SSO Settings
If the SSO Settings option is enabled, users can automatically log in to ADSelfService Plus by simply logging in to their Windows machine or through a third-party identity provider.
ADSelfService Plus supports single sign-on (SSO) with two types of authentication:
- NTLM Authentication
- SAML Authentication
Note: SSO to ADSelfService Plus is not supported for logins from mobile apps or mobile browsers.
1. NTLM Authentication
In this method of authentcation, users log in to the ADSelfService Plus web console using the credentials they used to log in to the machine. To enable NTLM authentication, follow the steps below.
Important: ADSelfService Plus' access URL must be associated with the local intranet sites for automatic logon.
Prerequisites:
- Navigate to Admin > Customize > Logon Settings > Single sign-On.
- Check the Enable SSO box to enable SSO in ADSelfService Plus.
- Jespa deployment
- Download the latest Jespa JAR file.
- Unzip the downloaded file and paste the Jespa JAR file (filename jespa-2.0.0.jar) to the <ADSelfServicePlus_install_directory > /lib folder; where <ADSelfServicePlus_install_directory> is the location in which ADSelfService Plus is installed.
- Restart ADSelfService Plus for the changes to take effect.
- Ensure a computer account has been configured in the ADSelfService Plus admin portal for NTLM SSO.
Note:
- Customers who are on build 6210 or lower can continue using the feature without having to perform the first prerequisite.
- The default package has a Jespa (third-party) limitation which supports unlimited users for 60 days and only 25 users after. If you want to continue using Jespa for NTLM authentication for unlimited users beyond 60 days, you will need to purchase it from IOPLEX.
Please contact support@adselfserviceplus.com if you need any help configuring NTLM authentication for your users.
Configuration steps:
- Navigate to Admin → Customize → Logon Settings → Single sign-On.
- Click the Enable SSO checkbox to enable SSO in ADSelfService Plus.
- Select NTLM Authentication.
- To use the NTLM authentication service, a computer account not associated with a physical computer in your network has to be created in AD with a specific password that meets the password policy in AD. This is required, as only a computer account can validate the NTLM credentials (domain name, username, and one-way hash of the password obtained during machine login) of a user.
- Click Configure Now to provide the details of the computer account. NTLM authentication is domain-based, so this type of authentication can be enabled for a select set of domains of your choice.
- If you already have such a computer account, type the Computer Name and it's Password in the fields provided. You can also create a new computer account by providing the required details and clicking the Create this computer account in the domain checkbox. Enable or disable the computer accounts by clicking the enable/disable button.
- Click Save.
- If you've installed ADSelfService Plus on a machine that does not belong to the domain you've chosen, click the Advanced button and specify the DNS Server and DNS Site of the domain.
A. Finding the IP address of the DNS servers
- From a machine that belongs to the domain you've selected, open the command prompt, type “ipconfig /all”, and press enter.
- Enter the IP address displayed under the DNS Servers in the respective field in ADSelfService Plus.
B. Finding the DNS site
- Navigate to Active Directory Sites and Services.
- Enter the DNS Site containing the domain controller of the selected domain in the respective field in ADSelfService Plus.
C. Adding sites to the local intranet zone
There are two ways to apply the required configuration:
Method 1: Using a group policy (supported on Google Chrome and Internet Explorer)
- Create a new Group Policy Object and navigate to User Configuration → Administrative Templates → Windows Components → Internet Explorer → Internet Control Panel → Security Page → Sites to Zones Assignment list. Select Enable.
- Click Show to display the zone assignments. Enter the access URL in Value name and relate it to the trusted sites by entering "1" in Value, then click OK.
- Navigate to User Configurations → Administrative Templates → All Settings → Logon options. Select Enable.
- From the Logon options list, click Automatic logon only in Intranet zone, then OK.
Method 2: Manual configuration
1.Google Chrome:
- Navigate to Settings → Advanced drop-down → System module → Open proxy settings.
- Click the Security tab and select the Local intranet icon.
- Click the Sites button, enter the access URL of ADSelfService Plus in the required field, and click Add.
2.Internet Explorer:
- Navigate to Tools → Internet Options → Security.
- Click the Security tab and select the Local intranet icon.
- Click the Sites button, enter the access URL of ADSelfService Plus in the required field, and click Add.
3.Mozilla Firefox:
- Type "about:config" in the address bar and hit the enter key to display the list of preferences. If there's a warning message displayed, click I accept the risk to proceed.
- Navigate to the network.automatic-ntlm-auth.trusted-urls preference.
- Double-click the preference and enter the access URL of ADSelfService Plus (e.g. selfservice-5994:8888).
- Click OK.
2. SAML Authentication
In this method of authentication, users log in to the ADSelfService Plus web console using the credentials of a SAML-based identity provider.
After enabling the SAML-based SSO option, every time a user attempts to access ADSelfService Plus' web console, the IdP receives the authentication request. IdP authenticates the user, and after successful authentication, the user will be automatically logged in to the ADSelfService Plus portal. If the user is already logged in to the identity provider, when that user tries to access ADSelfService Plus, they will be granted access automatically.
Prerequisites:
- Log in to ADSelfService Plus web console as an administrator. Navigate to Admin → Customize → Logon settings → Single sign-On. Click the Enable SSO checkbox and the SAML Authentication button. Copy the ACS URL/Recipient URL and the Relay State URL.
- The SAML-based identity provider that you intend to use must have ADSelfService Plus as one of its supported SAML applications. If it is not supported by default, you can add ADSelfService Plus as a new application in the identity providers supported out-of-the-box (Okta, OneLogin, ADFS) or custom identity provider (e.g, Azure AD). Find the steps to add a new application in the Okta, OneLogin, ADFS, Line Works, and Azure AD by clicking on the respective links. For other identity providers, contact their support team for further assistance.
-
Log in to your identity provider with admin credentials, and navigate to ADSelfService Plus from the list of applications provided. Either download the Metadata in XML format, or get the required data by copying the Issuer URL/Entity ID, IdP Login URL, IdP Logout URL, and X509-certificate. You'll need this information while configuring ADSelfService Plus for logon SSO.
Service Provider Configuration (ADSelfService Plus)
- Navigate to Admin → Customize → Logon settings → Single sign-On.
- Check the Enable SSO checkbox to enable SSO in ADSelfService Plus.
- Click the SAML Authentication button to enable SAML configuration in your domain.
- Select the identity provider of your choice in the Select IdP drop-down. If you have selected Custom SAML from the drop-down, you must type in the IdP name and upload IdP logo in the respective fields.
- There are two SAML Configuration Modes: Upload Metadata File and Manual Configuration.
- Select Upload Metadata File if you have downloaded the IdP metadata file from the identity provider.
- Click Browse to upload the IdP metadata file.
- Select Manual Configuration to manually configure the URLs and certificates.
- Enter the Issuer URL/Entity ID URL obtained from the identity provider in the respective field (Refer to step 3 of Prerequisites).
- In the IdP Login URL, enter the Login URL obtained from the identity provider (Refer to step 3 of Prerequisites).
- In the space provided for X.509-Certificate, enter the public certificate key fetched from the identity provider (Refer to step 3 of Prerequisites).
Important: By default, ADSelfService Plus utilizes the same SAML authentication configuration for SSO during login and multi-factor authentication (MFA) during password self-service. This means that the SAML configurations you complete for logon SSO settings will automatically be used for MFA if the latter is enabled.
- If you want to use a custom SAML IdP, select Custom SAML from the Select IdP drop-down menu, and enter a name in the IdP Name field. You can also attach the IdP's logo in the IdP Logo field.
- Click Advanced Settings to configure the SAML request and response that are processed.
- Select whether the SAML Request sent to the IdP will be signed or unsigned from the SAML Request drop-down menu.
- Select the Authentication Context Class sent in the SAML request from the Authentication Context Class drop-down menu.
- Select the SAML Response and Assertion Signature from the respective drop-down menus to determine whether the messages received from the IdP are signed or not.
- Select the Signature Algorithm that the IdP uses to sign the SAML response/assertion from the Signature Algorithm drop-down menu.
- Select Encrypted or Unencrypted from the Assertion Encryption drop-down menu.
Note: Please check with your IdP if encrypted assertion is supported.
- If the SAML assertion is encrypted, select either Self-Signed or CA-Signed from the Encryption Certificate drop-down options provided.
- If the encryption certificate is CA-Signed, upload the CA Public Key and CA Private Key as given by the certificate authority (CA).
- If the encryption certificate is Self-Signed, then you can download the self-signed certificate by clicking Download Self Signed Certificate. You will need this for configuring SAML authentication in the IdP.
Note: You can choose which encryption certificate you want to use based on your organization's requirements. However, choosing a CA-signed encryption certificate is a recommended practice.
- Select either Enable or Disable from the Single Logout drop-down menu. When the Single Logout option is configured and a user logs out of ADSelfService Plus, the user is automatically logged out from the IdP and vice versa.
- Click Save.
- A summary of the IdP and service provider configurations are displayed below.
- To regenerate the SAML signing and self-signed encryption certificates, click Regenerate corresponding to the respective Signing Certificate and Encryption Certificate fields. The certificates expire by default after a period of one year.
Note: Refer to the
complete list of SAML authentication error codes and their descriptions.
Don't see what you're looking for?
-
Visit our community
Post your questions in the forum.
-
Request additional resources
Send us your requirements.
-
Need implementation assistance?
Try onboarding