SSO with Azure ADFS

This procedure configures and enables SSO in Transact when using Active Directory Federation Service (ADFS) in Azure.

Before performing this procedure, create custom users and groups in Azure Active Directory (AD) that are used with your SSO configuration.

Follow these general steps:

  1. Create SAML SSO in Azure AD.
  2. Assign users to the SSO configuration.
  3. Set up SSO in Azure.
  4. Configure SSO in Transact.

Create SAML SSO in Azure AD

Follow these steps to add SAML SSO in Azure AD.

  1. In Azure, go to the Azure Active Directory console.
  2. In the left panel, click Enterprise applications.
  3. Click New application.
  4. Click Create your own application.
  5. Enter a name for your application. Keep the remaining default selections.
  6. Click Create.

Assign users to the SSO configuration

The next part of the procedure is to assign users or groups to the SSO configuration.

You should already have created users and groups in Azure AD. If you do not have any users or groups, create them now before proceeding.
  1. Under Getting Started, click Assign Users and Groups.
  2. Click Add user.
  3. Select the users and groups you want to assign to this SSO configuration.

    These users will be able to authenticate Transact using SSO.

  4. Click Select.
  5. Click Assign.
  6. Go to the Groups view list and find the assigned groups.
  7. Note the Object Id for these groups. You will need the Object Id to configure groups in Transact.

Set up SSO in Azure

Finish setting up single-sign on in Azure.

  1. In the left panel, click Single sign-on.
  2. Click SAML.
  3. Click Upload metadata file.
  4. Upload the Transact Spring-Framework_metadata.xml file.

    Use the following URL format to get the file: https://<URL>:<PORT>/dcma/saml/metadata

  5. Edit the Basic SAML Configuration.
  6. Add the SAML/SSO endpoint to the configuration in Azure.

    For example: https://<ServerURL>/dcma/saml/SSO

  7. Enter the appropriate URL for the Sign on URL and Logout URL fields.
  8. Click Save.
  9. Edit the User Attributes & Claims.
  10. To define your user base, we recommend using the default emailaddress or surname claims URL path.
  11. Click Add a group claim.
  12. Select Customize the name of the group claim and Emit groups as role claims.
  13. Click Save.
  14. Take note of the new role claims URL.

    For example: http://schemas.microsoft.com/ws/2008/06/identity/claims/role

  15. Download the newly generated signing Certificate (Raw) and Federation Metadata XML.

Configure SSO in Transact

To configure SSO in Transact, specify the Azure AD group Object IDs in your SSO configuration.

Perform these changes in the following places:

You can download the sample files as a reference when adjusting the settings according to your Azure AD configuration.

Before proceeding, ensure all SSL certificates are signed and valid certificates.

web.xml

Modify this file to configure the admin and operator groups as follows.

  1. Open the web.xml file, located at <Transact_Folder>\Application\WEB-INF.
  2. Set isMultipleGroupsAllowed to TRUE.
  3. Set the AdminGroups and OperatorGroups to the object IDs as shown in Assign users to the SSO configuration on step 7.
  4. Set the groupNameDelimiter to a semicolon (;).
    Make sure the appropriate filters are commented out, including the <security-constraint> filters. Refer to the sample files.

application.properties

Modify this file to configure the Super Admin group as follows.

  1. Open the application.properties file, located at <Transact_Folder>\Application\WEB-INF\classes\META-INF.
  2. Set the user.super_admin and user.ephesoft_super_admin_role to the object IDs as shown in Assign users to the SSO configuration on step 7.
  3. Set the update_super_admin_group to true.

applicationContext-security.xml

Modify this file as follows.

  1. Open the applicationContext-security.xml file, located at [Ephesoft_Directory]\Application\WEB-INF\classes\META-INF.
  2. Locate the epheSamlFilter bean.
  3. In the epheSamlFilter bean, set the second constructor-arg entry to "true" as shown.
    <constructor-arg index="2" value="true"/>

Database tables

Map the groups created in Azure to your database as follows.

  1. Log in to your database.
  2. Download the sample SQL files.
  3. Update the sample SQL files with the object IDs as shown in Assign users to the SSO configuration on step 7. This will add the groups to the following tables:
    • resource_authorizer

    • security_groups

Access Manager

Complete the setup by configuring Access Manager as follows.

  1. Log in to Transact.
  2. Go to System Configuration > Access Manager.
  3. Adjust all other group permissions in the Access Manager as super admin.
  4. Restart Transact.