SSO Authentication with ADFS SAML 2.0. Ephesoft Transact Documentation

Similar documents
SSO Authentication with ADFS SAML 2.0. Ephesoft Transact Documentation

Microsoft ADFS Configuration

Qualys SAML & Microsoft Active Directory Federation Services Integration

Configuring Alfresco Cloud with ADFS 3.0

NETOP PORTAL ADFS & AZURE AD INTEGRATION

ADFS Setup (SAML Authentication)

Configure Single Sign-On using CUCM and AD FS 2.0 (Windows Server 2008 R2)

SETTING UP ADFS A MANUAL

Configuration Guide - Single-Sign On for OneDesk

esignlive SAML Administrator's Guide Product Release: 6.5 Date: July 05, 2018 esignlive 8200 Decarie Blvd, Suite 300 Montreal, Quebec H4P 2P5

TECHNICAL GUIDE SSO SAML. At 360Learning, we don t make promises about technical solutions, we make commitments.

Integrating YuJa Active Learning into ADFS via SAML

AD FS CONFIGURATION GUIDE

October 14, SAML 2 Quick Start Guide

Integrating the YuJa Enterprise Video Platform with ADFS (SAML)

Integrating YuJa Active Learning with ADFS (SAML)

Nimsoft Service Desk. Single Sign-On Configuration Guide. [assign the version number for your book]

Configuring SAML-based Single Sign-on for Informatica Web Applications

Integration of the platform. Technical specifications

SAML with ADFS Setup Guide

RSA SecurID Access SAML Configuration for StatusPage

ADFS integration with Ibistic Commerce Platform A walkthrough of the feature and basic configuration

Using Your Own Authentication System with ArcGIS Online. Cameron Kroeker and Gary Lee

Quick Start Guide for SAML SSO Access


Active Directory Federation Services (ADFS) Customer Implementation Guide Version 2.2

How to Use ADFS to Implement Single Sign-On for an ASP.NET MVC Application

Configure the Identity Provider for Cisco Identity Service to enable SSO

D9.2.2 AD FS via SAML2

Quick Start Guide for SAML SSO Access

VIEVU Solution AD Sync and ADFS Guide

RSA SecurID Access SAML Configuration for Datadog

CONFIGURING AD FS AS A THIRD-PARTY IDP IN VMWARE IDENTITY MANAGER: VMWARE WORKSPACE ONE OPERATIONAL TUTORIAL VMware Workspace ONE

Configuring Microsoft ADFS for Oracle Fusion Expenses Mobile Single Sign-On

SAML 2.0 SSO. Set up SAML 2.0 SSO. SAML 2.0 Terminology. Prerequisites

Enabling SAML Authentication in an Informatica 10.2.x Domain

Integration Guide. PingFederate SAML Integration Guide (SP-Initiated Workflow)

SAML-Based SSO Configuration

Single Sign-On with Sage People and Microsoft Active Directory Federation Services 2.0

UMANTIS CLOUD SSO (ADFS) CONFIGURATION GUIDE

RSA SecurID Access SAML Configuration for Kanban Tool

Configuring ADFS for Academic Works

Enabling Single Sign-On Using Microsoft Azure Active Directory in Axon Data Governance 5.2

Cloud Access Manager Configuration Guide

Five9 Plus Adapter for Agent Desktop Toolkit

RSA SecurID Access SAML Configuration for Samanage

SAML-Based SSO Solution

Copyright

Five9 Plus Adapter for Microsoft Dynamics CRM

Enabling Single Sign-On Using Okta in Axon Data Governance 5.4

Unified Contact Center Enterprise (UCCE) Single Sign On (SSO) Certificates and Configuration

SAML-Based SSO Configuration

CA SiteMinder Federation

Pentaho Server SAML Authentication with Hybrid Authorization

Health Professional & ADFS Integration Guide

ADFS Authentication and Configuration January 2017

This section includes troubleshooting topics about single sign-on (SSO) issues.

Quick Connection Guide

Enhancing cloud applications by using external authentication services. 2015, 2016 IBM Corporation

SAML-Based SSO Solution

Single Sign On (SSO) with Polarion 17.3

TECHNICAL GUIDE SSO SAML Azure AD

Single Sign-On. Non-SSO - Continue to use existing Active Directory-based and local authentication, without SSO.

Single Sign-On (SSO)Technical Specification

MyWorkDrive SAML v2.0 Okta Integration Guide

TACACs+, RADIUS, LDAP, RSA, and SAML

Contents Introduction... 5 Configuring Single Sign-On... 7 Configuring Identity Federation Using SAML 2.0 Authentication... 29

.NET SAML Consumer Value-Added (VAM) Deployment Guide

Trusted Login Connector (Hosted SSO)

Integrating VMware Workspace ONE with Okta. VMware Workspace ONE

Configuring the vrealize Automation Plug-in for ServiceNow

Oracle Access Manager Configuration Guide

Integrating the YuJa Enterprise Video Platform with Dell Cloud Access Manager (SAML)

ArcGIS Server and Portal for ArcGIS An Introduction to Security

Five9 Plus Adapter for Oracle Service Cloud

SAP NetWeaver Cloud Security Tutorial Single Sign-On and Identity Federation with ForgeRock OpenAM

Introduction... 5 Configuring Single Sign-On... 7 Prerequisites for Configuring Single Sign-On... 7 Installing Oracle HTTP Server...

SAML 2.0 SSO Implementation for Oracle Financial Services Lending and Leasing

CA SiteMinder Federation

Release Joris Beckers

Slack Cloud App SSO. Configuration Guide. Product Release Document Revisions Published Date

SAP NetWeaver Cloud Security Tutorial Single Sign-On and Identity Federation with SAP NetWeaver Single Sign-On

Yellowfin SAML Bridge Web Application

Juniper Networks SSL VPN Integration Guide

Setting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1

ArcGIS Enterprise Administration

SAML SSO Deployment Guide for Cisco Unified Communications Applications, Release 12.0(1)

Workspace ONE UEM Directory Service Integration. VMware Workspace ONE UEM 1811

Mitel MiContact Center Enterprise WEB APPLICATIONS CONFIGURATION GUIDE. Release 9.2

Webthority can provide single sign-on to web applications using one of the following authentication methods:

Table of Contents. Single Sign On 1

Integration Guide. SafeNet Authentication Service. NetDocuments

Apparo Fast Edit. Installation Guide 3.1.1

CA CloudMinder. SSO Partnership Federation Guide 1.51

Morningstar ByAllAccounts SAML Connectivity Guide

INTEGRATING OKTA: VMWARE WORKSPACE ONE OPERATIONAL TUTORIAL VMware Workspace ONE

Cloud Secure Integration with ADFS. Deployment Guide

Setting Up Resources in VMware Identity Manager

This documentation will go over how to install Sharepoint for configuring with Panopto.

Zendesk Connector. Version 2.0. User Guide

Transcription:

SSO Authentication with ADFS SAML 2.0 Ephesoft Transact Documentation

Table of Contents Configure Ephesoft Transact... 1 Configure ADFS Server... 3 Export Certificate from ADFS Server... 7

Configure Ephesoft Transact 1) Configure Tomcat server to run on HTTPS http://tomcat.apache.org/tomcat-7.0-doc/ssl-howto.html 2) Configure SAML SSO in Ephesoft Transact http://wiki.ephesoft.com/home/documentation/security-compliancesupport-saml-v2 3) The following changes need to be made in the applicationcontextsecurity.xml file: a. In the ephesamlfilter bean, update the value of the constructor argument which you added in ADFS. The third constructor argument must be true for superadmin access--otherwise it should be false. If a rule can be defined in ADFS for superadmin, that claim name can be passed as an argument. b. In the metadatageneratorfilter bean, enter entityid as configured in ADFS. c. Configuration of the metadata bean can be done in one of several ways: i. Save ADFS metadata in a file and place it in the EPHESOFT_HOME/application/WEB-INF/classes/security folder. Update the bean class to: org.opensaml.sam2.metadata.provider.filesystemmetadataprovider and the classpath to classpath:security/<filename.xml>. w w w. e p h e s o f t. c o m Page 1

ii. Using the ADFS metadata URL, modify the metadata bean and use ExtendedMetadataDelegate and HttpMetadataProvider as shown below. Also, define metadatatrustcheck=false to skip signature validation. d. Prior to version 4.5.0.0, Ephesoft Transact supported only SHA-1 as signature algorithm and digest algorithm for SAML. From version 4.5.0.0, Transact by default uses SHA-256 as signature algorithm and digest algorithm. It is recommended to use SHA-256. If you need to change the signature algorithm and digest algorithm to SHA-1, remove the signaturealgorithmuri and digestalgorithmuri property of bean class com.ephesoft.dcma.saml.configuration.ephesoftsamlbootstrap as shown below. w w w. e p h e s o f t. c o m Page 2

4) Import ADFS certificates into Ephesoft Transact using the command below. keytool.exe -import cert alias adfssigning -keystore samlkeystore.jks -file adfscertificate.cer To export certificates from ADFS, reference the Export Certificate from ADFS Server section in this document. 5) In the web.xml file, update the logouturl parameter to https://<ip:port>/dcma/saml/logout 6) If authenticationtype=2 (i.e., authentication and authorization are done by the ADFS server) in the web.xml file and the group is not received from the ADFS server, then by default the group used is what has been defined for the default_group property of the application.properties file. Configure ADFS Server 1) Download the Ephesoft Transact metadata from the path: https://<ephesoft_ip:port>/dcma/saml/metadata. 2) Select Add Relying Party Trust in ADFS by right clicking on the Relying Party Trusts folder under ADFS\Trust Relationships w w w. e p h e s o f t. c o m Page 3

3) Choose the Import data about the relying party from a file option and select the XML metadata saved in step 1. w w w. e p h e s o f t. c o m Page 4

4) Provide a display name and click Next (choosing defaults) and Finish. 5) The Edit Claim Rules dialog will open automatically. This can be done alternatively by right clicking the added relying party name and selecting Edit Claim Rules. Add the following claims: a. NameId: Sends Name ID i. Rule Name: NameId ii. Choose SAM-Account-Name as the LDAP attribute and Name ID as the outgoing claim type. b. FirstName: Sends name details i. Rule Name: FirstName ii. Choose SAM-Account-Name as the LDAP attribute and Name as the outgoing claim type. c. Group: Sends group details. Configure this rule as desired. For example, a user can be a member of multiple groups. The service provider expects a particular group called Enterprise. Sending all groups would be irrelevant to the service provider. A filter can be defined for this scenario by the two rules below. i. This rule retrieves all groups and adds as an incoming claim for the next rule. The output of this claim will be used by the next rule for processing. Add the rule name as Get all groups user belongs. Define the custom rule as follows: w w w. e p h e s o f t. c o m Page 5

c:[type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname", Issuer == "AD AUTHORITY"] => add(store = "Active Directory", types = ("http://schemas.microsoft.com/ws/2008/06/identity/claims/role"), query = ";tokengroups;{0}", param = c.value); ii. Filtering Groups: define a filter to restrict groups sent in claims. Select the pass through or filter an incoming claim template. Add the rule name as Filter Groups. In the field Pass through all claims that start with a specific value, specify Enterprise. Note: 1. Group and Filter Group claim rules only need to be configured if authenticationtype=2 in the web.xml file. 2. In the web.xml file, if authenticationtype is 1 (i.e., SSO authentication only), then authorization will be handled by Ephesoft Transact. ADFS simply needs to send the username as a claim. 3. If there are multiple groups that are returned from ADFS servers, Transact uses the first group value. 6) Open the Relying Party Trust by double clicking it. In the Advanced Tab, change Secure Hash Algorithm to SHA-1. w w w. e p h e s o f t. c o m Page 6

Export Certificate from ADFS Server 1) In ADFS, select the Certificate option under ADFS/Service 2) Double click the certificate to export. Go to the Details tab, click on Copy to File, and save this as a DER encoded certificate in your file system. w w w. e p h e s o f t. c o m Page 7

When accessing any Ephesoft Transact URL the user will be redirected to the ADFS Login page. w w w. e p h e s o f t. c o m Page 8

On successful authentication the user will be redirected to the appropriate Ephesoft Transact page. w w w. e p h e s o f t. c o m Page 9