Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Updated Images and Syntax

Create a Web Logon Procedure 

  1. Login to the DualShield Management Administration Console
  2. In the main menu, select navigate to “Authentication | Logon Procedure”Procedures”
  3. Click the “Create” “+Create” button on the toolbar
  4. Enter a suitable “Name” and select “Web SSO” as the type
    Image Removed, then select 'Type' from the drop-down as "Web SSO".

    Image Added

  5. Click “Save” to confirm creation.
  6. Click the Context Menu icon back on the context "..." menu of the newly created logon procedureLogon Procedure, then select “Logon Steps”
  7. In the popup windows, click the “Create” button on the toolbarwindow on the right, select "+ ADD" button, to add a new authentication method.
  8. Select from the list the required Select the authentication method, i.e. “Static Password” (AD Password)
  9. Click "Save" to add the Step.
  10. Repeat from 7 ,8 & 9 to create the second logon step, i.e. "One-Time Password"
    Image Removed- 9 for any additional authentication steps you wish to use:

    Image Added

Create a Web

...

Application 

  1. In the main menu, select navigate to “Authentication | Application”Applications”
  2. Click the “Create” “+ CREATE” button on in the toolbar
  3. Enter an appropriate “Name”
  4. Select the internal “Realm”
  5. Select the newly created logon procedure
    Image RemovedLogon Procedure created previously. 

    Image Added

  6. Click "Save"SAVE" to complete the Application creation.
  7. Click the context "..." menu of the newly created application, select then "AgentAgents"
    Image Removed
    Image Added

  8. Select the "Single Sign-on Server | SSO Server"
  9. Click "SaveSAVE" button to confirm.

  10. Click the context "..." menu of the newly created applicationApplication, select then "Self Test"
    Image Removedto confirm all components are correctly associated.

    Image Added


Create a new Service Provider

  1. In the main menu, select navigate to "SSO | Service Providers", click "Create"
  2. Click the "+ CREATE" button
  3. Select the "SSO Server", and enter Single Sign-on Server"
  4. Select the Sharepoint "Application" created previously
  5. Enter a suitable "Name"
  6. Select "'Type" ' as "WS-Federation" 
    Image Removed
    Image Added

  7. Click on the 2nd tab named "Attributes"
  8. Select the "Edit+ CREATE" button to add Attributes

Image Removed


  1. You

...

  1. need to

...

  1. create an Attribute that matches "RoleClaims" and "Identity Claims", as specified in the

...

  1. PowerShell scripts that will be

...

  1. created in the

...

  1. SharePoint Configuration

...

  1. section.   

...


  1. Select '

...

  1. Location'

...

Image Removed

6. Create an attribute for the 'RoleClaims'. This will have a fixed value which will contain the name of the role you have setup in the Link Groups script

Image Removed 

  1. as "HTTP Body"
  2. Enter an appropriate "Name"
  3. The 'Format' select from the drop-down "attrname-format:url"
  4. Within 'Value' select "Fixed Value" and set the Value as the

...

  1. actual name specified in the RoleClaims

...

  1. (replacing "NameOfRole" in this field). As per the following article:  Link Groups Script
  2. From the drop-down, set the 'Claim Type' as setting "http://schemas.microsoft.com/ws/2008/06/identity/claims"

          Image Added

    14. Click "SAVE" button to confirm creation of new Attribute.


    Next create 'Identity Claims attributes' that will be mapped to AD

...

  1. Attributes.

...

  1. There

...

  1. would usually

...

  1. be 3 attributes, containing emailaddress,

...

  1. givenName and

...

  1. Surname (

...

  1. see SSO

...

  1. Script article)


    You

...

  1. are able to map AD Attributes as follows

...

Image Removed

In the "Maps To" section click on the corresponding search button

Image Removed

Here you will select the Identity Source corresponding with your domain and choose the Email identity attribute from the drop down list.

Image Removed

...

  1. .
    16. Selecting 'Value' as "Maps to an identity attribute"
    17. Then click the magnifying glass, to the right of the field....
    18. Here you can change "Identity Source" to your internal AD Domain
    19. Then "Maps To" you can select a specific Attribute from Active Directory. ie: "Email"....
     
          Image Added

          Image Added

    Ensure checkbox "Return in Response" is enabled on all your

...

  1. Attributes.

Click Save


...

  1. 20. Click "SAVE" to create the new Attribute.
    21. Repeat

...

Image Removed

9. Click "Save"

...

  1. for the other Attributes. Then you should have all 3 setup, like follows:

          Image Added


    22. Finally click "SAVE" to confirm creation of these new Attributes.