Sharepoint server SSO

Similar documents
Configuring on-premise Sharepoint server SSO

Connected Data. Connected Data requirements for SSO

SP-initiated SSO for Smartsheet is automatically enabled when the SAML feature is activated.

Configuring. SuccessFactors. Chapter 67

Configuring. SugarCRM. Chapter 121

SAML single sign-on configuration overview

Configuring. Moodle. Chapter 82

Configuring SuccessFactors

An overview of configuring Intacct for single sign-on. To configure the Intacct application for single-sign on (an overview)

SAML single sign-on configuration overview

An overview of configuring WebEx for single sign-on. To configure the WebEx application for single-sign on from the cloud service (an overview)

For details about using automatic user provisioning with Salesforce, see Configuring user provisioning for Salesforce.

Configuring Parature Self-Service Portal

SAP NetWeaver Fiori. For more information, see "Creating and enabling a trusted provider for Centrify" on page

Configuring Salesforce

SAP NetWeaver AS Java

An overview of configuring WebEx for single sign-on. To configure the WebEx application for single-sign on from the cloud service (an overview)

Creating a generic user-password application profile

Office 365 deploym. ployment checklists. Chapter 27

Office 365 deployment checklists

Centrify Cloud Management Suite

Google Apps Deployment Guide

IIS, FTP Server and Windows

Configuring Single Sign-On from the VMware Identity Manager Service to Office 365

Configuring user provisioning for Amazon Web Services (Amazon Specific)

McAfee Cloud Identity Manager

VMware Identity Manager Administration

Authentication in XenMobile 8.6 with a Focus on Client Certificate Authentication

Configuring an ios App Store application

This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:

Configuring Single Sign-on from the VMware Identity Manager Service to WebEx

Tenrox. Single Sign-On (SSO) Setup Guide. January, Tenrox. All rights reserved.

Setting Up Resources in VMware Identity Manager

AVG Business SSO Partner Getting Started Guide

Generating an Apple Enterprise MDM Certificate

Administrator Guide. v 11

Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER

Configuration Guide. BES12 Cloud

Microsoft Office 365 Using SAML Integration Guide

Identity as a Service Powered by NetIQ IdentityAccess Service Configuration and Administration Guide

An Overview of Samsung KNOX Active Directory-based Single Sign-On

App Orchestration 2.5

Administering Jive Mobile Apps

OneLogin Integration User Guide

Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x

Preparing for GO!Enterprise MDM On-Demand Service

Flexible Identity Federation

Single Sign On (SSO) Implementation Manual. For Connect 5 & MyConnect Sites

Flexible Identity Federation

SAML application scripting guide

Guide for Generating. Apple Push Notification Service Certificate

Introduction to Mobile Access Gateway Installation

McAfee Cloud Identity Manager

This guide identifies two possible enterprise integration scenarios for NetScaler and Azure AD.

Only LDAP-synchronized users can access SAML SSO-enabled web applications. Local end users and applications users cannot access them.

Cloud Authentication. Getting Started Guide. Version

HRC Advanced Citrix Troubleshooting Guide. Remove all Citrix Instances from the Registry

Configuration Guide BES12. Version 12.2

Configure Single Sign on Between Domino and WPS

Dell One Identity Cloud Access Manager How to Configure Microsoft Office 365

Creating an Apple APNS Certificate

HOTPin Integration Guide: Salesforce SSO with Active Directory Federated Services

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15

VMware Identity Manager Connector Installation and Configuration

NSi Mobile Installation Guide. Version 6.2

Managing users. Account sources. Chapter 1

Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac

Security Assertion Markup Language (SAML) Site Manager Setup


Egnyte Single Sign-On (SSO) Configuration for Active Directory Federation Services (ADFS)

Single Sign On for ShareFile with NetScaler. Deployment Guide

AvePoint Meetings for SharePoint On-Premises. Installation and Configuration Guide

APNS Certificate generating and installation

Fairsail. Implementer. Single Sign-On with Fairsail and Microsoft Active Directory Federation Services 2.0. Version 1.92 FS-SSO-XXX-IG R001.

HOTPin Integration Guide: Google Apps with Active Directory Federated Services

McAfee Cloud Identity Manager

How To Use Salesforce Identity Features

Copyright Pivotal Software Inc, of 10

SAM Context-Based Authentication Using Juniper SA Integration Guide

How To Connect A Gemalto To A Germanto Server To A Joniper Ssl Vpn On A Pb.Net 2.Net (Net 2) On A Gmaalto.Com Web Server

Configuring Single Sign-on from the VMware Identity Manager Service to ServiceNow

Architecture and Data Flow Overview. BlackBerry Enterprise Service Version: Quick Reference

Centrify Cloud Connector Deployment Guide

Configuring identity platform settings

HarePoint Workflow Extensions for Office 365. Quick Start Guide

Configuration Guide BES12. Version 12.1

DreamFactory on Microsoft SQL Azure

ADFS Integration Guidelines

CA Performance Center

A Guide to New Features in Propalms OneGate 4.0

Configuring ADFS 3.0 to Communicate with WhosOnLocation SAML

RBackup Server Installation and Setup Instructions and Worksheet. Read and comply with Installation Prerequisites (In this document)

Quick Start Guide. Installation and Setup

Accessing TP SSL VPN


UP L18 Enhanced MDM and Updated Protection Hands-On Lab

BlackBerry Enterprise Service 10. Version: Configuration Guide

Centrify Mobile Authentication Services

Transcription:

Configuring g on-premise Sharepoint server SSO Chapter 99 You can now provide single sign-on to your on-premise Sharepoint server applications. This section includes the following topics: "An overview of configuring Sharepoint server for single sign-on" on page 99-43 "What you need to know about Sharepoint server" on page 99-44 "Configuring Sharepoint server in Cloud Manager" on page 99-45 "Configuring Sharepoint server for SSO" on page 99-50 An overview of configuring Sharepoint server for single sign-on For Sharepoint server, the overall workflow of configuring provisioning is as follows. Configuring Sharepoint server for single sign-on (an overview): 1 In Cloud Manager, you add and configure the Sharepoint server application. You enter your Sharepoint application Resource application URL, including the host name and port, and add /_trust to the end of the URL. For a Sharepoint application that runs on the standard port (80), the URL would look like this: https://mysharepointserver.domain.com/_trust. If your Sharepoint application login page has a different URL than the Resource Application URL, you edit the Advanced script to set the correct log in page. For example, setwctx( https://mysharepointserver.domain.com/sites/ mycompany ). 2 You then configure Sharepoint directly, using the Sharepoint Management Shell and the Sharepoint administrator console. a b c You use the Sharepoint Management shell to create the identity token issuer. You use the signing certificate and the sign-in URL from the application settings in Cloud Manager. In the Sharepoint administrator console, you upload the root certificate of the signing certificate that you used in the Sharepoint Server application in Cloud Manager. In the Sharepoint administrator console, you select Centrify as the Trusted Identity provider for your Sharepoint web application. 3 You test the configuration to make sure that SSO works as intended. 43

What you need to know about Sharepoint server Sharepoint server Requirements for SSO A signed certificate. You can either download one from Cloud Manager or use your organization s trusted certificate. To upload your own certificate to Cloud Manager, you ll need a certificate and its private key in a.pfx or.p12 file. Sharepoint 2010 or 2013 A Sharepoint web application Your Sharepoint web application is configured to use claims-based authentication. Setting up the certificates for SSO To establish a trusted connection between the web application and the cloud service, you need to have the same signing certificate in both the application and the application settings in Cloud Manager. If you use your own certificate, you upload the signing certificate and its private key in a.pfx or.p12 file to the application settings in Cloud Manager. You also upload the public key certificate in a.cer or.pem file to the web application. To download an application certificate from Cloud Manager (overview): 1 In the Apps page, add the application. 2 Click the application to open the application details. 3 In the Application Settings tab, click Download Signing Certificate to download and save the certificate. What you need to know about Sharepoint server Each application is different. Here are the Sharepoint server features and functionality that you need to know when configuring the application for SSO. Feature Available versions and clients SP-initiated SSO works? IdP-initiated SSO works? Is there a separate login for administrators after SSO is enabled? Lockout possibility and how to recover after lockout Description any platform that supports Sharepoint 2010 or Sharepoint 2013, such as mobile apps on ios and Android, desktop clients on Windows or Mac, web browsers. yes yes SSO works for the Sharepoint web application. Sharepoint administrators use a different URL to access the administrator console. No lockout possibility. Chapter 99 Configuring on-premise Sharepoint server SSO 44

Configuring Sharepoint server in Cloud Manager Configuring Sharepoint server in Cloud Manager To add and configure the Sharepoint server application in Cloud Manager: 1 In Cloud Manager, click Apps. 2 Click Add Web Apps. The Add Web Apps screen appears. 3 On the Search tab, enter the partial or full application name in the Search field and click the search icon. 4 Next to the application, click Add. 5 In the Add Web App screen, click Yes to confirm. Cloud Manager adds the application. 6 Click Close to exit the Application Catalog. The application that you just added opens to the Application Settings page. Application Configuration Help 45

Configuring Sharepoint server in Cloud Manager 7 Specify the following service provider settings: Option Required or optional 8 These are the identity provider settings: Set it to Resource Application URL Required [your Sharepoint server web application and port Issuer Required [the cloud service generates a value automatically for you to use, and you can edit it if you need to do so.] Option Set it to Description Description This is the URL that your Sharepoint Web application that accepts the SAML token. This is always https://<yoursharepoint-web-applicationfqdn-and-port>/_trust. This is already preset for you in the default Resource Application URL. Replace YOUR.SHAREPOINT.WEB.APP LICATION.FQDN.AND.PORT in the default Resource application URL with your Sharepoint web application s fully qualified host name and port. You can specify this to be any value; however, it must be the same value that you specify as the Issuer on the Sharepoint server. Identity Provider Sign-in URL [this field is not editable] The cloud service automatically generates the content of this field. You use this URL when you create the identity token issuer for Sharepoint in Sharepoint Management Shell Identity Provider Sign-out URL [this field is not editable] The cloud service automatically generates the content of this field. You can use this URL to specify that users are logged out of the user portal when they log out of Sharepoint server. Chapter 99 Configuring on-premise Sharepoint server SSO 46

Configuring Sharepoint server in Cloud Manager 9 On the Application Settings page, expand the Additional Options section and specify the following settings: Option Application ID Show in User app list Security Certificate Description Configure this field if you are deploying a mobile application that uses the Centrify mobile SDK, for example mobile applications that are deployed into a Samsung KNOX version 1 container. The cloud service uses the Application ID to provide single sign-on to mobile applications. Note the following: The Application ID has to be the same as the text string that is specified as the target in the code of the mobile application written using the mobile SDK. If you change the name of the web application that corresponds to the mobile application, you need to enter the original application name in the Application ID field. There can only be one SAML application deployed with the name used by the mobile application. The Application ID is case-sensitive and can be any combination of letters, numbers, spaces, and special characters up to 256 characters. Select Show in User app list to display this web application in the user portal. (This option is selected by default.) If this web application is added only to provide SAML for a corresponding mobile app, deselect this option so the web application won t display for users in the user portal. These settings specify the security certificate used for secure SSO authentication between the cloud service and the web application. Select an option to change the security certificate. Use existing certificate displays beneath it the certificate currently in use. The Download button below the certificate name downloads the current certificate through your web browser to your computer so you can supply the certificate to the web application during SSO configuration. It s not necessary to select this option it s present to display current status. Use the default tenant signing certificate selects the cloud service standard certificate for use. This is the default setting. Use a certificate with a private key (pfx file) from your local storage selects any certificate you want to supply, typically your organization s own certificate. To use this selection, you must click Browse to upload an archive file (.p12 or.pfx extension) that contains the certificate along with its private key. If the file has a password, you must enter it when prompted. 10 (Optional) On the Description page, you can change the name, description, and logo for the application. For some applications, the name cannot be modified. The Category field specifies the default grouping for the application in the user portal. Users have the option to create a tag that overrides the default grouping in the user portal. Application Configuration Help 47

Configuring Sharepoint server in Cloud Manager 11 On the User Access page, select the role(s) that represent the users and groups that have access to the application. When assigning an application to a role, select either Automatic Install or Optional Install: Select Automatic Install for applications that you want to appear automatically for users. If you select Optional Install, the application doesn t automatically appear in the user portal and users have the option to add the application. 12 (Optional) On the Policy page, specify additional authentication control for this application.you can select one or both of the following settings: Restrict app to clients within the Corporate IP Range: Select this option to prevent users outside the company intranet from launching this application. To use this option, you must also specify which IP addresses are considered as your intranet by specifying the Corporate IP range in Settings > Corporate IP Range. Require Strong Authentication: Select this option to force users to authenticate using additional, stronger authentication mechanisms when launching an application. Specify these mechanisms in Policy > Add Policy Set > Account Security Policies > Authentication. You can also include JavaScript code to identify specific circumstances when you want to block an application or you want to require additional authentication methods. For details, see Specifying application access policies with JavaScript. 13 On the Account Mapping page, configure how the login information is mapped to the application s user accounts. The options are as follows: Use the following Directory Service field to supply the user name: Use this option if the user accounts are based on user attributes. For example, specify an Active Directory field such as mail or userprincipalname or a similar field from the Centrify user service. Everybody shares a single user name: Use this option if you want to share access to an account but not share the user name and password. For example, some people share an application developer account. Use Account Mapping Script: You can customize the user account mapping here by supplying a custom JavaScript script. For example, you could use the following line as a script: LoginUser.Username = LoginUser.Get('mail')+'.ad'; The above script instructs the cloud service to set the login user name to the user s mail attribute value in Active Directory and add.ad to the end. So, if the user s mail attribute value is Adele.Darwin@acme.com then the cloud service uses Adele.Darwin@acme.com.ad. For more information about writing a script to map user accounts, see the SAML application scripting guide. Chapter 99 Configuring on-premise Sharepoint server SSO 48

Configuring Sharepoint server in Cloud Manager 14 (Optional) On the Advanced page, you can edit the script that generates the SAML assertion, if needed. For some Sharepoint web applications, particularly those running on Sharepoint 2010, you may need to modify the setwctx() call in the Advanced script and set it to your Sharepoint application home page, if it s not just the FQDN and port. For example, https://mysharepoint.server.com/sites/mycompany instead of just https:// mysharepoint.server.com. On the App Gateway page, you can configure the application so that your users can access it whether they are logging in from an internal or external location. For applications configured for the App Gateway, users do not have to use a VPN connection to access the application remotely. Note The App Gateway feature is a premium feature and is available only in the Centrify Identity Service App+ Edition. Please contact your Centrify representative to have the feature enabled for your account. Note Some applications can be used with App Gateway; not all applications are set up to use this feature. At this time, Web applications may use HTTPS or HTTP, and either the standard port of 443 or a non-standard port. IP addresses are only supported for onpremise apps and are not supported for external-facing apps. 15 (Optional) To enable App Gateway mode, select Make this application available via the internet. The Centrify identity platform verifies the application settings and displays the URL that you provided in application settings as the internal URL for the application. 16 Specify the external URL that users open to access the application from external locations. You can use an existing external URL or use one that the cloud service generates automatically for you. If you use an existing external URL, any links to the application URL do not need to change and will continue to work as is. However, you do need to upload an SSL certificate and modify your DNS settings. To use your existing external URL, select the first option and do the following: a b Enter the existing external URL. You can enter an internal or external URL here. Click Upload to browse to and upload your SSL certificate with the private key for the URL that you entered. The certificate file has either a.pfx or.p12 filename extension. To use the auto-generated external URL, select the second option. Later, you ll need to be sure to notify your users of the updated URL to use. 17 Select a cloud connector to use with the application at the Cloud connectors to use with this service section. Choose one of the following: Application Configuration Help 49

Configuring Sharepoint server for SSO Any available Select this option to allow the Centrify Identity Service to randomly select one of the available cloud connectors for your App Gateway configuration. Click Test Connection to make sure the connection between the cloud connector and the application is successful. Choose Select this option to specify one or more cloud connectors to use for your App Gateway configuration. If you select more than one cloud connector, the Centrify Identity Service randomly chooses one of the selected cloud connectors to use for the application. Once the configuration is saved, each future App Gateway request uses a random cloud connector from those selected, as long as the cloud connector is online. Once you select the cloud connectors you want to use, click Test Connection to make sure the connection between the selected cloud connectors and the application is successful. At least one cloud connector must succeed in order to save the configuration. Note If any of the cloud connectors are offline, they are not displayed in the list of available cloud connectors. 18 Click Save to save the App Gateway changes. Note If you configured the application to use an external URL, next you edit your DNS settings to accommodate the App Gateway connection to this application. You ll enter a CNAME record to map this URL to the application s gateway connection URL. For more information about configuring App Gateway and troubleshooting App Gateway connection issues, see "Configuring an application to use the App Gateway" on page 3-25 and "Troubleshooting" on page 3-28. On the Changelog page, you can see recent changes that have been made to the application settings, by date, user, and the type of change that was made. Note 19 Click Save. After configuring the application settings (including the role assignment) and the application s web site, you re ready for users to launch the application from the user portal. Configuring Sharepoint server for SSO When you configure Sharepoint to use the Centrify identity platform as the identity provider, you perform the following tasks: a Using Sharepoint Management Shell, you create the identity token issuer, using the signing certificate sign-in URL from the Sharepoint server application settings in Chapter 99 Configuring on-premise Sharepoint server SSO 50

Configuring Sharepoint server for SSO b c Cloud Manager. (Creating the SPTrustedIdentityTokenIssuer in Sharepoint Management Shell, below.) In Sharepoint, specify the new identity token issuer as the authentication provider for your web application. ("Specifying the authentication provider in Sharepoint" on page 99-52.) In Sharepoint, you create the trust relationship with the identity provider by uploading the root certificate. ("Creating the established trust relationship in Sharepoint" on page 99-52.) Creating the SPTrustedIdentityTokenIssuer in Sharepoint Management agement Shell To summarize, you ll need to run these Sharepoint Management Shell commands, in this order: a b c d e f $cert (Creates the certificate) $map1 (Creates the claim) $map2 (Creates the email section of the claim) $realm (Sets the realm) $signinurl (Sets the sign-in URL to the identity provider URL, as listed in the application settings in Cloud Manager.) $ap (Creates the SPTrustedIdentityTokenIssuer, with certificate, claims, realm, and sign-in URL.) To create the SPTrustedIdentityTokenIssuer: 1 Open a Sharepoint Management Shell window on the computer that hosts your Sharepoint server deployment. 2 Run the following command to create the certificate in Sharepoint: $cert = New-Object System.Security.Cryptography.X509Certificates.X509Certificate2("c:\download\si gning.cer") Specify the location of the signing certificate that you have specified in the Sharepoint application settings. 3 Run the following command to create the first claim in Sharepoint: $map1 = New-SPClaimTypeMapping "http://schemas.microsoft.com/ws/2008/06/ identity/claims/role" -IncomingClaimTypeDisplayName "Role" SameAsIncoming 4 Run the following command to create the second, email address claim in Sharepoint: $map2 = New-SPClaimTypeMapping "http://schemas.xmlsoap.org/ws/2005/05/identity/ claims/emailaddress -IncomingClaimTypeDisplayName "Email Address" SameAsIncoming 5 Run the following command to create the realm in Sharepoint: $realm = "urn:sharepoint:mysharepoint" Application Configuration Help 51

Configuring Sharepoint server for SSO The realm that you specify here can be anything, but it must match the Issuer field in the Sharepoint application settings. 6 Run the following command to configure the sign-in URL as the cloud service location: $signinurl = https://cloud.centrify.com/run?appkey=... Specify your sign-in URL from the Sharepoint application settings in Cloud Manager. 7 Run the following command to create the SPTrustedIdentityTokenIssuer: $ap = New-SPTrustedIdentityTokenIssuer -Name Centrify" -Description Centrify IDP" -Realm $realm -ImportTrustCertificate $cert -ClaimsMappings $map1, $map2 - SignInUrl $signinurl -IdentifierClaim $map2.inputclaimtype Enter the Name and Description as desired. When the command finishes, Sharepoint lists the identity provider as another trusted token issuer. Next, you specify the identity provider for your Sharepoint application. Specifying the authentication provider in Sharepoint After you ve created the SPTrustedIdentityTokenIssuer, you can now specify the identity provider by name as the authentication provider for your Sharepoint application. To set the Centrify identity platform as your identity provider: 1 In the Sharepoint administrator console, Application Management > Web Applications > Manage web applications. 2 Click your web application, and then click Authentication Provider. 3 Select the Claims Based Authentication Provider. 4 Select Centrify as the Trusted Identity Provider. Creating the established trust relationship in Sharepoint You need to upload the root certificate to establish the trust relationship. If you re using a certificate from a public, trusted third-party certificate provider, such as Verisign, you do not need to perform this task. If you re using the default signing certificate from the Sharepoint Server application settings page in Cloud Manager, you get the root certificate in Cloud Manager at Settings > Certificates > Download. To create the trust relationship between Sharepoint and your identity provider: 1 In the Sharepoint administrator console, go to Security > Managed Trust. 2 Click the trusted identity provider that you ve created. For example, click Centrify. 3 In the toolbar, click Edit. Chapter 99 Configuring on-premise Sharepoint server SSO 52

Configuring Sharepoint server for SSO 4 Click Browse and select the root certificate. 5 Click OK to save the changes. Application Configuration Help 53

Configuring Sharepoint server for SSO Chapter 99 Configuring on-premise Sharepoint server SSO 54