The login ui link gives you options to change parts of the login page. This will only work if the default logic has not been changed in the login page. Primary Entity Id / MetaData is what will be used in most cases. We give you an entity id and assertion consumer service url based on the tenant name. This cannot be changed and needs to match in your provider (see below). You will then need to paste the metadata from your system into the metadata textarea. If you want to use something different then you would use the alternate, designtime, or runtime which will let you enter values in. Primary and Alternate will be used both by the ide for development login and the end app. To have them use separate instances you would use the DesignTime/RunTime options.
SAML returns a list of claims. Whatever is returned for the user principle is what will be used as the userid in EASYProcess.
Every user has to have an authorization set in EASYProcessfor them to be able to access the site. Their authorizations can be set and maintained from the User Management page of any application. You also have the ability to maintain the authorization in your provider.
You have a few options for setting an authorization type. For specific applications you would create a claim called UserProperty_AuthorizationType_[AppName] Where [AppName] is replaced by the name of the app you want to add the authorization for. If you want to add an authorization for all apps, create a claim called AllAppUserProperty_AuthorizationType. App specific authorizations will override this. Then when a user logs in it will add the user if they do not exist then update their authorization to this value in the easyprocess system. This is done from the SAMLResponse page which first calls the security login process which will call the saml Add User identity provider process.Then it will call the applications Auto Add / Set Authorization Process to save the authorization.
You can also use claims to assign values to the user in our system. For example: if you wanted to set the users email you would create a claim called UserProperty_Email_[AppName] or AllAppUserProperty_Email
- Azure
- select Azure Active Directory
- Select Enterprise Applications from the left menu
- Select your application from the list or create a new one
- Select Single Sign On from the left menu
- Edit the basic saml configuration. This needs to match the information from the identity providers page
- Under SAML Signing Certificate download the Federation Metadata XML. This will need to be pasted into EASYProcess
- Google
- select Apps
- Select SAML Apps
- Click on the Plus icon in the bottom right to add a new app
- Select Setup my own custom app
- Download the IDP metadata then click next. This will need to be copied into EASYProcess
- Give you application a name and click next
- Set the Identifier (Entity ID) and the ACS Url. This information can be found from the identity providers page. Click Next.
- This step is optional and you can come back to it later. See option setup below. After adding mapping or if you choose not to click Finish
- This step is optional and you can come back to it later. See option setup below. After adding mapping or if you choose not to click Finish
- Once you have the saml app selected. Click Configure SAML attribute mapping.
- Now you can add new claims to return by clicking add mapping
- OKTA
- Login to your okta domain.
- Click on Add App next to Use Single sign on
- Click on Create New App
- Select Saml 2.0 and click create
- Give it a name and click next
- Fill out the single sign on url and entity id. This information is found from the identity providers page then the Primary Entity Id/Meta Data link. After this is filled out scroll to the bottom and click next.
- Fill out the feedback and click the finish button.
- Click on the Identity Provider metadata link. This will open a new tab with the metadata that is needed to be copied to EASYProcess
- Under the directory header select Profile Editor
- Click on the profile button next to your app. You can also follow the same steps to add attribute to the base okta user.
- Click on Add Attribute
- Once all attributes are added from the profile editor page click on the Mappings button
- Select the Okta User to AppName tab where AppName is the name of your application.
- Active Directory Federation Services (ADFS)
- Open ADFS Console and on the left hand side browse to Relying Party Trusts
- On the righthand side under Actions select Add Relying Party Trust
- Select Claims Aware and Start
- Select Enter Data About The Relying Party Trust Manually and click Next
- Choose a Relevant Display Name and Add A Description and click Next
- Skip the Certificate configuration and click Next
- Select the Enable Support For The SAML 2.0 WebSSO Protocol and enter in the Relying Party SAML 2.0 SSO Service URL (Obtained from the EasyProcess Application) and click Next
- Enter the Relying Party Trust Identifier (This is obtained from the Easy Process Application) click Add and then click Next
- Select Permit Everyone and then click Next
- Click Next at the Ready To Add Trust screen
- Ensure Configure Claims Issuance Policy For This Application is selected and click Close
- An Edit Claims Rule window appears select Add Rule
- Select Send LDAP Attributes as Claims and click Next
- In the configure claim rule window give your Claim Rule a unique name, select Active Directory as the Attribute Store and select User-principal-
- name as LDAP Attribute and Name_ID as the Outgoing Claim and click Finish
- Click Apply and OK