Before installation
What is needed from the customer to set up the SSO (single sign-on) on Azure AD platform using SAML protocol?
1. Customer sets up the first app in Azure AD: ADPOINT Java UI:
1.1. Basic SAML Configuration
ADPOINT 7.x
Identifier (Entity ID): https://xyz-test.integration-x.com/sso-saml
Reply URL (Assertion Consumer Service URL): https://xyz-test.integration-x.com/sso-saml
Sign-on URL: https://xyz-test.integration-x.com/sso-saml
ADPOINT X1 and later
Identifier (Entity ID): https://xyz-test.integration-x.com/sso-saml/saml2/service-provider-metadata/azure
Reply URL (Assertion Consumer Service URL): https://xyz-test.integration-x.com/sso-saml
Sign-on URL: https://xyz-test.integration-x.com/sso-saml
Compared to the previous version please note that Identifier (Entity ID) has some suffix added.
1.2. User Attributes & Claims
1.2.1. Required claim
Unique User Identifier (Name ID): user.userprincipalname
1.2.2. Additional claimshttp://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress: user.mail
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname: user.givenname
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name: user.userprincipalname
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname: user.surname
1.2.3. Add a group claim
Choose: All groups
Source attribute: Group ID
A new additional claim should appear: http://schemas.microsoft.com/ws/2008/06/identity/claims/groups user.groups
1.3. Assign users and roles.
2. Customer sets up the second app: ADPOINT Web Client (if needed)
Identifier (Entity ID): https://xyz-test.integration-x.com/sso-saml2/saml2/service-provider-metadata/azure
Reply URL (Assertion Consumer Service URL): https://xyz-test.integration-x.com/sso-saml2
Sign-on URL: https://xyz-test.integration-x.com/sso-saml2
3. Customer sends to Integration X:
"App Federation Metadata URL" from “SAML Certificates” section. It has to contain “appid” param with a value at the end.
Information about groups and roles.
Installation
Tomcat 8/9 (ADPOINT 7.x)
Tomcat/webapps/sso-saml.war
(copy it fromsnapshots/
from the FTP)Tomcat/webapps/conf/sso-saml.properties
Tomcat/webapps/conf/sso-saml2.properties
(only if the 2nd app is being configured; then you also need sso-saml2.war)Tomcat/webapps/conf/serverscripts/groupsandrole.js
Tomcat 10 (ADPOINT X1 and later)
Tomcat/webapps-javaee/sso-saml.war
(copy it fromsnapshots/X1/
from the FTP)
Note it’s a new folder. When Tomcat is started the files will be migrated towebapps
folder and thesso-saml
folder will be created there as usual.Tomcat/webapps/conf/sso-saml.yml
. Example:adpoint-launch-url: /adpoint/pages?jwt= metadata-uri: https://login.microsoftonline.com/aaaabbbb-cccc-dddd-eeee-ffff12345678/federationmetadata/2007-06/federationmetadata.xml?appid=11111111111111111111
Change adpoint-launch-url to whatever customer needs e.g.
/xui?jtw=
for the newest client.Change metadata-uri (Federation Metadata URL) to whatever customer has sent.
Tomcat/webapps/conf/sso-saml2.yml
(only if the 2nd app is being configured; then you also need sso-saml2.war)Tomcat/webapps/conf/serverscripts/groupsandrole.js
Troubleshooting
Log file
Tomcat/logs/sso-saml.log
Missing groups
Check if on Adpoint's final SSO webpage you can see groups in Authentication Attributes. If not ask a customer to add the groups attribute in:
Azure AD -> Enterprise Apps -> ADPOINT app -> Single Sign-on -> User Attributes & Claims -> Additional claims