Egnyte Single Sign-On (SSO) Configuration for Active Directory Federation Services (ADFS)



Similar documents
Configuring Active Directory with AD FS and SAML for Brainloop Secure Dataroom Setup Guide

Egnyte Single Sign-On (SSO) Installation for Okta

Egnyte Single Sign-On (SSO) Installation for OneLogin

To set up Egnyte so employees can log in using SSO, follow the steps below to configure VMware Horizon and Egnyte to work with each other.

Configuring ADFS 3.0 to Communicate with WhosOnLocation SAML

ADFS Integration Guidelines

CA Nimsoft Service Desk

VMware Identity Manager Integration with Active Directory Federation Services 2.0

Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x

CONFIGURATION GUIDE WITH MICROSOFT ACTIVE DIRECTORY FEDERATION SERVER

Microsoft Office 365 Using SAML Integration Guide

SalesForce SSO with Active Directory Federated Services (ADFS) v2.0 Authenticating Users Using SecurAccess Server by SecurEnvoy

Security Assertion Markup Language (SAML) Site Manager Setup

T his feature is add-on service available to Enterprise accounts.

Only LDAP-synchronized users can access SAML SSO-enabled web applications. Local end users and applications users cannot access them.

360 Online authentication

HOTPin Integration Guide: Salesforce SSO with Active Directory Federated Services

Tenrox. Single Sign-On (SSO) Setup Guide. January, Tenrox. All rights reserved.

Copyright

Getting Started with AD/LDAP SSO

ADFS for. LogMeIn and join.me authentication

Fairsail. Implementer. Single Sign-On with Fairsail and Microsoft Active Directory Federation Services 2.0. Version 1.92 FS-SSO-XXX-IG R001.

Active Directory Federation Services

Configuration Task 3: (Optional) As part of configuration, you can deploy rules. For more information, see "Deploy Inbox Rules" below.

An overview of configuring WebEx for single sign-on. To configure the WebEx application for single-sign on from the cloud service (an overview)

HOTPin Integration Guide: Google Apps with Active Directory Federated Services

Management Utilities Configuration for UAC Environments

How To Install The Snow Active Directory Discovery Service On Windows (Windows) (Windows 7) (Powerbook) (For Windows) (Amd64) (Apple) (Macintosh) (Netbook) And (Windows

Active Directory Management. Agent Deployment Guide

AWS Management Portal for vcenter. User Guide

Snow Active Directory Discovery

How To Use Saml 2.0 Single Sign On With Qualysguard

Configuring EPM System for SAML2-based Federation Services SSO

OneLogin Integration User Guide

Cloud Services ADM. Agent Deployment Guide

How To Install Ctera Agent On A Pc Or Macbook With Acedo (Windows) On A Macbook Or Macintosh (Windows Xp) On An Ubuntu (Windows 7) On Pc Or Ipad

Connected Data. Connected Data requirements for SSO

Acunetix Web Vulnerability Scanner. Getting Started. By Acunetix Ltd.

SAML-Based SSO Solution

Setup Guide for Exchange Server

Mozilla Thunderbird: Setup & Configuration Learning Guide

Instructions for Configuring a SAS Metadata Server for Use with JMP Clinical

Use Enterprise SSO as the Credential Server for Protected Sites

DESKTOP CLIENT CONFIGURATION GUIDE BUSINESS

An overview of configuring WebEx for single sign-on. To configure the WebEx application for single-sign on from the cloud service (an overview)

Integration Guide. SafeNet Authentication Service. Using SAS with Web Application Proxy. Technical Manual Template

EVault Endpoint Protection 7.0 Single Sign-On Configuration

Connecting to Delta College Exchange services off-campus

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014

For details about using automatic user provisioning with Salesforce, see Configuring user provisioning for Salesforce.

Client configuration and migration Guide Setting up Thunderbird 3.1

Lifesize Cloud Table of Contents

Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions

Configuring Salesforce

Managing User Accounts

Team Foundation Server 2012 Installation Guide

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users

Configuring Single Sign-on from the VMware Identity Manager Service to AirWatch Applications

client configuration guide. Business

Managing User Accounts

Windows XP Exchange Client Installation Instructions

How to set up Outlook Anywhere on your home system

Contents. Introduction. Prerequisites. Requirements. Components Used

HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE

Installation Guide v3.0

Configuring Thunderbird for Flinders Mail at home.

Managing Software Updates with System Center 2012 R2 Configuration Manager

Outlook 2010 Setup Guide (POP3)

An overview of configuring Intacct for single sign-on. To configure the Intacct application for single-sign on (an overview)

Setting up Hyper-V for 2X VirtualDesktopServer Manual

Authentication in XenMobile 8.6 with a Focus on Client Certificate Authentication

AvePoint Meetings for SharePoint On-Premises. Installation and Configuration Guide

Getting Started with Clearlogin A Guide for Administrators V1.01

Configuring user provisioning for Amazon Web Services (Amazon Specific)

1. Open the preferences screen by opening the Mail menu and selecting Preferences...

365 Services. 1.1 Configuring Access Manager Prerequisite Adding the Office 365 Metadata. docsys (en) 2 August 2012

Creating a New Domain Tree in the Forest

In the Active Directory Domain Services Window, click Active Directory Domain Services.

Please evaluate this documentation on the following site:

USERS GUIDE. How to acquire an Associate Digital Identity Certificates from the ica Identity Authority and Configure MAS

Managing users. Account sources. Chapter 1

Configuring Single Sign-on from the VMware Identity Manager Service to WebEx

Single Sign On (SSO) Implementation Manual. For Connect 5 & MyConnect Sites

Team Foundation Server 2010, Visual Studio Ultimate 2010, Team Build 2010, & Lab Management Beta 2 Installation Guide

Load Balancing Microsoft AD FS. Deployment Guide

Configuring Outlook for Windows to use your Exchange

Installing Policy Patrol on a separate machine

App Orchestration 2.5

Kaseya 2. User Guide. Version 6.1

Field Description Example. IP address of your DNS server. It is used to resolve fully qualified domain names

SP-initiated SSO for Smartsheet is automatically enabled when the SAML feature is activated.

User Management Tool 1.5

Customer Tips. Configuring Color Access on the WorkCentre 7328/7335/7345 using Windows Active Directory. for the user. Overview

Enabling single sign-on for Cognos 8/10 with Active Directory

Integrating Webalo with LDAP or Active Directory

How to Implement the X.509 Certificate Based Single Sign-On Solution with SAP Netweaver Single Sign-On

Section 1, Configuring Access Manager, on page 1 Section 2, Configuring Office 365, on page 4 Section 3, Verifying Single Sign-On Access, on page 5

To add Citrix XenApp Client Setup for home PC/Office using the 32bit Windows client.

How to Configure Outlook Client for Exchange

How To Connect To A Wireless Network On Windows 7 (Windows 7) On A Pc Or Mac Or Ipad (Windows) On Pc Or Ipa (Windows 8) On Your Computer Or Mac (Windows). (Windows.7) On An

Transcription:

w w w. e g n y t e. c o m Egnyte Single Sign-On (SSO) Configuration for Active Directory Federation Services (ADFS) To set up ADFS so that your employees can access Egnyte using their ADFS credentials, follow the steps below. 1. Adding Egnyte as a Relying Party Trust within ADFS 2. Configuring ADFS within Egnyte We support ADFS integration for customers running Windows Server 2008, 2008 R2, and Windows Server 2012. If you are running 2008 R2, please note that you will need to install Windows Server 2008 Rollup Patch 2 before attempting the steps below. This rollup patch requires a reboot. Adding Egnyte as a Relying Party Trust within ADFS 1. From the right-hand Actions pane of the ADFS 2.0 Management screen, select the Add Relying Party Trust option. 2. Select Start. www.egnyte.com 2015 by Egnyte Inc. All rights reserved. Revised September, 2015

3. Once in the Select Data Source screen, select the option labeled Enter data about the relying party manually and click Next. www.egnyte.com 2015 by Egnyte Inc. All rights reserved. 2

4. At the Specify Display Name screen, give the Relying Party Trust a descriptive and unique name (we suggest Egnyte SSO ), and click Next. 4. At the Choose Profile screen, select the AD FS 2.0 profile option to enable SAML 2.0 authentication and click Next. 5. Just click Next when you get to the Configure Certificate screen, there s nothing you need to do here. 6. At the Configure URL screen, check the box labeled Enable support for the SAML 2.0 WebSSO protocol, and enter your SAML 2.0 SSO service URL. www.egnyte.com 2015 by Egnyte Inc. All rights reserved. 3

This URL is unique to your company, and is expressed in all lower case letters: https://<your-custom-subdomain>.egnyte.com/samlconsumer/adfs For example, if your Egnyte account domain was acme, the URL would be: https:// acme.egnyte.com/samlconsumer/adfs Once this is entered, click Next. 5. At the Configure Identifiers screen, add a Relying party trust identifier. Type in: https://saml-auth.egnyte.com www.egnyte.com 2015 by Egnyte Inc. All rights reserved. 4

Once you ve typed in this identifier, click the Add button. The identifier will appear in the list of Relying party trust identifiers below. Click Next to move on. 6. At the Choose Issuance Authorization Rules screen, you may choose to have ADFS allow all domain users access by default, or none. This decision is up to you, but we recommend that you leave Permit all users to access this relying party selected initially while you continue the setup process. www.egnyte.com 2015 by Egnyte Inc. All rights reserved. 5

When you have made your selection, click Next. 7. At the Ready to Add Trust screen, you have the opportunity to review the selections you ve made in the previous screens. If you are satisfied, click Next. www.egnyte.com 2015 by Egnyte Inc. All rights reserved. 6

8. At the Finish screen, check the box next to the option to Open the Edit Claim Rules dialog for this relying party trust when the wizard closes ; click Close. www.egnyte.com 2015 by Egnyte Inc. All rights reserved. 7

9. In the Edit Claim Rules dialog, click the button labeled Add Rule. www.egnyte.com 2015 by Egnyte Inc. All rights reserved. 8

10. At the Choose Rule Type screen, you ll be prompted to select a Claim rule template. Preserve the default value ( Send LDAP Attributes as Claims ), and click Next. www.egnyte.com 2015 by Egnyte Inc. All rights reserved. 9

11. At the Configure Claim Rule screen, you ll be prompted for a rule name, an attribute store, and a set of LDAP attributes. www.egnyte.com 2015 by Egnyte Inc. All rights reserved. 10

An appropriate claim rule name would be something like Send Email Address or Send User Name. For an Attribute store, select Active Directory (assuming that Active Directory is what you re using for authentication). www.egnyte.com 2015 by Egnyte Inc. All rights reserved. 11

Below this option you will see a table with two columns, one labeled LDAP Attribute and the other Outgoing Claim Type. Do this if you selected Send Username in the Claim Rule Name box: In the first row, select an LDAP attribute of Sam-Account-Name, and an outgoing claim type of Name ID. When this is done, click Finish. Do this if you selected Send Email Address in the Claim Rule Name box: In the first row, select an LDAP attribute of Email Address, and an outgoing claim type of Name ID. When this is done, click Finish. 12. At this point, all of the claim rules needed are in place; click OK to exit the claim rules dialog and return to the ADFS Management console. Configuring ADFS within Egnyte 13. Click on Settings > External Authentication > SAML (SSO). 14. Check Enable SAML (SSO) check box. www.egnyte.com 2015 by Egnyte Inc. All rights reserved. 12

17. In the Idp Name field, select lowercase adfs. 18. In the IdP Account Name field, type your Egnyte domain name. 19. In the IdP target URL field, type the following: https://<your ADFS server name>/adfs/ls/ 20. In the IdP Issuer URL field, type the following: http://<your ADFS server name>/adfs/services/trust 20. Paste the public key from federation metadata file (It should be your service communication certificate) in the field marked SAML Certificate. Be sure to remove the BEGIN and END delimiter lines. 21. In the Default User Mapping you can select Egnyte username or email address, depending on the key you selected to authenticate with in Step 12 above. Once you click Save, your ADFS settings will be successfully applied and your users will be able to log in to your domain with their ADFS credentials. www.egnyte.com 2015 by Egnyte Inc. All rights reserved. 13