Create a Web Logon Procedure
- Login to the DualShield Management Administration Console
- In the main menu, select navigate to “Authentication | Logon Procedure”Procedures”
- Click the “Create” “+Create” button on the toolbar
- Enter a suitable “Name” and select “Web SSO” as the type
, then select 'Type' from the drop-down as "Web SSO". - Click “Save” to confirm creation.
- Click the Context Menu icon back on the context "..." menu of the newly created logon procedureLogon Procedure, then select “Logon Steps”
- In the popup windows, click the “Create” button on the toolbarwindow on the right, select "+ ADD" button, to add a new authentication method.
- Select from the list the required Select the authentication method, i.e. “Static Password” (AD Password)
- Click "Save" to add the Step.
- Repeat from 7 ,8 & 9 to create the second logon step, i.e. "One-Time Password"
- 9 for any additional authentication steps you wish to use:
Create a Web
...
Application
- In the main menu, select navigate to “Authentication | Application”Applications”
- Click the “Create” “+ CREATE” button on in the toolbar
- Enter an appropriate “Name”
- Select the internal “Realm”
- Select the newly created logon procedure
Logon Procedure created previously. - Click "Save"SAVE" to complete the Application creation.
- Click the context "..." menu of the newly created application, select then "AgentAgents"
- Select the "Single Sign-on Server | SSO Server"
- Click "SaveSAVE" button to confirm.
- Click the context "..." menu of the newly created applicationApplication, select then "Self Test"
to confirm all components are correctly associated.
Create a new Service Provider
- In the main menu, select navigate to "SSO | Service Providers", click "Create"
- Click the "+ CREATE" button
- Select the "SSO Server", and enter Single Sign-on Server"
- Select the Sharepoint "Application" created previously
- Enter a suitable "Name"
- Select "'Type" ' as "WS-Federation"
- Click the 2nd tab named "Attributes"
- Select the "+ CREATE" button
You need to create an Attribute that matches "RoleClaims" and "Identity Claims", as specified in the PowerShell scripts that will be created in the SharePoint Configuration section. - Select 'Location' as "HTTP Body"
- Enter an appropriate "Name"
- The 'Format' select from the drop-down "attrname-format:url"
- Within 'Value' select "Fixed Value" and set the Value as the actual name specified in the RoleClaims (replacing "NameOfRole" in this field). As per the following article: Link Groups Script
- From the drop-down, set the 'Claim Type' as setting "http://schemas.microsoft.com/ws/2008/06/identity/claims"
14. Click "SAVE" button to confirm creation of new Attribute.
Next create 'Identity Claims attributes' that will be mapped to AD Attributes. There would usually be 3 attributes, containing emailaddress, givenName and Surname (see SSO Script article)
You are able to map AD Attributes as follows.
Click "Save"16. Selecting 'Value' as "Maps to an identity attribute"
17. Then click the magnifying glass, to the right of the field....
18. Here you can change "Identity Source" to your internal AD Domain
19. Then "Maps To" you can select a specific Attribute from Active Directory. ie: "Email"....
Ensure checkbox "Return in Response" is enabled on all your Attributes.
20. Click "SAVE" to create the new Attribute.
21. Repeat for the other Attributes. Then you should have all 3 setup, like follows:
22. Finally click "SAVE" to confirm creation of these new Attributes.













