprise policies
Example 2: Multi-Browser Environment
Configuration:
- SAML Authentication Browser: Google Chrome
- Web Application Browser: Mozilla Firefox for specific applications, Chrome for others
- Identity Provider: Okta or Ping Identity
- Application Requirements: Mixed browser requirements for different web applications
- User Flexibility: Different browsers for different application categories
Use Case: Organizations with diverse web application portfolio requiring different browser capabilities
Benefits: Optimized browser selection for specific application requirements while maintaining consistency
Example 3: High-Security Environment
Configuration:
- SAML Authentication Browser: Microsoft Edge with Enhanced Security
- Web Application Browser: Firefox ESR (Extended Support Release)
- Identity Provider: On-premises ADFS with hardware token integration
- Security Controls: Strict certificate validation and enhanced privacy settings
- Compliance Requirements: Government or financial services security standards
Use Case: High-security environments requiring strict browser security controls and compliance
Benefits: Maximum security with controlled browser environments and validated security configurations
SAML Authentication Workflow
Browser-Based Authentication Process
Authentication Sequence:
- Client Login Initiation: User launches Workspace client and selects SAML authentication
- Browser Launch: System launches specified browser for SAML authentication
- Identity Provider Redirect: Browser redirects to configured SAML identity provider
- User Authentication: User completes authentication process within selected browser
- SAML Response Processing: Identity provider returns SAML response to HySecure Gateway
- Session Establishment: Gateway processes SAML response and establishes user session
- Browser Session Management: Browser behavior managed according to configuration settings
Session Security:
- Secure Communication: All SAML communications encrypted via TLS 1.2+
- Token Validation: SAML assertions validated against identity provider certificates
- Session Timeout: Browser sessions respect configured timeout policies
- Cross-Site Protection: Browser security features protect against CSRF and XSS attacks
Web Application Launch Process
Application Access Workflow:
- Application Selection: User selects web application from client launchpad
- Browser Launch: System launches specified browser for web application access
- Authentication Token Transfer: Session tokens transferred securely to browser session
- Application Loading: Web application loads with authenticated user context
- Session Synchronization: Application session synchronized with gateway session status
- Logout Coordination: Application logout coordinated with gateway session termination
Verification and Testing
SAML Authentication Testing
- End-to-End Authentication Test
- Launch Workspace client and initiate SAML authentication
- Verify specified browser launches correctly
- Complete authentication process and confirm successful login
-
Expected Result: Seamless SAML authentication using configured browser
-
Multi-Factor Authentication Test
- Test SAML authentication with MFA requirements
- Verify browser handles MFA prompts appropriately
- Confirm successful authentication with multiple factors
-
Expected Result: Proper MFA handling within selected browser environment
-
Browser Session Management Test
- Complete SAML authentication and verify session establishment
- Test logout behavior and browser session handling
- Verify browser doesn't close automatically (limitation removed)
- Expected Result: Improved session management without unwanted browser closure
Web Application Launch Testing
- Application Launch Verification
- Select web applications from client launchpad
- Verify specified browser launches for web application access
- Confirm applications load correctly with proper authentication
-
Expected Result: Consistent web application access using configured browser
-
Multiple Application Testing
- Launch different web applications sequentially
- Verify browser behavior with multiple concurrent applications
- Test application switching and session management
- Expected Result: Proper handling of multiple web applications within browser environment
Performance and Compatibility Testing
- Browser Performance Assessment
- Measure browser launch times for SAML authentication
- Monitor web application load times and responsiveness
- Assess memory usage and system resource consumption
-
Expected Result: Acceptable performance within organizational standards
-
Cross-Platform Compatibility
- Test browser selection across different Windows versions
- Verify functionality on various hardware configurations
- Confirm behavior consistency across client deployment types
- Expected Result: Consistent functionality across supported platforms
Monitoring and Logging
Browser Selection Event Logging:
- Browser launch events: Application launches, browser selection, timestamp
- SAML authentication events: Authentication success/failure, browser used, duration
- Web application access: Application launches, browser selection, session duration
- Error events: Browser launch failures, compatibility issues, performance problems
Log Analysis Procedures:
- Navigate to HySecure Management Console → Monitoring → Application Logs
- Filter by Event Type: Browser Launch for browser-specific events
- Analyze browser usage patterns and performance metrics
- Review error rates and browser compatibility issues
Performance Metrics:
- Browser launch time statistics
- SAML authentication completion rates
- Web application load time measurements
- User satisfaction and support ticket volume
Security Considerations
Browser Security
Secure Browser Configuration:
- Certificate Validation: Ensure browsers properly validate SSL certificates for SAML and web applications
- Content Security Policy: Configure CSP headers for web applications to prevent XSS attacks
- Secure Cookie Handling: Verify proper secure cookie implementation for session management
- Privacy Controls: Balance privacy settings with functional requirements for corporate applications
Enterprise Security Integration:
- Domain Join Integration: Leverage domain-joined device capabilities for browser security
- Certificate Store Management: Integrate with enterprise certificate management systems
- Policy Enforcement: Apply organizational security policies through browser configuration
- Threat Protection: Integrate with enterprise threat protection and monitoring systems
Authentication Security
SAML Security:
- Assertion Validation: Verify SAML assertion integrity and authenticity
- Replay Attack Prevention: Implement measures to prevent SAML assertion replay attacks
- Encryption Standards: Ensure SAML communications use current encryption standards
- Certificate Management: Maintain current certificates for SAML identity provider trust
Session Security:
- Token Protection: Secure handling of authentication tokens within browser sessions
- Session Isolation: Ensure proper isolation between different application sessions
- Logout Security: Comprehensive session cleanup during logout processes
- Cross-Site Request Forgery: Protection against CSRF attacks in web applications
Troubleshooting
Common Issues:
Browser Launch Failures:
- Issue: Specified browser fails to launch for SAML authentication or web applications
- Check: Verify target browser is installed and accessible on client device
- Verify: Confirm browser executable path is correct in gateway configuration
- Solution: Reinstall browser or update gateway configuration with correct browser path
- Prevention: Implement browser deployment validation and monitoring procedures
SAML Authentication Problems:
- Issue: SAML authentication fails or displays errors in selected browser
- Check: Verify browser compatibility with SAML identity provider requirements
- Verify: Confirm browser security settings allow SAML authentication flow
- Solution: Adjust browser security settings or select compatible browser for SAML
- Prevention: Conduct comprehensive browser compatibility testing with SAML providers
Web Application Compatibility Issues:
- Issue: Web applications display incorrectly or function improperly in selected browser
- Check: Verify web application browser requirements and compatibility matrix
- Verify: Confirm browser version meets application minimum requirements
- Solution: Update browser version or configure application-specific browser selection
- Prevention: Maintain application compatibility matrix and browser update procedures
Browser Policy Conflicts:
- Issue: Organizational browser policies interfere with SAML or web application functionality
- Check: Review applied browser policies and their impact on authentication workflows
- Verify: Test authentication and application access with policy exemptions
- Solution: Adjust browser policies or create exceptions for SAML and web application domains
- Prevention: Coordinate browser policy management with application access requirements
Diagnostic Steps
Browser Configuration Validation:
# Check installed browsers and versions
Get-ItemProperty HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\* |
Where-Object {$_.DisplayName -like "*Chrome*" -or $_.DisplayName -like "*Firefox*" -or $_.DisplayName -like "*Edge*"} |
Select-Object DisplayName, DisplayVersion
# Verify browser executable accessibility
Test-Path "C:\Program Files\Google\Chrome\Application\chrome.exe"
Test-Path "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
SAML Authentication Diagnostics:
- Browser Network Analysis: Use browser developer tools to analyze SAML authentication network traffic
- Certificate Validation: Verify SSL certificate chain validation in browser
- JavaScript Console: Check browser console for JavaScript errors during SAML authentication
- SAML Response Inspection: Analyze SAML response content and format
Web Application Diagnostics:
- Browser Compatibility Testing: Test web applications across different browser versions
- Performance Profiling: Use browser performance tools to identify bottlenecks
- Security Policy Analysis: Review content security policy and browser security settings
- Session Management Testing: Verify proper session handling and timeout behavior
Advanced Configuration
Enterprise Browser Management
Centralized Browser Deployment:
- Group Policy Integration: Deploy browser configurations via Active Directory Group Policy
- Software Deployment Tools: Use SCCM, Intune, or similar tools for browser management
- Configuration Templates: Standardized browser configuration templates for different user groups
- Update Management: Coordinated browser update procedures across enterprise
Browser Policy Automation:
# Example: Deploy Chrome enterprise policies
$ChromeRegPath = "HKLM:\SOFTWARE\Policies\Google\Chrome"
New-Item -Path $ChromeRegPath -Force
Set-ItemProperty -Path $ChromeRegPath -Name "HomepageLocation" -Value "about:blank"
Set-ItemProperty -Path $ChromeRegPath -Name "DefaultBrowserSettingEnabled" -Value 0
Application-Specific Browser Selection
Conditional Browser Assignment:
- Application Categories: Different browsers for different types of web applications
- User Group Policies: Browser selection based on user group membership
- Geographic Considerations: Regional browser preferences and compliance requirements
- Legacy Application Support: Specialized browser configurations for legacy applications
Performance Optimization
Browser Performance Tuning:
- Memory Management: Optimize browser memory usage for client devices
- Cache Configuration: Configure browser caching for improved application performance
- Extension Management: Control browser extensions to minimize performance impact
- Resource Monitoring: Monitor browser resource usage and optimize configuration
Network Optimization:
- Connection Pooling: Optimize HTTP connections for web applications
- Compression Settings: Configure content compression for faster application loading
- CDN Integration: Leverage content delivery networks for improved performance
- Bandwidth Management: Optimize browser settings for various network conditions
Multi-Tenant Considerations
Service Provider Deployments:
- Tenant-Specific Browser Settings: Different browser configurations for different customer tenants
- Brand Customization: Tenant-specific browser appearance and configuration
- Security Isolation: Ensure proper isolation between tenant browser sessions
- Policy Inheritance: Tenant-specific browser policy templates and management
Notes
- Support Requirement: Gateway configuration requires Accops support team assistance due to specialized browser integration settings
- Platform Limitations: Browser selection feature only supported for Full Admin Client and On-Demand Client modes - HyBrid and HyLite modes not supported
- Browser Dependencies: Feature functionality depends on proper browser installation and configuration on client devices
- Legacy Limitation Removal: Configuration overrides previous gateway browser settings and eliminates automatic browser closure on logout