Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionLast revisionBoth sides next revision | ||
75:integration:saml [2023/09/14 13:36] – twn | 75:integration:saml [2024/02/06 10:23] – [Configuring Stages attributes in default-matcher section with JavaScript] alz | ||
---|---|---|---|
Line 28: | Line 28: | ||
< | < | ||
| | ||
- | keystore="/ | + | keystoreFile="/ |
| | ||
... | ... | ||
Line 36: | Line 36: | ||
To globally enable SAML, set the '' | To globally enable SAML, set the '' | ||
+ | |||
+ | |||
===== Configure the SAML Service Provider (SP) ===== | ===== Configure the SAML Service Provider (SP) ===== | ||
Line 64: | Line 66: | ||
===== Generate the SAML SP metadata ===== | ===== Generate the SAML SP metadata ===== | ||
- | After configuring the SAML SP, you can download the SAML SP metadata directly by navigating to the URL '' | + | After configuring the SAML SP and logged on as root, you can download the SAML SP metadata directly by navigating to the URL '' |
The resulting XML file can be sent to the SAML IdP administrators and contains all information necessary to set up the trust relationship on the IdP side. After the SAML IdP has been configured with the SP metadata, users will be able to authenticate successfully with Stages through the SAML IdP. | The resulting XML file can be sent to the SAML IdP administrators and contains all information necessary to set up the trust relationship on the IdP side. After the SAML IdP has been configured with the SP metadata, users will be able to authenticate successfully with Stages through the SAML IdP. | ||
===== ===== | ===== ===== | ||
+ | |||
===== Configure the SAML Identity Provider (IdP) ===== | ===== Configure the SAML Identity Provider (IdP) ===== | ||
Line 96: | Line 99: | ||
providerUrl="< | providerUrl="< | ||
nameIdPolicyFormat=" | nameIdPolicyFormat=" | ||
+ | sendBinding=" | ||
userFullnameTemplate=" | userFullnameTemplate=" | ||
Line 180: | Line 184: | ||
After you configured the service provider and identity provider in '' | After you configured the service provider and identity provider in '' | ||
+ | |||
===== Changing the license pool and license type for existing users ===== | ===== Changing the license pool and license type for existing users ===== | ||
Line 221: | Line 226: | ||
</ | </ | ||
- | | + | < |
+ | Attribute contains value: | ||
+ | |||
+ | </ | ||
< | < | ||
< | < | ||
- | < | + | < |
</ | </ | ||
Line 233: | Line 241: | ||
< | < | ||
< | < | ||
- | < | + | < |
</ | </ | ||
Line 240: | Line 248: | ||
* The pattern matches the entry of the SAML attribute " | * The pattern matches the entry of the SAML attribute " | ||
- | * Depending on the users' email address (domain-part), | + | * Depending on the users' email address (domain-part), |
< | < | ||
Line 247: | Line 255: | ||
| | ||
| | ||
- | if (mail.match(/ | + | if (email.match(/ |
- | else if (mail.match(/ | + | else if (email.match(/ |
else ' | else ' | ||
" | " | ||
| | ||
- | if (mail.match(/ | + | if (email.match(/ |
- | else if (mail.match(/ | + | else if (email.match(/ |
else ' | else ' | ||
" | " | ||
| | ||
- | if (mail.match(/ | + | if (email.match(/ |
else ''; | else ''; | ||
" | " | ||
Line 268: | Line 276: | ||
===== ===== | ===== ===== | ||
+ | |||
===== Configure the SAML Request Type ===== | ===== Configure the SAML Request Type ===== |