SSO/Office365: Difference between revisions

From UmsWiki
Jump to navigation Jump to search
Kia (talk | contribs)
No edit summary
Kia (talk | contribs)
No edit summary
Line 14: Line 14:
*Click '''Single sign-on'''
*Click '''Single sign-on'''
*Click '''SAML'''
*Click '''SAML'''
*Click edit under '''Basic SAML Configuration'''
**Click edit under '''Basic SAML Configuration'''
**Enter this in '''Identifier (Entity ID)'''
***Enter this in '''Identifier (Entity ID)'''
***Enter the URL '''<nowiki>https://{URL}/{CustomerID}</nowiki>''' replace {CustomerID} with you number. This can be found in the configurator program under license info
****Enter the URL '''<nowiki>https://{URL}/{CustomerID}</nowiki>''' replace {CustomerID} with you number. This can be found in the configurator program under license info
***Delete other URL's
****Delete other URL's
**Enter this in '''Reply URL (Assertion Consumer Service URL)'''
***Enter this in '''Reply URL (Assertion Consumer Service URL)'''
***'''<nowiki>https://{URL}/SSO/AssertionConsumerServiceAzureAd.aspx</nowiki>'''
****'''<nowiki>https://{URL}/SSO/AssertionConsumerServiceAzureAd.aspx</nowiki>'''
**
**Under '''SAML Signing Certificate'''
***Click download for '''Certificate (Base64)'''
***This file must be placed in the root directory of your UMS Academic installation (Normally C:\inetpub\wwwroot)
*Open SQL Management Studio on the UMS Server and connect to the database
*Open SQL Management Studio on the UMS Server and connect to the database
**Run this SQL Command
**Run this SQL Command

Revision as of 10:40, 20 May 2021

How to use Office 365 as login provider instead of Active Directory

You need to create an Enterprise application

Login into portal.azure.com

  • Click New application
  • Click Create your own application
  • Enter a name
  • Choose Integrate any other application you don't find in the gallery (Non-gallery)
  • Click Create (This will also create an App registration)
  • Find Properties for the Enterprise application you just created
  • Set User assignment required? and Visible to users? to false
  • Click Save
  • Click Single sign-on
  • Click SAML
    • Click edit under Basic SAML Configuration
      • Enter this in Identifier (Entity ID)
        • Enter the URL https://{URL}/{CustomerID} replace {CustomerID} with you number. This can be found in the configurator program under license info
        • Delete other URL's
      • Enter this in Reply URL (Assertion Consumer Service URL)
        • https://{URL}/SSO/AssertionConsumerServiceAzureAd.aspx
    • Under SAML Signing Certificate
      • Click download for Certificate (Base64)
      • This file must be placed in the root directory of your UMS Academic installation (Normally C:\inetpub\wwwroot)
  • Open SQL Management Studio on the UMS Server and connect to the database
    • Run this SQL Command
      • Update UMSWebGeneralSettings Set SetSSO = 1
  • Login to UMS web
    • You will be redirected to SSO setup
      • Click Add, enter a name and click Create
      • Choose the name in the drop down and click Edit
      • Click Add under the section Create new Single Sign On
        • Choose Azure AD in the Type drop down
        • In the boxes Name, SingleSignOnServiceUrl and SingleLogoutServiceUrl replace {appId} with the application id of your Enterprise application
        • The LocalCertificateFile must be entered with a PFX certificate. This file must be placed in the root directory of your UMS Academic installation (Normally C:\inetpub\wwwroot)
        • The LocalCertificatePassword must be entered to be able to read the PFX certificate
        • The PartnerCertificateFile is a certificate the is generated during setup in portal. This file must be placed in the root directory of your UMS Academic installation (Normally C:\inetpub\wwwroot)
  • Open UMS Configurator program
    • Click Web Setup
    • Select General settings
      • Select Azure AD in the Check login against drop down list
  • Open SQL Management Studio on the UMS Server and connect to the database
    • Run this SQL Command
      • Update UMSWebGeneralSettings Set SetSSO = 0
  • Restart IIS


Reset password for others

  • Go to Azure Active Directory
  • Click Roles and administrators
  • Find Password administrator
  • Click Add assignments
  • Find the name of the Enterprise application you created earlier
  • Select it and click Add