Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Table of Contents

Info

About SAML Single Sign-On in SMACS

Single Sign-On can be setup in SMACS against any Identity Provider (IdP) which supports SAML 2.0.

This guide covers the steps required to setup SAML SSO against Okta, Azure AD & ADFS IdP’s.

For an exhaustive list of supported IDP’s, visit SAML-based products and services.

toc

Install signed certificate on the SMACS machine

...

  1. Click on Add Relying Party Trust

    Image RemovedImage Added

  2. Select default option “Claims Aware”

    Image RemovedImage Added

  3. Select “Import data about the relying party from a file”

    Image RemovedImage Added

  4. Upload the Service Provider (SP) metadata file from previous step.

  5. Provide a meaningful Display Name for the SMACS relying party and click “Next”

    Image RemovedImage Added

  6. Select “Permit everyone” and click “Next””

    Image RemovedImage Added

  7. Enable “Configure claims issuance policy for this application” checkbox and click “Close”

    Image RemovedImage Added

Configure Name Identifier (NameID)

...

  1. Edit Claim Issuance Policy

    Image RemovedImage Added

  2. Click “Add Rule”

    Image RemovedImage Added

  3. Choose Claim rule template “Send LDAP Attributes as Claims” and click “Next”

    Image RemovedImage Added

  4. Provide a Claim rule name, select the Attribute Store “Active Directory” from the dropdown, provide the SAM-Account-Name to Name ID mapping and click “Finish”.

    Image RemovedImage Added

Download your Identity Provider (IdP) Metadata

...