DocuSign Information Guide. Single Sign On Functionality. Overview. Table of Contents
|
|
|
- Maude Green
- 10 years ago
- Views:
Transcription
1 DocuSign Information Guide Single Sign On Functionality Overview The DocuSign Single Sign On functionality allows your system administrators to maintain user information in one location and your users can access the DocuSign console with their existing network credentials. This feature is available for the Advanced Administration Module and DocuSign Enterprise Edition plans, but requires some extra setup requirements. Customers wanting use the single sign-on with SAML must engage with DocuSign Professional Services to ensure the set up functions correctly. This guide provides information about how the functionality works and general set up information for Single Sign On functionality. Table of Contents How it Works... 2 Supported Protocols... 2 Setting Up Single Sign On for Your Account... 2 DocuSign Secure Token Service Requirements... 3 Maintaining Your SAML Configuration... 5 For More Information... 6 Example SAML 2.0 Service Provider Metadata XML... 6 Example SAML 2.0 Service Provider Initiated AuthNRequest... 8
2 2 How it Works Single Sign On (SSO) influences how both users and system administrators interact with the DocuSign service. DocuSign supports multiple specification of the Security Assertion Markup Language (SAML) for SSO integrations. Note: DocuSign supports Lightweight Directory Access Protocol (LDAP) on a limited basis. DocuSign requires that all LDAP implementations be done with direct involvement from DocuSign Professional Services. Speak with your Account Manager and DocuSign Professional Services for more information on implementing LDAP. Users There are two general methods used to set up SSO to allow users to access DocuSign. A user goes to the DocuSign console and enters their address. DocuSign recognizes the domain for the user and directs them to their Identity Provider application where they enter their network credentials to log on to their DocuSign account. A user is already logged on to their primary network. The network has a link to the DocuSign console and users are automatically logged in to the DocuSign console when they access the console through the link. System Administrators When SSO is enabled, system administrators can use their current authentication systems to manage user access to the DocuSign service, removing the need for users to manage their own DocuSign account logins. DocuSign also supports mixed access of both DocuSign password and SSO access. System administrators still need to add, remove and modify users and user Permissions through the DocuSign console or DocuSign Account Management API. Supported Protocols DocuSign SSO currently supports the following SAML protocols: OASIS SAML 2.0 WS-Federation SAML 1.1 Setting Up Single Sign On for Your Account In order to use the DocuSign SSO with SAML, you must have a DocuSign account and it is recommended you have a public Secure Token Service (STS) or Identity Provider (IdP) in order to issue SAML assertions to access the DocuSign Console. Contact your DocuSign Account Manager to set up a meeting with Professional Services to start the process. Professional Services will help you determine the best SSO method for your organization, coordinate configuring and testing for your account. You will be asked to provide the following information to configure SSO for your account: Your X.509 certificate. DocuSign uses the public facing certificate. The certificate must be from a trusted certificate authority. All SAML/SSO exchanges will need to be signed with the X.509Certificate before being sent to DocuSign for consumption.
3 3 If you choose to use the Service Provider initiated method where DocuSign traps on domains and redirects to the customer IdP, you must provide the suffixes used to log on to the DocuSign console. You can have multiple domains in your setup, but the domains must be unique to your organization. DocuSign requires proof of ownership of domains. The DocuSign IdP/STS requirements and X.509 certificate requirements are explained in the next section. Getting Started The DocuSign demo ( application environment can be used to setup the configuration. The account must have Single Sign On privileges enabled in the DocuSign management console. In general, DocuSign recommends starting with a set up where users access DocuSign from within your network and then, if needed, move to the domain method. DocuSign also requests, but does not require, that customers have a test or staging environment that can be used as IdP/STS during the initial setup and testing with DocuSign. If any issues arise that need further investigation, DocuSign has a QA environment that the Development staff can use to debug and step through code path execution to examine issues. DocuSign Secure Token Service Requirements In order to implement a Single Sign On session with the DocuSign Web Console, you must provide your own Secure Token Service (STS) or Identity Provider (IdP) to issue SAML assertions for access to the DocuSign Web Console. Note: The information in this document is subject to change during the development process at DocuSign. Information about connecting to the DocuSign API with SSO will be addresses later. DocuSign does not currently provide SAML access to our API. Currently DocuSign recommends using the Send On Behalf Of functionality in conjunction with our API architecture. DocuSign Information DocuSign has implemented the Windows Identity Foundation (WIF) to control our Single Sign On functionality. DocuSign is able to consume Microsoft SAML 1.1 and SAML 2.0. Service Provider Endpoint URL When setting up you system, you must point to the Endpoint URL of the primary DocuSign environment for your account (for example: if your account is on the DocuSign NA2 production server, your Endpoint should use If you do not know the primary environment for your account, contact your Account Manager. The following Endpoint URLs are associated with DocuSign environments for SAML 1.1 and SAML 2.0: Environment WS Federation 1.1 OASIS SAML 2.0 QA Demo North American Production
4 4 Environment WS Federation 1.1 OASIS SAML 2.0 Europe DocuSign Requirements X.509 Certificate Exchange DocuSign will exchange X.509 certificates with our STS clients. These certificates must be from a trusted certificate authority and be the public facing cert (i.e. no private key attachment). All SAML/SSO exchanges will need to be signed with the customer s DocuSign X.509 certificate before being sent to DocuSign for consumption. DocuSign has some restrictions on accepting self-signed certificates. If you use self-signed certificates, there will be extra setup requirements and fees associated with the integration. SAML 2.0 Service Provider Metadata XML The DocuSign service provider application has metadata available to describe assertions and signatures expected from Identity Provider applications. The Example SAML 2.0 Service Provider Metadata XML section provides an example of the SAML metadata.xml. The URL s for accessing the metadata for various environments are as follows: Production: Production NA2: Production Europe: Demo: SAML 2.0 Service Provider Initiated AuthNRequest Post The DocuSign service provider can provide a SP initiated AuthNRequest HTTP POST to an Identity Provider application. The Example SAML 2.0 Service Provider Initiated AuthNRequest Post section shows an example of the SAML AuthNRequest POST data content. DocuSign Claims DocuSign must have the following claims presented in the SAML assertion and these claims must match the credentials of the membership in the DocuSign account: Required Optional
5 5 Note: If the name assertion cannot be generated by the customer, the assertions firstname and lastname must be used together with the address assertion. If the Client STS has additional claims, you need to provide them. Please contact your DocuSign Account Manager with the additional claims. DocuSign does not currently auto-provision members from SAML assertion credentials. Therefore, memberships will need to be pre-provisioned with the and complete username that will be received from the customer STS or ADFS system in the SAML token. Other Assertion Elements The Assertion elements listed below should be available in the request: saml:assertion attribute ID should always be unique for the client. saml:conditions attributes NotBefore and NoOnOrAfter using the standard time range. saml:audiencerestriction identifies the intended realm. Query Parameters WS Federation requires the following query parameters (as hidden input variables) with the Assertion request via POST: wa wsignin1.0 wtrealm target realm wresult contains the entire SAML assertion XML node structure. All left angle brackets and double quotes must be escaped, (i.e. < ") wctx this optional query parameter is reserved for DocuSign use to maintain state information, to deeplink to a senders/recipients envelope. OASIS query parameters: RelayState - this optional query parameter is reserved for DocuSign use to maintain state information, to deeplink to a senders/recipients envelope. Maintaining Your SAML Configuration After your SSO is enabled, you will be able to change your Identity Provider Endpoint URL (if used with your setup) and upload a new X.509 certificate. This allows you to keep your certificate up to date without having to contact DocuSign. To access your SAML Configuration page, go to the web console Preferences, in the Navigation panel click Features, scroll down to the Advanced heading and then click SAML Configuration. The SAML 2.0 Configuration page is displayed, allowing you to modify the endpoint URL and upload a new X.509 signing certificate.
6 6 For More Information For more information about additional DocuSign features, go to the DocuSign website. Example SAML 2.0 Service Provider Metadata XML The following xml sample is an example of the DocuSign service provider metadata: <md:entitydescriptor entityid=" ID="_ce5716b6-9f54-43ae-b48cdb79dbc144e3"> <Signature> <SignedInfo> <CanonicalizationMethod Algorithm=" <SignatureMethod Algorithm=" <Reference URI="#_ce5716b6-9f54-43ae-b48c-db79dbc144e3"> <Transforms> <Transform Algorithm=" ><Transform Algorithm=" <InclusiveNamespaces PrefixList="#default md saml ds xs xsi"/> </Transform> </Transforms> <DigestMethod Algorithm=" <DigestValue>yMpCIZNnxiPxa37p0ucF4a/B9hM= </DigestValue> </Reference> </SignedInfo> <SignatureValue>w09quLXhTI5VU2UUn09FXPXLWHEW70m/qoMKhzAAHOkgRzUg4xQe64DZUCOqK3UeEtd5V QHrOa+L1Bt66wiUe0PuFBoVkvGRhXRi0/mK20vptkbboppstfYkgootAESa2ad17PG8KOMxZ4WgxFClvL4V+2jsJP 2KE7f/7hpMIltH1XY38HkHb0mdnKlSNa+dwN32M1PxRAd/gpIGk7FOmCXiDzcu2x9ziSocVl3bIaFEUCc6/NcuQhB lfwadqmarxmd5isyjzp1nngdkfipu9n1wwe4kajwujya/j73nzv2hevefn6sfqtu3wuhkcudcackoadwwm+4bipz6 4OU0LA== </SignatureValue> <KeyInfo> <X509Data>
7 7 <X509Certificate>MIIGSTCCBTGgAwIBAgIQU5JinnCKgrxK6bYLP0QrGDANB gkqhkig9w0baqufadcbvjelmakga1uebhmcvvmxfzavbgnvbaotdlzlcmltawdulcbjbmmumr8whqydvqqlexzwzx JpU2lnbiBUcnVzdCBOZXR3b3JrMTswOQYDVQQLEzJUZXJtcyBvZiB1c2UgYXQgaHR0cHM6Ly93d3cudmVyaXNpZ24 uy29tl3jwysaoyykwnje4mdyga1ueaxmvvmvyavnpz24gq2xhc3mgmybfehrlbmrlzcbwywxpzgf0aw9uifnttcbt R0MgQ0EwHhcNMTEwOTI5MDAwMDAwWhcNMTMxMDE1MjM1OTU5WjCCASIxEzARBgsrBgEEAYI3PAIBAxMCVVMxGzAZB gsrbgeeayi3paibahqkv2fzagluz3rvbjedmbsga1uedxmuuhjpdmf0zsbpcmdhbml6yxrpb24xejaqbgnvbautct YwMjI4NDYxODELMAkGA1UEBhMCVVMxEzARBgNVBAgUCldhc2hpbmd0b24xEDAOBgNVBAcUB1NlYXR0bGUxFzAVBgN VBAoUDkRvY3VTaWduLCBJbmMuMR4wHAYDVQQLFBVQcm9kdWN0aW9uIE9wZXJhdGlvbnMxMzAxBgNVBAsUKlRlcm1z IG9mIHVzZSBhdCB3d3cudmVyaXNpZ24uY29tL3JwYSAoYykwNTEZMBcGA1UEAxQQd3d3LmRvY3VzaWduLm5ldDCCA SIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAOqNnne0roWcKNb/z04P18HFsvbqyoxWZjoG0g+g63FlpmZf7O gqj8a1tmyxqncrgvoleyz0jgxrm55howvnl9vzlbojafsh8pvgauhnxca961rohlchzvyn9eirpa1yncbavrcscpg rx8mrofyplxu8i2h011hiw9x9n+/+oz9vaafkxbtrej5n2r8zhom+srqbt8qkmbt+ih1ywdiz4uflhcwvuybxwlp3 hhed6+9ubzuabotn7ebpumaq6cgvdajz3nyokawd72zxbhhbcz/jj6uh+mgcwnp7mlcvwj8ws7wytlkqtzqcaa5dh 0FTzBnDfAUkVYY8AgAcGKMgBLECAwEAAaOCAdowggHWMAkGA1UdEwQCMAAwCwYDVR0PBAQDAgWgMEQGA1UdIAQ9MD swoqylyiziayb4rqehfwywkjaobggrbgefbqccarycahr0chm6ly93d3cudmvyaxnpz24uy29tl2nwcza+bgnvhr8 ENzA1MDOgMaAvhi1odHRwOi8vRVZJbnRsLWNybC52ZXJpc2lnbi5jb20vRVZJbnRsMjAwNi5jcmwwNAYDVR0lBC0w KwYIKwYBBQUHAwEGCCsGAQUFBwMCBglghkgBhvhCBAEGCisGAQQBgjcKAwMwHwYDVR0jBBgwFoAUTkPIHXbvN1N6T /JYb5TzOOLVvd8wbwYIKwYBBQUHAQEEYzBhMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC52ZXJpc2lnbi5jb20wOQ YIKwYBBQUHMAKGLWh0dHA6Ly9FVkludGwtYWlhLnZlcmlzaWduLmNvbS9FVkludGwyMDA2LmNlcjBuBggrBgEFBQc BDARiMGChXqBcMFowWDBWFglpbWFnZS9naWYwITAfMAcGBSsOAwIaBBRLa7kolgYMu9BSOJsprEsHiyEFGDAmFiRo dhrwoi8vbg9nby52zxjpc2lnbi5jb20vdnnsb2dvms5nawywdqyjkozihvcnaqefbqadggebacgczfodqwe4x071e H7Qf6z5dQ1wM6/GsKrXKlkyuhPkrrKD7TaU916FVYFsEY3R94FemYkiWQ3B4eank/vxtFgXqvK+0Rl/awZCBmtKdo jffwj/e3/hdugos74crljet6ughyqohgp0vn6nc6b1dkhpkc3zmg6szemyir0kaxj1km9/dd1cbo39d1rgtpmnl0p 1W0eVkTrgMI77ZQDP9F39+8wWtOv0prDRUQQ2xoqPBzilWI8fA+lrFQg7BoS34yxOVWT7pc1jZJAaG1OGP3gpDrbv ohqmeuejb6pknqtondw90p3nacj2w3gvmtznmzpyxyj2ij8ub2ot5ilhe4q= </X509Certificate> </X509Data> </KeyInfo> </Signature> <md:spssodescriptor ID="_5d e7f4-443a-bed8-fdd6b321d17e" protocolsupportenumeration="urn:oasis:names:tc:saml:2.0:protocol" AuthnRequestsSigned="true" WantAssertionsSigned="true"> <md:nameidformat>urn:oasis:names:tc:saml:2.0:nameid-format:transient </md:nameidformat> <md:assertionconsumerservice Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST" Location=" index="1" isdefault="true"/> <md:attributeconsumingservice index="1" isdefault="false"> <md:requestedattribute isrequired="true" Name="urn:oid: " NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri" FriendlyName=" "/> <md:requestedattribute isrequired="true" Name="urn:oid: " NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri" FriendlyName="commonName"/> <md:requestedattribute isrequired="false" Name="urn:oid: " NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri" FriendlyName="surname"/> <md:requestedattribute isrequired="false" Name="urn:oid: " NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri" FriendlyName="givenName"/> </md:attributeconsumingservice> </md:spssodescriptor> <md:organization> <md:organizationname xml:lang="en">docusign </md:organizationname> <md:organizationdisplayname xml:lang="en">docusign </md:organizationdisplayname> <md:organizationurl xml:lang="en"> </md:organizationurl> </md:organization> <md:contactperson contacttype="technical"> <md:givenname>docusign </md:givenname> <md:surname>support </md:surname> </md: address>
8 8 </md:contactperson> </md:entitydescriptor> Example SAML 2.0 Service Provider Initiated AuthNRequest The following xml sample is an example of the DocuSign service provider initiated AuthNRequest POST. The issuer node inside the AuthNRequest POST or REDIRECT will be specific to the server environment in DocuSign that generated it. For example if it was generated by the issuer node will state If generated by na2.docusign.net, then it will state na2.docusign.net. <saml:issuer xmlns:saml="urn:oasis:names:tc:saml:2.0:assertion"> </saml:issuer> <Signature xmlns=" <SignedInfo> <CanonicalizationMethod Algorithm=" /> <SignatureMethod Algorithm=" /> <Reference URI="#_38e0e031-2a68-4e64-b6bb-99c5b20bd1e9"> <Transforms> <Transform Algorithm=" /> <Transform Algorithm=" <InclusiveNamespaces PrefixList="#default samlp saml ds xs xsi" xmlns=" /> </Transform> </Transforms> <DigestMethod Algorithm=" /> <DigestValue>p7tq1i9HeBksd0NuJQZieAqOPnk= </DigestValue> </Reference> </SignedInfo> <SignatureValue>nAY3L/fIYNSL9YUD+sj9idMzuRqDON5CzmVweZyO7kP7BZabGYuyL5yziBpC9Y3OnckgT 8oVfW/C9OMZCKFMWG/hvBugBi5A5+q4kZ1hAChtKQZlgJsqDqc0c8eMjgXSYPNbKo3VVv1dfBcN66Ba6ZpUF60q9/ a5hjxj34x6sc4= </SignatureValue> <KeyInfo> <X509Data> <X509Certificate>MIIBnjCCAQcCBEbTmdAwDQYJKoZIhvcNAQEEBQAwFjEUMBIGA1UEAxMLd3d3LmlkcC5j b20whhcnmdcwodi4mdm0mzeywhcnmtcwodi1mdm0mzeywjawmrqwegydvqqdewt3d3cuawrwlmnvbtcbnzanbgkqh kig9w0baqefaaobjqawgykcgyeao31q3mjzayxfzkldulcnanc/kg+rdfw+olydp+rubvwnt8x5jtiutcp8iq46tn EUFskmsonUb5AnG+zOCcawb2dJr8kBtCNhfi/TufZGBQNjuAxNMi34yIgRdGinaznHgclrAIIZTyKerQqYjPL1xRD sfgpzqggi/2opzn8nv5kcaweaatanbgkqhkig9w0baqqfaaobgqbmnwfn+98aybuqkfjfr69s9bvbvytk+hsx3gx0 g4e5sltlkcsu03xz8aoet0my4rvuspadrzdrv+gegg7gdp/rsvcss3dkuyuuvuwbiitq/hj4ekukza8nierz3oz4x a1/bk88et7rvsv5bmoxgjbsevtidtvopv0g13duiqyrcw== </X509Certificate> </X509Data> </KeyInfo> </Signature> <samlp:nameidpolicy AllowCreate="true" xmlns:samlp="urn:oasis:names:tc:saml:2.0:protocol" />
9 9 Copyright, Trademark and Patent Information Copyright DocuSign, Inc. All rights reserved. For information about DocuSign trademarks, copyrights and patents refer to the DocuSign Intellectual Property page ( on the DocuSign website. All other trademarks and registered trademarks are the property of their respective holders. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without the express written permission of DocuSign, Inc. Under the law, reproducing includes translating into another language or format. Every effort has been made to ensure that the information in this manual is accurate. DocuSign, Inc. is not responsible for printing or clerical errors. Information in this document is subject to change without notice. Version: DocuSign Release (November 2013) If you have any comments or feedback on our documentation, please send them to us at: Summary of changes for this version: Clarified the Service Provider Endpoint URL section to say that customers must point to the Endpoint URL for the primary server for their account. Removed information about DocuSign Preview environment, which is no longer used.
MLSListings Single Sign On Implementation Guide. Compatible with MLSListings Applications
MLSListings Single Sign On Implementation Guide Compatible with MLSListings Applications February 2010 2010 MLSListings Inc. All rights reserved. MLSListings Inc. reserves the right to change details in
Tusker IT Department Tusker IT Architecture
Tusker IT Department System Overview Documents Tusker IT Department Tusker IT Architecture Single Sign On Overview Page 1 Document Information and Approvals VERSION HISTORY Version # Date Revised By Reason
DocuSign Single Sign On Implementation Guide Published: March 17, 2016
DocuSign Single Sign On Implementation Guide Published: March 17, 2016 Copyright Copyright 2003-2016 DocuSign, Inc. All rights reserved. For information about DocuSign trademarks, copyrights and patents
Single Sign-On Implementation Guide
Single Sign-On Implementation Guide Salesforce, Winter 16 @salesforcedocs Last updated: November 4, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark
Single Sign-On Implementation Guide
Single Sign-On Implementation Guide Salesforce, Summer 15 @salesforcedocs Last updated: July 1, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of
Configuring Single Sign-on from the VMware Identity Manager Service to ServiceNow
Configuring Single Sign-on from the VMware Identity Manager Service to ServiceNow VMware Identity Manager AUGUST 2015 V1 Configuring Single Sign-On from VMware Identity Manager to ServiceNow Table of Contents
HP Software as a Service. Federated SSO Guide
HP Software as a Service Federated SSO Guide Document Release Date: July 2014 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty statements accompanying
DocuSign Connect for Salesforce Guide
Information Guide 1 DocuSign Connect for Salesforce Guide 1 Copyright 2003-2013 DocuSign, Inc. All rights reserved. For information about DocuSign trademarks, copyrights and patents refer to the DocuSign
Security Assertion Markup Language (SAML) Site Manager Setup
Security Assertion Markup Language (SAML) Site Manager Setup Trademark Notice Blackboard, the Blackboard logos, and the unique trade dress of Blackboard are the trademarks, service marks, trade dress and
Configuring Single Sign-on from the VMware Identity Manager Service to WebEx
Configuring Single Sign-on from the VMware Identity Manager Service to WebEx VMware Identity Manager SEPTEMBER 2015 V 2 Configuring Single Sign-On from VMware Identity Manager to WebEx Table of Contents
Egnyte Single Sign-On (SSO) Installation for OneLogin
Egnyte Single Sign-On (SSO) Installation for OneLogin To set up Egnyte so employees can log in using SSO, follow the steps below to configure OneLogin and Egnyte to work with each other. 1. Set up OneLogin
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
HP Software as a Service
HP Software as a Service Software Version: 6.1 Federated SSO Document Release Date: August 2013 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty
ADFS Integration Guidelines
ADFS Integration Guidelines Version 1.6 updated March 13 th 2014 Table of contents About This Guide 3 Requirements 3 Part 1 Configure Marcombox in the ADFS Environment 4 Part 2 Add Relying Party in ADFS
Egnyte Single Sign-On (SSO) Configuration for Active Directory Federation Services (ADFS)
w w w. e g n y t e. c o m Egnyte Single Sign-On (SSO) Configuration for Active Directory Federation Services (ADFS) To set up ADFS so that your employees can access Egnyte using their ADFS credentials,
HOTPin Integration Guide: Salesforce SSO with Active Directory Federated Services
1 HOTPin Integration Guide: Salesforce SSO with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided
Configuring SAML2 for Single Sign-On to Smartsheet (Enterprise Only)
Configuring SAML2 for Single Sign-On to Smartsheet (Enterprise Only) This document is intended for technical professionals who are familiar with SAML and have access to the Identity Provider that will
Single Sign-on. Overview. Using SSO with the Cisco WebEx and Cisco WebEx Meeting. Overview, page 1
Overview, page 1 Using SSO with the Cisco WebEx and Cisco WebEx Meeting Applications, page 1 Requirements, page 2 Configuration of in Cisco WebEx Messenger Administration Tool, page 3 Sample Installation
Configuring ADFS 3.0 to Communicate with WhosOnLocation SAML
Configuring ADFS 3.0 to Communicate with WhosOnLocation SAML --------------------------------------------------------------------------------------------------------------------------- Contents Overview...
Using SAML for Single Sign-On in the SOA Software Platform
Using SAML for Single Sign-On in the SOA Software Platform SOA Software Community Manager: Using SAML on the Platform 1 Policy Manager / Community Manager Using SAML for Single Sign-On in the SOA Software
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
Configuring Single Sign-on from the VMware Identity Manager Service to AirWatch Applications
Configuring Single Sign-on from the VMware Identity Manager Service to AirWatch Applications VMware Identity Manager AUGUST 2015 V1 Configuring Single Sign-On from VMware Identity Manager to AirWatch Applications
Microsoft Office 365 Using SAML Integration Guide
Microsoft Office 365 Using SAML Integration Guide Revision A Copyright 2013 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete and accurate.
INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server
INTEGRATION GUIDE DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is
CA Nimsoft Service Desk
CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
365 Services. 1.1 Configuring Access Manager. 1.1.1 Prerequisite. 1.1.2 Adding the Office 365 Metadata. docsys (en) 2 August 2012
1 1Configuring Single Sign-On For Office 365 Services NetIQ Access Manager is compatible with Office 365 and provides single sign on access to Office 365 services. Single sign on access is supported for
Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER
Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER Table of Contents Introduction.... 3 Requirements.... 3 Horizon Workspace Components.... 3 SAML 2.0 Standard.... 3 Authentication
This section includes troubleshooting topics about single sign-on (SSO) issues.
This section includes troubleshooting topics about single sign-on (SSO) issues. SSO Fails After Completing Disaster Recovery Operation, page 1 SSO Protocol Error, page 1 SSO Redirection Has Failed, page
Only LDAP-synchronized users can access SAML SSO-enabled web applications. Local end users and applications users cannot access them.
This chapter provides information about the Security Assertion Markup Language (SAML) Single Sign-On feature, which allows administrative users to access certain Cisco Unified Communications Manager and
Single-Sign-On between On-Premises and the Cloud: Leveraging Windows Azure Active Directory to authenticate custom solutions and Apps
Sofia Event Center 14-15 May 2014 Single-Sign-On between On-Premises and the Cloud: Leveraging Windows Azure Active Directory to authenticate custom solutions and Apps Radi Atanassov SharePoint MCM & MVP
SAML Security Option White Paper
Fujitsu mpollux SAML Security Option White Paper Fujitsu mpollux Version 2.1 February 2009 First Edition February 2009 The programs described in this document may only be used in accordance with the conditions
Configuring Single Sign-On from the VMware Identity Manager Service to Office 365
Configuring Single Sign-On from the VMware Identity Manager Service to Office 365 VMware Identity Manager JULY 2015 V1 Table of Contents Overview... 2 Passive and Active Authentication Profiles... 2 Adding
SalesForce SSO with Active Directory Federated Services (ADFS) v2.0 Authenticating Users Using SecurAccess Server by SecurEnvoy
SalesForce SSO with Active Directory Federated Services (ADFS) v2.0 Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 Merlin House
Getting Started with AD/LDAP SSO
Getting Started with AD/LDAP SSO Active Directory and LDAP single sign- on (SSO) with Syncplicity Business Edition accounts allows companies of any size to leverage their existing corporate directories
Section 1, Configuring Access Manager, on page 1 Section 2, Configuring Office 365, on page 4 Section 3, Verifying Single Sign-On Access, on page 5
Configuring Single Sign-On For Office 365 Services NetIQ Access Manager is compatible with Microsoft Office 365 and provides single sign-on access to Office 365 services. Single sign-on access is supported
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 May 2015 About this guide Prerequisites and requirements NetWeaver configuration Legal notices About
Agenda. How to configure
[email protected] Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services
Single Sign On (SSO) Implementation Manual. For Connect 5 & MyConnect Sites
Single Sign On (SSO) Implementation Manual For Connect 5 & MyConnect Sites Version 6 Release 5.7 September 2013 1 What is Blackboard Connect Single Sign On?... 3 How it Works... 3 Drawbacks to Using Single
VMware Identity Manager Integration with Active Directory Federation Services 2.0
VMware Identity Manager Integration with Active Directory Federation Services 2.0 VMware Identity Manager J ULY 2015 V 2 Table of Contents Active Directory Federation Services... 2 Configuring AD FS Instance
Single Sign-On Implementation Guide
Version 27.0: Spring 13 Single Sign-On Implementation Guide Last updated: February 1, 2013 Copyright 2000 2013 salesforce.com, inc. All rights reserved. Salesforce.com is a registered trademark of salesforce.com,
Zendesk SSO with Cloud Secure using MobileIron MDM Server and Okta
Zendesk SSO with Cloud Secure using MobileIron MDM Server and Okta Configuration Guide Product Release Document Revisions Published Date 1.0 1.0 May 2016 Pulse Secure, LLC 2700 Zanker Road, Suite 200 San
SAM Context-Based Authentication Using Juniper SA Integration Guide
SAM Context-Based Authentication Using Juniper SA Integration Guide Revision A Copyright 2012 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete
INTEGRATE SALESFORCE.COM SINGLE SIGN-ON WITH THIRD-PARTY SINGLE SIGN-ON USING SENTRY A GUIDE TO SUCCESSFUL USE CASE
INTEGRATE SALESFORCE.COM SINGLE SIGN-ON WITH THIRD-PARTY SINGLE SIGN-ON USING SENTRY A GUIDE TO SUCCESSFUL USE CASE Legal Marks No portion of this document may be reproduced or copied in any form, or by
How To Use Saml 2.0 Single Sign On With Qualysguard
QualysGuard SAML 2.0 Single Sign-On Technical Brief Introduction Qualys provides its customer the option to use SAML 2.0 Single Sign On (SSO) authentication with their QualysGuard subscription. When implemented,
SAML SSO Configuration
SAML SSO Configuration Overview of Single Sign-, page 1 Benefits of Single Sign-, page 2 Overview of Setting Up SAML 2.0 Single Sign-, page 3 SAML 2.0 Single Sign- Differences Between Cloud-Based Meeting
Fairsail. Implementer. Single Sign-On with Fairsail and Microsoft Active Directory Federation Services 2.0. Version 1.92 FS-SSO-XXX-IG-201406--R001.
Fairsail Implementer Microsoft Active Directory Federation Services 2.0 Version 1.92 FS-SSO-XXX-IG-201406--R001.92 Fairsail 2014. All rights reserved. This document contains information proprietary to
DocuSign Quick Start Guide. In Person Signing. Overview. Table of Contents
DocuSign Quick Start Guide In Person Signing Overview The In Person Signing feature lets you use the DocuSign Service for electronic signatures even if the signer does not have access to email or a computer.
How to create a SP and a IDP which are visible across tenant space via Config files in IS
How to create a SP and a IDP which are visible across tenant space via Config files in IS This Documentation is explaining the way to create a SP and IDP which works are visible to all the tenant domains.
Perceptive Experience Single Sign-On Solutions
Perceptive Experience Single Sign-On Solutions Technical Guide Version: 2.x Written by: Product Knowledge, R&D Date: January 2016 2016 Lexmark International Technology, S.A. All rights reserved. Lexmark
Setting Up Federated Identity with IBM SmartCloud
White Paper March 2012 Setting Up Federated Identity with IBM SmartCloud 2 Setting Up Federated Identity with IBM SmartCloud Notices Contents International Business Machines Corporation provides this publication
Active Directory Federation Services
Active Directory Federation Services Installation Instructions for WebEx Messenger and WebEx Centers Single Sign- On for Windows 2008 R2 WBS29 Copyright 1997-2013 Cisco and/or its affiliates. All rights
IBM WebSphere Application Server
IBM WebSphere Application Server SAML 2.0 web single-sign-on 2012 IBM Corporation This presentation describes support for SAML 2.0 web browser Single Sign On profile included in IBM WebSphere Application
DualShield SAML & SSO. Integration Guide. Copyright 2011 Deepnet Security Limited. Copyright 2011, Deepnet Security. All Rights Reserved.
DualShield Integration Guide Copyright 2011 Deepnet Security Limited Copyright 2011, Deepnet Security. All Rights Reserved. Page 1 Trademarks Deepnet Unified Authentication, MobileID, QuickID, PocketID,
Using Check Boxes and Radio Buttons
DocuSign Quick Start Guide Using Check Boxes and Radio Buttons Overview When adding fields to a document, there might be times when you want to let your recipient select options on the document and you
Using the Payment Processing Feature
DocuSign Quick Start Guide Using the Payment Processing Feature Overview There might be times when you want to send an envelope where you can send an offer, close the deal and collect the cash all in one
Authentication Methods
Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the
INTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN
INTEGRATION GUIDE IDENTIKEY Federation Server for Juniper SSL-VPN Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO
Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.
Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,
Configuring EPM System 11.1.2.1 for SAML2-based Federation Services SSO
Configuring EPM System 11.1.2.1 for SAML2-based Federation Services SSO Scope... 2 Prerequisites Tasks... 2 Procedure... 2 Step 1: Configure EPM s WebLogic domain for SP Federation Services... 2 Step 2:
ORACLE TALEO BUSINESS EDITION SINGLE SIGN ON SERVICE PROVIDER REFERENCE GUIDE RELEASE 15.A2
ORACLE TALEO BUSINESS EDITION SINGLE SIGN ON SERVICE PROVIDER REFERENCE GUIDE RELEASE 15.A2 APR. 17 TH., 2015 Part Number: E50271-02 Oracle Corporation World Headquarters 500 Oracle Parkway Redwood Shores,
T his feature is add-on service available to Enterprise accounts.
SAML Single Sign-On T his feature is add-on service available to Enterprise accounts. Are you already using an Identity Provider (IdP) to manage logins and access to the various systems your users need
Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Salesforce
SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
2015-11-30. Web Based Single Sign-On and Access Control
0--0 Web Based Single Sign-On and Access Control Different username and password for each website Typically, passwords will be reused will be weak will be written down Many websites to attack when looking
Moodle and Office 365 Step-by-Step Guide: Federation using Active Directory Federation Services
Moodle and Office 365 Step-by-Step Guide: Federation using Active Directory Federation Services This document is provided as-is. Information and views expressed in this document, including URL and other
Configuring SAML2 for Single Sign-On to Smartsheet (Enterprise Only)
Configuring SAML2 for Single Sign-On to Smartsheet (Enterprise Only) This document is intended for technical professionals who are familiar with SAML and have access to the Identity Provider that will
Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x
Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x Sverview Trust between SharePoint 2010 and ADFS 2.0 Use article Federated Collaboration with Shibboleth 2.0 and SharePoint 2010 Technologies
Adding Signer Authentication to an Envelope
DocuSign Quick Start Guide Adding Signer Authentication to an Envelope Overview An important DocuSign feature is the ability to verify the identity of a recipient before they can access documents in an
To set up Egnyte so employees can log in using SSO, follow the steps below to configure VMware Horizon and Egnyte to work with each other.
w w w. e g n y t e. c o m Egnyte Single Sign-On (SSO) Installation for VMware Horizon To set up Egnyte so employees can log in using SSO, follow the steps below to configure VMware Horizon and Egnyte to
This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:
CHAPTER 1 SAML Single Sign-On This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: Junos Pulse Secure Access
INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server
INTEGRATION GUIDE DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
CONFIGURATION GUIDE WITH MICROSOFT ACTIVE DIRECTORY FEDERATION SERVER
UMANTIS CLOUD SSO CONFIGURATION GUIDE WITH MICROSOFT ACTIVE DIRECTORY FEDERATION SERVER THIS DOCUMENT DESCRIBES THE REQUIREMENTS TO SETUP A SINGLE SIGN ON (SSO) CONFIGURATION ON UMANTIS CLOUD BASED SOLUTIONS
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
WebNow Single Sign-On Solutions
WebNow Single Sign-On Solutions Technical Guide ImageNow Version: 6.7. x Written by: Product Documentation, R&D Date: June 2015 2012 Perceptive Software. All rights reserved CaptureNow, ImageNow, Interact,
OIOIDWS for Healthcare Token Profile for Authentication Tokens
OIOIDWS for Healthcare Token Profile for Authentication Tokens Common Web Service Profile for Healthcare in the Danish Public Sector, version 2.0 Content Document History...3 Introduction...4 Notation...
Security As A Service Leveraged by Apache Projects. Oliver Wulff, Talend
Security As A Service Leveraged by Apache Projects Oliver Wulff, Talend Application Security Landscape 2 Solution Building blocks Apache CXF Fediz Single Sign On (WS-Federation) Attribute Based Access
Add Microsoft Azure as the Federated Authenticator in WSO2 Identity Server
Add Microsoft Azure as the Federated Authenticator in WSO2 Identity Server This blog will explain how to use Microsoft Azure as a Federated Authenticator for WSO2 Identity Server 5.0.0. In this example
idp Connect for OutSystems applications
idp Connect for OutSystems applications THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
How to Implement Enterprise SAML SSO
How to Implement Enterprise SSO THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY How to Implement Enterprise SSO Introduction Security Assertion Markup Language, or, provides numerous The advantages and
Authentication and Single Sign On
Contents 1. Introduction 2. Fronter Authentication 2.1 Passwords in Fronter 2.2 Secure Sockets Layer 2.3 Fronter remote authentication 3. External authentication through remote LDAP 3.1 Regular LDAP authentication
Authentication Integration
Authentication Integration VoiceThread provides multiple authentication frameworks allowing your organization to choose the optimal method to implement. This document details the various available authentication
OpenLDAP Oracle Enterprise Gateway Integration Guide
An Oracle White Paper June 2011 OpenLDAP Oracle Enterprise Gateway Integration Guide 1 / 29 Disclaimer The following is intended to outline our general product direction. It is intended for information
SAP Cloud Identity Service Document Version: 1.0 2014-09-01. SAP Cloud Identity Service
Document Version: 1.0 2014-09-01 Content 1....4 1.1 Release s....4 1.2 Product Overview....8 Product Details.... 9 Supported Browser Versions....10 Supported Languages....12 1.3 Getting Started....13 1.4
IAM Application Integration Guide
IAM Application Integration Guide Date 03/02/2015 Version 0.1 DOCUMENT INFORMATIE Document Title IAM Application Integration Guide File Name IAM_Application_Integration_Guide_v0.1_SBO.docx Subject Document
Flexible Identity Federation
Flexible Identity Federation Administration guide version 1.0.1 Publication history Date Description Revision 2015.09.24 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
Cloud Single Sign-On and On-Premise Identity Federation with SAP NetWeaver Cloud White Paper
Cloud Single Sign-On and On-Premise Identity Federation with SAP NetWeaver Cloud White Paper TABLE OF CONTENTS INTRODUCTION... 3 Where we came from... 3 The User s Dilemma with the Cloud... 4 The Administrator
Get Success in Passing Your Certification Exam at first attempt!
Get Success in Passing Your Certification Exam at first attempt! Exam : C2150-575 Title : IBM Tivoli Federated Identity Manager V6.2.2 Implementation Version : Demo 1.What is the default file name of the
IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS
APPLICATION NOTE IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS SAML 2.0 combines encryption and digital signature verification across resources for a more
HOTPin Integration Guide: Google Apps with Active Directory Federated Services
HOTPin Integration Guide: Google Apps with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as
TIB 2.0 Administration Functions Overview
TIB 2.0 Administration Functions Overview Table of Contents 1. INTRODUCTION 4 1.1. Purpose/Background 4 1.2. Definitions, Acronyms and Abbreviations 4 2. OVERVIEW 5 2.1. Overall Process Map 5 3. ADMINISTRATOR
Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines
Ameritas Single Sign-On (SSO) and Enterprise SAML Standard Architectural Implementation, Patterns and Usage Guidelines 1 Background and Overview... 3 Scope... 3 Glossary of Terms... 4 Architecture Components...
About Me. #ccceu. @shapeblue. Software Architect with ShapeBlue Specialise in. 3 rd party integrations and features in CloudStack
Software Architect with ShapeBlue Specialise in. 3 rd party integrations and features in CloudStack About Me KVM, API, DB, Upgrades, SystemVM, Build system, various subsystems Contributor and Committer
Symplified I: Windows User Identity. Matthew McNew and Lex Hubbard
Symplified I: Windows User Identity Matthew McNew and Lex Hubbard Table of Contents Abstract 1 Introduction to the Project 2 Project Description 2 Requirements Specification 2 Functional Requirements 2
Software Design Document SAMLv2 IDP Proxying
Software Design Document SAMLv2 IDP Proxying Federation Manager 7.5 Version 0.2 Please send comments to: [email protected] This document is subject to the following license: COMMON DEVELOPMENT AND
Microsoft Active Directory Oracle Enterprise Gateway Integration Guide
An Oracle White Paper May 2011 Microsoft Active Directory Oracle Enterprise Gateway Integration Guide 1/33 Disclaimer The following is intended to outline our general product direction. It is intended
Integration of Office 365 with existing faculty SSO
Integration of Office 365 with existing faculty Best Practice Document Produced by the MARnet-led working group on campus wireless infrastrucure and security Authors: Vasko Sazdovski (MARnet), Boro Jakimovski
SAML Authentication with BlackShield Cloud
SAML Authentication with BlackShield Cloud Powerful Authentication Management for Service Providers and Enterprises Version 3.1 Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCARD
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
INTEGRATION GUIDE. DIGIPASS Authentication for SimpleSAMLphp using IDENTIKEY Federation Server
INTEGRATION GUIDE DIGIPASS Authentication for SimpleSAMLphp using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
PingFederate. Windows Live Cloud Identity Connector. User Guide. Version 1.0
Windows Live Cloud Identity Connector Version 1.0 User Guide 2011 Ping Identity Corporation. All rights reserved. Windows Live Cloud Identity Connector User Guide Version 1.0 April, 2011 Ping Identity
SAML Authentication Quick Start Guide
SAML Authentication Quick Start Guide Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright 2013 SafeNet, Inc. All rights reserved.
