|
|
@ -111,9 +111,9 @@ If you use Microsoft Azure SAML app to achieve single sign-on, please follow the
|
|||
|
||||

|
||||
|
||||
**Then**, setup the _Identifier_, _Reply URL_, and _Sign on URL_ of the SAML app based on your login URL, refer to: [enable single sign on for saml application](https://learn.microsoft.com/en-us/azure/active-directory/manage-apps/add-application-portal-setup-sso). The format of the _Identifier_, _Reply URL_, and _Sign on URL_ are: https://example.com/org/custom/{custom-part}/saml2/metadata/, https://example.com/org/custom/{custom-part}/saml2/acs/, https://example.com/org/custom/{custom-part}/, e.g.:
|
||||
**Then**, setup the _Identifier_, _Reply URL_, _Sign on URL_ and _Logout Url_ of the SAML app based on your login URL, refer to: [enable single sign on for saml application](https://learn.microsoft.com/en-us/azure/active-directory/manage-apps/add-application-portal-setup-sso). The format of the _Identifier_, _Reply URL_, and _Sign on URL_ are: https://example.com/org/custom/{custom-part}/saml2/metadata/, https://example.com/org/custom/{custom-part}/saml2/acs/, https://example.com/org/custom/{custom-part}/, https://example.com/org/custom/{custom-part}/ls/, e.g.:
|
||||
|
||||

|
||||

|
||||
|
||||
__Note__: The {custom-part} of the URL should be 6 to 20 characters, and can only contain alphanumeric characters and hyphens.
|
||||
|
||||
|
|
@ -137,11 +137,15 @@ and upload the idp.crt in the organization admin interface:
|
|||
|
||||

|
||||
|
||||
**Finally**, open the browser and enter your custom login URL into the browser, e.g.:
|
||||
**Finally**, open the browser and enter the Seafile login page, click `Single Sign-On`, e.g.
|
||||
|
||||

|
||||

|
||||
|
||||
Click the Enter key will jump to the SAML app login page, e.g.:
|
||||
in the new page, enter your email address ending with the company domain name, e.g.
|
||||
|
||||

|
||||
|
||||
Click the `Log In` button will jump to the SAML app login page, e.g.:
|
||||
|
||||

|
||||
|
||||
|
|
@ -167,7 +171,7 @@ If you use Microsoft ADFS to achieve single sign-on, please follow the steps bel
|
|||
|
||||
**Next**, download the base64 format certificate and upload it:
|
||||
|
||||
* Navigate to the _AD FS_ management window. In the left sidebar menu, navigate to **Services** > **Certificates**.
|
||||
* Navigate to the _AD FS_ management window. In the left sidebar menu, navigate to **Services** > **Certificates**.
|
||||
|
||||
* Locate the _Token-signing_ certificate. Right-click the certificate and select **View Certificate**.
|
||||
|
||||
|
|
@ -205,9 +209,9 @@ If you use Microsoft ADFS to achieve single sign-on, please follow the steps bel
|
|||
|
||||
* In the **Choose an access control policy** window, select **Permit everyone**, then click **Next**.
|
||||
|
||||
* Review your settings, then click **Next**.
|
||||
* Review your settings, then click **Next**.
|
||||
|
||||
* Click **Close**.
|
||||
* Click **Close**.
|
||||
|
||||
**Next**, create claims rules:
|
||||
|
||||
|
|
@ -217,13 +221,13 @@ If you use Microsoft ADFS to achieve single sign-on, please follow the steps bel
|
|||
|
||||
* On the **Issuance Transform Rules** tab click **Add Rules**.
|
||||
|
||||
* Click the **Claim rule template** dropdown menu and select **Send LDAP Attributes as Claims**, and then click **Next**.
|
||||
* Click the **Claim rule template** dropdown menu and select **Send LDAP Attributes as Claims**, and then click **Next**.
|
||||
|
||||
* In the **Claim rule name** field, type the display name for this rule, such as **Seafile Claim rule**. Click the **Attribute store** dropdown menu and select **Active Directory**. In the **LDAP Attribute** column, click the dropdown menu and select **User-Principal-Name**. In the **Outgoing Claim Type** column, click the dropdown menu and select **UPN**. And then click **Finish**.
|
||||
|
||||
* Click **Add Rule** again.
|
||||
* Click **Add Rule** again.
|
||||
|
||||
* Click the **Claim rule template** dropdown menu and select **Transform an Incoming Claim**, and then click **Next**.
|
||||
* Click the **Claim rule template** dropdown menu and select **Transform an Incoming Claim**, and then click **Next**.
|
||||
|
||||
* In the **Claim rule name** field, type the display name for this rule, such as **UPN to Name ID**. Click the **Incoming claim type** dropdown menu and select **UPN**(It must match the **Outgoing Claim Type** in rule `Seafile Claim rule`). Click the **Outgoing claim type** dropdown menu and select **Name ID**. Click the **Outgoing name ID format** dropdown menu and select **Email**. And then click **Finish**.
|
||||
|
||||
|
|
@ -231,4 +235,14 @@ If you use Microsoft ADFS to achieve single sign-on, please follow the steps bel
|
|||
|
||||
__Note__: When creating claims rule, you can also select other LDAP Attributes, such as E-Mail-Addresses, depending on your ADFS service.
|
||||
|
||||
**Finally**, open the browser and enter your custom login URL into the browser to perform a ADFS login test.
|
||||
**Next**, configure the logout page, e.g.:
|
||||
|
||||

|
||||
|
||||

|
||||
|
||||
The format of the logout URL is: `https://example.com/org/custom/{custom-part}/saml2/ls/`, e.g.:
|
||||
|
||||

|
||||
|
||||
**Finally**, open the browser and enter the Seafile login page, click `Single Sign-On`. In the new page, enter your email address ending with the company domain name, click the `Log In` button will jump to the ADFS login page.
|
||||
|
|
|
|||
|
After Width: | Height: | Size: 433 KiB |
|
After Width: | Height: | Size: 479 KiB |
|
After Width: | Height: | Size: 339 KiB |
|
After Width: | Height: | Size: 531 KiB |
|
Before Width: | Height: | Size: 339 KiB |
|
After Width: | Height: | Size: 646 KiB |
|
After Width: | Height: | Size: 683 KiB |
|
Before Width: | Height: | Size: 30 KiB |