Basic configuration
To configure Transact in a basic configuration with ADFS over SAML 2.0, follow the instructions in this topic.
Components
The following components require additional configuration to support ADFS over SAML 2.0.
- Server.xml
-
-
Configure connection port 8443.
-
Comment out connection port 8080
-
Restart the Transact service and verify the server operates on https.
-
- application-context.xml
-
In application-context.xml, uncomment the following line:
<import resource="classpath:/META-INF/applicationContext-security.xml"/>
- web.xml
-
-
Uncomment the springSecurityFilterChain filter and its filter mapping.
-
Comment out sessionTimeoutFilter and its filter mapping.
-
Comment out SessionTimeoutServlet and its servlet mapping.
-
Comment out all security-constraints.
-
Comment out login-config nodes.
-
Place the authentication filter and its filter mapping below springSecurityFilterChain.
-
Make the change in logout URL to point it to correct port and URL.
-
Select the appropriate value for the authenticationType bean:
-
1 for authentication only.
-
2 for authentication and authorization.
-
-
Restart the Transact service after making the change.
-
- Active Directory Federation Services
-
-
Test the ADFS Sign On Link:
https://<domainname>/adfs/ls/idpinitiatedsignon
-
Download Transact metadata file from the Transact server:
-
On the server, go to:
https:localhost:8443/dcma/saml/metadataurl
-
Copy the file to the ADFS server.
-
-
Configure ADFS as follows:
-
Select
. -
Import the Transact metaDataURL file.
-
Add Claim Rules.
-
Double-click on the relying party, select SHA-1.
and change security to -
Select
. -
Export all the certificates in DER format.
-
-
- applicationContext-security.xml
-
-
Go to https://<domainname>/FederationMetadata/2007-06/FederationMetadata.xml, get the ADFS metadata file, and save it to a secure folder.
-
Change the constructor arguments for epheSamFilter bean.
-
Make changes in metaDataFilter bean and metaData filter.
-
- samlKeystore.jks
-
Use the keytool import command to import the ADFS certificates into the samlKeystore.jks file.
- Tomcat-users.xml
-
If you have authenticationType set to 1, add the user name and roleName in the tomcat-users.xml file that is used to authorize the user.
Important links
-
Test ADFS login using the following link:
https://<domainname>/adfs/ls/idpinitiatedsignon
Change the domain name accordingly to FQDN.
-
Transact metadata URL:
https://localhost:8443/dcma/saml/metadata
-
Keytool importcert command:
keytool.exe -importcert -alias adfssigning -keystore C:\Ephesoft\Application\WEB-INF\classes\security\samlKeystore.jks -file <Location of ADFS Cert>
-
ADFS metadata XML file:
https://<<domainname>>/FederationMetadata/2007-06/FederationMetadata.xml
Change the domain name accordingly to FQDN.
-
You may have to modify the host file to resolve the ADFS DNS name.
Troubleshooting
-
Make sure the unique identity is same in Transact and ADFS.
-
ADFS Rule names can be extracted by doing the following:
-
Click Relying Party Trust.
-
Edit Claim Rules.
-
Click the rule that you wish to configure in epheSamFilter bean in applicationContext-security.xml file.
-
Click Edit Rule and view the rule language.
-
Get the rule language from the window open.
-
-
Make sure Signature Algorithm is set to SHA-1.
-
Make sure entityId and entityBaseURL is correctly configured in the metadataGeneratorFilter bean.
-
Make sure that end points in ADFS are correctly configured.
Sample PDF files
The following sample PDF files are available for reference.