mirror of
https://github.com/haiwen/seafile-admin-docs.git
synced 2025-12-26 02:32:50 +00:00
Deployed 5a747195 to 12.0 with MkDocs 1.6.1 and mike 2.1.3
This commit is contained in:
parent
34efcf4a9a
commit
db1317882d
|
|
@ -4805,7 +4805,7 @@ openssl<span class="w"> </span>req<span class="w"> </span>-x509<span class="w">
|
|||
<p><img alt="" src="../../images/auto-upload/417d-a48a-3e10c46b98f0.png" /></p>
|
||||
<p><strong>Next</strong>, download the base64 format SAML app's certificate and rename to idp.crt:</p>
|
||||
<p><img alt="" src="../../images/auto-upload/0a693563-d511-4c3c-ac30-82a26d10cfab.png" /></p>
|
||||
<p>and put it under the certs directory(<code>/opt/seafile/seahub-data/certs</code>).</p>
|
||||
<p>and put it under the certs directory(<code>/opt/seafile-data/seafile/seahub-data/certs</code>).</p>
|
||||
<p><strong>Next</strong>, copy the metadata URL of the SAML app:</p>
|
||||
<p><img alt="" src="../../images/auto-upload/1426318f-0a61-462d-a514-13768ca0b18c.png" /></p>
|
||||
<p>and paste it into the <code>SAML_REMOTE_METADATA_URL</code> option in seahub_settings.py, e.g.:</p>
|
||||
|
|
@ -4833,11 +4833,6 @@ openssl<span class="w"> </span>req<span class="w"> </span>-x509<span class="w">
|
|||
<p>View where the xmlsec1 binary is located:</p>
|
||||
<div class="highlight"><pre><span></span><code>$ which xmlsec1
|
||||
</code></pre></div>
|
||||
<ul>
|
||||
<li>If certificates are <strong>not placed in</strong> <code>/opt/seafile/seahub-data/certs</code>, you need to add the following configuration in seahub_settings.py:</li>
|
||||
</ul>
|
||||
<div class="highlight"><pre><span></span><code><span class="n">SAML_CERTS_DIR</span> <span class="o">=</span> <span class="s1">'/path/to/certs'</span>
|
||||
</code></pre></div>
|
||||
</div>
|
||||
<p><strong>Finally</strong>, open the browser and enter the Seafile login page, click <code>Single Sign-On</code>, and use the user assigned to SAML app to perform a SAML login test.</p>
|
||||
<h3 id="example-2-on-premise-adfs">Example 2: On-premise ADFS<a class="headerlink" href="#example-2-on-premise-adfs" title="Permanent link">¶</a></h3>
|
||||
|
|
@ -4964,9 +4959,8 @@ openssl<span class="w"> </span>req<span class="w"> </span>-x509<span class="w">
|
|||
<p><strong>Finally</strong>, open the browser and enter the Seafile login page, click <code>Single Sign-On</code> to perform ADFS login test.</p>
|
||||
<h3 id="example-3-keycloak-saml-20">Example 3: Keycloak SAML 2.0<a class="headerlink" href="#example-3-keycloak-saml-20" title="Permanent link">¶</a></h3>
|
||||
<p>In this part, we use Keycloak SAML single sign-on app to show how Seafile integrate SAML 2.0.</p>
|
||||
<p>We assume Seafile is deployed at <code>https://demo.seafile.top</code>.</p>
|
||||
<h4 id="keycloak-saml-single-sign-on-app">Keycloak SAML single sign-on app<a class="headerlink" href="#keycloak-saml-single-sign-on-app" title="Permanent link">¶</a></h4>
|
||||
<p>If you use Keycloak SAML app to achieve single sign-on, please follow the steps below:</p>
|
||||
<p>The test domain name here is exemplified by <code>https://demo.seafile.top</code>.</p>
|
||||
<p><strong>First</strong>, Create a new Client: </p>
|
||||
<ul>
|
||||
<li>
|
||||
|
|
|
|||
File diff suppressed because one or more lines are too long
Loading…
Reference in New Issue