Azure AD Example using SAML
This section describes how to integrate MFT Server Web SSO using SAML with Azure AD. This example provides step-by-step instructions on how to set up the application in Azure AD and in the MFT Server Manager interface. When complete, an MFT Server user will be able to log in to the MFT Server Web Client application using Azure AD. The images provided under the Azure AD Instructions are taken from the Azure AD application. Most images are snippets and not the complete page.
Azure (AD) Instructions
Integrating JSCAPE Web SSO (SAML) with Azure AD requires adding an application in Azure AD from its own app gallery. The application that will be added is called Azure AD SAML Toolkit
, which comes from Microsoft. The steps below will show how to add said application and configure it to work when signing into the MFT Web Client.
-
Log in to your Azure Portal and click on the
Azure Active Directory
icon. -
On the
Default Directory
screen, click on theEnterprise applications
item under theManage
section located on the left-hand side of the page. -
On the
Enterprise applications
screen, click onNew application
. -
On the
Browse Azure AD Gallery
screen, enterAzure AD SAML Toolkit
on the Search application field, then click on theAzure AD SAML Toolkit
application when it appears in the results list. -
Enter an appropriate name in the
Name
field (in this example, the name is ActiveMFT SSO SAML). Next, click on theCreate
button. It may take a few seconds for the application to be added. Wait until the next screen appears. -
Click on
Single sign-on
item under theManage
section found on the left-hand side . -
Click on the
SAML
option underSelect a single sign-on method
screen. -
On the
Set up Single Sign-On with SAML
screen, click on theEdit
button to the right of theBasic SAML Configuration
section. -
On the
Basic SAML Configuration
screen, replace "https://samltoolkit.azurewebsites.net" with "https://jscapehost/sso/jscapedomain/login" URL underIdentifier (Entity ID)
list. Replace "jscapehost" and "jscapedomain" accordingly to what is appropriate for your ActiveMFT environment. Enter the same URL into theReply URL (Assertion Consumer Service URL)
andSign on URL
fields. Click theSave
button. -
It may be necessary to manually close the
Basic SAML Configuration
screen if it does not automatically close after clicking on theSave
button. Click on theX
button to do this. -
If you get a message that states:
The default reply URL is missing from the list of reply URLs. Click here to fix it
- as shown below - then click on that message. -
Once you are back on the
Set up Single Sign-On with SAML
screen, click on theEdit
button to the right of theUser Attributes & Claims
heading. -
On the
User Attributes & Claims
screen, click on the value beside theUnique User Identifier (Name ID)
claim name. The default value isuser.userprincipalname [nameid-format:emailAddress
] and it will becomeuser.mail [nameid-format:persistent]
after making changes on the next screen. -
On the
Manage claim
screen, change theName identifier format
dropdown field fromEmail address
toPersistent
and change theSource attribute
dropdown field fromuser.userprincipalname
touser.mail
then click on theSave
button. -
Click on the
SAML-based Sign-on
link once you are back on theUser Attributes & Claims
screen. -
On the
SAML-based Sign-on
screen, click on theDownload
link besideCertificate (Raw)
field under theSAML Signing Certificate
section. The resulting certificate file will be used in the succeedingJSCAPE Configuration
section of this article. -
Click on the
Copy to clipboard
icon to the left of theLogin URL
field, located under theSet up <NAME>
section. NAME will be whatever you entered in step 5. TheLogin URL
will be used in theJSCAPE Instructions
section located below. -
The final step requires that you add users and/or groups to the application. Click on the
Users and groups
item under theManage
section, then click on theAdd user/group
button. Proceed to add users/groups.
JSCAPE Instructions
-
Launch the MFT Server Administrative UI. Navigation to the
Keys > Host Keys
module, then click on theImport
button and selectImport File
. -
On the
Import Public Key
dialog, enter an appropriate alias in theKey alias
field. It could be anything. Click on theChoose File
button and find the certificate file you downloaded in step 16, then click on theOK
button. -
Open the appropriate domain and go to
ACCOUNTS > Authentication > Web SSO
page. ChooseSAML
from theService type
dropdown list. -
Under the
IDENTITY PROVIDER
section, theSign-in URL
should be set to theLogin URL
copied from step 17. TheSign-out URL
should be set to "https://login.microsoftonline.com/common/wsfederation?wa=wsignout1.0". TheVerification certificate
dropdown list should be set to the certificate imported in step 2. TheName ID format
dropdown list should be set topersistent
. The rest of the fields can be left to their default values. Click on theApply
button.
Test SSO login by accessing the URL: https://jscapehost/sso/jscapedomain/login
Replace "jscapehost" and "jscapedomain" accordingly.