Configuring SAML SSO for KiteWorks
These steps will guide you through setting up the single sign-on functionality between ADSelfService Plus and KiteWorks.
Prerequisite
-
Login to ADSelfService Plus as an administrator.
- Navigate to Configuration → Self-Service → Password Sync/Single Sign On → Add Application, and select KiteWorks from the applications displayed.
Note: You can also find KiteWorks application that you need from the search bar located in the left pane or the alphabet wise navigation option in the right pane.
-
Click IdP details in the top-right corner of the screen.
-
In the pop-up that appears, copy the Entity ID, Login URL, Logout URL and download the SSO certificate by clicking on the Download Certificate.
KiteWorks (Service Provider) configuration steps
-
Log in to KiteWorks using your administrator credentials. (https://<subdomain>.KiteWorks.com)
-
In the toppanel, click Applications.
-
Navigate to Authentication → Authorization → SSO Setup
- Under SAML paste the URL, copied in step 4 of Prerequisite, in the Entity ID, SSO Service URL and SLO Service URL.
-
Open the downloaded certificate as a text file. Copy and paste the content it in the RSA Certificate text field.
-
You can save the configuration.
ADSelfService Plus (Identity Provider) configuration steps
-
Now, switch to ADSelfService Plus’ KiteWorks configuration page.
-
Enter the Application Name and Description.
-
In the Assign Policies field, select the policies for which SSO need to be enabled.
Note:ADSelfService Plus allows you to create OU and group-based policies for your AD domains. To create a policy, go to Configuration → Self-Service → Policy Configuration → Add New Policy.
-
Select Enable Single Sign-On.
-
Enter the Domain Name of your KiteWorks account. For example, if you use johndoe@thinktodaytech.com to log in to KiteWorks, then thinktodaytech.com is the domain name.
-
Enter the SP Identifier of your KiteWorks account in the SP Identifier field. (https:// <SP_Identifier>.kiteworks.com)
- In the Name ID Format field, choose the format for the user login attribute value specific to the application.
Note: Use Unspecified as the default option if you are unsure about the format of the login attribute value used by the application
-
Click Add Application
Note:
For KiteWorks, single sign-on is supported for SP and IDP initiated flow.
Don't see what you're looking for?
-
Visit our community
Post your questions in the forum.
-
Request additional resources
Send us your requirements.
-
Need implementation assistance?
Try onboarding