Citrix Content Collaboration single sign-on configuration guide for ADFS 3 编辑
Citrix Content Collaboration single sign-on configuration guide for ADFS 3
Prerequisites to installation
To set up Citrix Content Collaboration to authenticate with Active Directory Federated Services, you need the following:
- Windows Server 2012 R2
- A publicly signed SSL Certificate from a CA. Self-signed and unsigned certificates are not accepted.
- An FQDN for your ADFS server
- Access to an administrator account within Citrix Content Collaboration with the ability to configure single sign-on.
Note:
To provision users from your Active Directory to Citrix Content Collaboration, reference the User Management Tool installation guide.
ADFS 3.0 (Role-based install)
You cannot download Microsoft Active Directory Federated Services 3.0 separately. You must use a Windows 2012 R2 server for this version.
Install the Role-based or featured based installation. Click Next.
Select the server for the install and click Next. Then select Active Directory Federation Services. Click Next.
Click Next through the Server Roles, AD FS and then to the Confirmation screen. Check the box for Restart, say Yes to the next screen, and click Install.
Once ADFS is installed, you must complete a post deployment activity if this is the first AD FS server in Active Directory. Use your own configuration information for this step.
Setting up ADFS 3.0
- In the ADFS 3.0 management console, start the Configuration Wizard.
When the wizard starts, select Create a new Federation Service and click Next.
Since we use a Wildcard Certificate, we must determine a Federation Service Name. If you are not using a wildcard SSL cert, you might not have to do this step. Then click Next to continue.
Click Next to configure.
Confirm that all the configurations were finished without error and click Close and exit the wizard.
Expand the Service node in the Management Console. Select the Token Signing certificate and click View Certificate in the right-hand column.
In the Certificate window, select the Details tab and then click Copy to File.
Click Next to continue.
Select Base-64 encoded X.509 (.CER) as the export format for the certificate, then click Next.
Save the certificate file and click Next.
Click Finish to save the file.
Browse to the folder where you exported the certificate and open it with Notepad.
Select all the text inside the Notepad and copy.
- Open Internet Explorer and go to your Citrix Content Collaboration account (
https://<yoursubdomain>.sharefile.com
). Sign in with your administrator account. Navigate to Admin Settings > Security > Login & Security Policy. Find Single sign-on / SAML 2.0 Configuration.- Switch Enable SAML setting to Yes.
- ShareFile Issuer / Entity ID:
https://<subdomain>.sharefile.com/saml/info
- Your IDP Issuer / Entity ID:
https://<adfs>.yourdomain.com
- X.509 Certificate: Paste the contents of exported certificate from previous section
- Login URL:
https://<adfs>.yourdomain.com/adfs/ls
- In Optional Settings, change the following values.
- Enable Web Authentication: Yes (Check marked)
- SP-Initiated Auth Context: User Name and Password – Minimum
Minimize Internet Explorer and return to the ADFS Management Console. Expand the Trust Relationships node and select Relying Party Trusts. Then click Add Relying Party Trust… from the right-hand side of the console. This launches the Add Relying Trust Wizard.
Click Start to begin specifying a Relying Party Trust.
Retrieving the metadata from the SAML site can configure the trust automatically for you. Use
https://<yoursubdomain>.sharefile.com/saml/metadata
as the federation metadata address (host name or URL). Click Next.Specify a Display Name. Typically you keep this as
<yoursubdomain>.sharefile.com
, so you can identify the different trusts from each other.Permit all users to access this relying party. Click Next.
Verify that the information is correct and click Next.
Verify that the check box for Open the Edit Claim Rules dialog for this relying party trust when the wizard closes is checked. Then click Close.
On the Issuance Transform Rules tab, click Add Rule.
The first rule is to Send LDAP Attributes as Claims.
Users in the Citrix Content Collaboration platform are identified by their email address. We send the claim as a UPN. Give a descriptive Claim rule name, such as E-mail Address to E-mail Address. Select Active Directory as the attribute store. Finally, select E-Mail Address as the LDAP attribute and E-mail Address as the Outgoing Claim Type. Click Finish.
Create a second rule. This rule is used to Transform an Incoming Claim. Click Next.
The incoming claim type transforms the incoming email address to an outgoing Name ID claim type in the email format. Give a descriptive name, such as Named ID to E-Mail Address. The Incoming claim type is Email Address, the Outgoing claim type Name ID. The Outgoing name format is Email. Click Finish.
Verify that the claims are correct, then click OK.
Switch to any web browser and navigate to
https://<yoursubdomain>.sharefile.com/saml/login
. You are redirected to your ADFS services. If your sign-in email is linked to a user on AD, then you are able to authenticate with your AD credentials.
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。
绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论