Configure CAM SSO
- 1 Information to Provide Litera
- 2 Litera Provided Information
- 3 Configuring CAMĀ SSOĀ (Single Sign-On) via On-PremisesĀ Active Directory
- 3.1 Prerequisites
- 3.2 Step 1: ConfigureĀ Federation Server
- 3.3 Step 2: Add Your AmazonĀ CognitoĀ User Pool IDĀ as Relying Party Trust in ADĀ FS
- 3.4 Step 3: CreateĀ Claim Rules
- 3.5 Step 4: Create Rules to Map Attributes from Active Directory with ADFSĀ
- 3.6 Step 5: Import the signature into the new Relying Party Trust
- 3.7 Step 6: Verify the Configuration
- 3.8 Step 6b: Provide Litera the public URL
- 3.9 Step 7: EditĀ Access Control Policy for User Groups
- 4 SSO on Microsoft Entra (Azure AD) Instructions
- 4.1 Prerequisites
- 4.2 Set-up
- 5 FAQs
Information to Provide Litera
Provide the following information to Litera when asked to do so:
Let Litera know you are enabling SSO before starting for both AzureAD and ADFS.
Adding the Certificate on Step 5 for ADFS configurations
Adding the Public URL on Step 6b for ADFS configurations
The App Federation Metadata URL on Step 10 for AzureAD/EntraID configurations
Litera Provided Information
The following information is provided by Litera when you reach out to Litera Support OR Litera DevOps to enable SSO (support@litera.com):
AWSĀ User Pool Domain Name before starting
AWSĀ Cognito User Pool URN before starting
Certificate for the Relaying Party Trust on Step 5 for ADFS configurations for ADFS configurations
Documentation confirming SSO is configured on Step 11 for AzureAD/EntraID configurations
Ā
Configuring CAMĀ SSOĀ (Single Sign-On) via On-PremisesĀ Active Directory
CAM supports SSO viaĀ SAML 2.0Ā which is available onĀ ADFS version 2.0Ā and above. To enable SSO for your domain, CAMĀ acts as the Service Provider (SP). An AD FS Identity Provider (IdP) must be deployed and configured to handle the sign-in process and provide your system user's credentials to CAM. This topic describes how to set up the Single Sign-On Service (SSO) for CAMĀ as the Service Provider (SP) and AD FS as theĀ Identity Provider (IdP).
These steps are similar if you are implementing teams, or even if you are not implementing teams.
Prerequisites
Active Directory Domain Services (ADDS) andĀ Active Directory Federation Services (AD FS) must be installed on your server.
It is recommended that the firm creates a new domain group and adds a list of users from the firm who will access CAM, for example,Ā CAM Users. This will allow administrators to filter user groups when enabling synchronization with CAM.
The user configuring the ADĀ FS and SSO setup must have domain administrator permissions.
Ā Please call Litera Support to enable SSO for your domain before beginning. Contact Litera support at support@litera.com
Step 1: ConfigureĀ Federation Server
In the deployed ADĀ FSĀ Server launch theĀ Active Directory Federation Services Configuration Wizard
On theĀ WelcomeĀ page, choose an option for a Federation Server, and then clickĀ Next. Proceed through the wizard.
On theĀ Specify Service PropertiesĀ page select:
SSL Certificate:Ā This should be pre-populated. If it isnāt, select your valid certificate from the drop-down menu. CAMĀ will redirect to this URLĀ for authentication.
Federation Service Name: Enter a fully qualified domain name (FQDN). It is recommended this matches the SSL certificate name.
Note:Ā By default, the ADFS Configuration Wizard retrieves the SSL certificate bound to CAM in IIS. If you use a wildcard certificate you will need to enter the Federation Service name.
Federation Service Display Name: Enter a friendly display name
4. Continue with the configuration and clickĀ CloseĀ on completion.
Step 2: Add Your AmazonĀ CognitoĀ User Pool IDĀ as Relying Party Trust in ADĀ FS
In ADFS Management, select theĀ Relying Party TrustsĀ folder.
ClickĀ Add Relying Party Trusts from theĀ ActionsĀ sidebar.
In theĀ AddĀ Relying Party Trust Wizard,Ā WelcomeĀ page, chooseĀ Claims awareĀ and clickĀ Start.
On theĀ Select Data SourceĀ screen, clickĀ Enter data about the relying party manuallyĀ and clickĀ Next.
On theĀ Specify Display NameĀ screen, enter a Display Name and enter any optional notes.
Skip the Configure Certificate screen. ClickĀ Next.
On theĀ Configure URL screen, select the box labeledĀ Enable Support for the SAML 2.0 WebSSO protocol.
In the field underĀ Enable Support, enter the Amazon Cognito User Pool domain name. The URL should look something like thisĀ https://<yourDomainPrefix>.auth.<region>.amazoncognito.com/saml2/idpresponse
URNās would look like:
The URn should look something like thisĀ urn:amazon:cognito:<region>
Note:Ā Litera will generate and provide the AWSĀ User Pool Domain Name for your account.
9. On theĀ Configure IdentifiersĀ screen, enter the providedĀ Amazon Cognito User Pool URNĀ as the relying party trust identifier. The URN should look something like thisĀ urn:amazon:cognito:sp:<yourUserPoolID>
10. On theĀ Choose Access Contol PolicyĀ screen, selectĀ Permit everyone and clickĀ Next.
11. On theĀ Ready to Add TrustĀ screen, review your settings. Click theĀ EndpointsĀ tab to view the auto-configured endpoint forĀ SAML 2.0 POST binding (also known as the assertion consumer endpoint/URL). Based on the details entered in Step 8, the Endpoint is auto-configured. The URL should look something like this:Ā https://<yourDomainPrefix>.auth.<region>.amazoncognito.com/saml2/idpresponse. ClickĀ Next.
12. On theĀ FinishĀ screen, check the box forĀ Open the Edit Claim Rules dialog for this relying party trust when the wizard closesĀ and clickĀ Close. This opens the claim rule editor.
Step 3: CreateĀ Claim Rules
When using SAML login with ADFS, other values can be passed in addition to the authentication values. These values are defined asĀ Claim RulesĀ in the Relying Party Trust. Once the relying party trust has been created, you can create the claim rules. after the completion ofĀ Step 2Ā listed above, the claim rule editor opens by default. If the claim editor does not open to edit the Claim Rules, select the Relying Party Trusts folder from the ADFS panel, right-click the added Relying Party Trust, and then clickĀ Edit Claim Issuance Policy.
Step 4: Create Rules to Map Attributes from Active Directory with ADFSĀ
CAM requires you to set upĀ fourĀ attribute rules for user authorization. You can also add any other additional attributes that you want to be sent over as claims. The table below specifies the four mandatory attributes to be configured and the pre-defined Claim template to be used to create the claim rule.
Attribute | Claim Template to be used |
---|---|
Name ID | Transform an Incoming Claim |
SendĀ LDAP Attributes as Claims | |
First Name | Send LDAP Attributes as Claims |
Last Name | Send LDAP Attributes as Claim |
Ā
Step 5: Import the signature into the new Relying Party Trust
1. From theĀ Relying Party TrustsĀ folder, select your new Relying Party Trust, and from the Actions side bar clickĀ Properties.
2. Go to theĀ SignatureĀ Tab and ClickĀ AddĀ to add a certificate.
3. Navigate to theĀ EndpointsĀ tab and you should see aĀ SAML Assertion ConsumerĀ Endpoint that you inserted in theĀ Configuration Wizard. ClickĀ Add SAMLĀ to add a second endpoint.
4. From theĀ Endpoint typeĀ drop-down, chooseĀ SAML Logout.
5. From theĀ Binding drop-down, chooseĀ Redirect.
6. In theĀ Trusted URLĀ field, add the following:Ā https://YOUR-DOMAIN/adfs/ls/?wa=wsignout1.0Ā -where YOUR-DOMAIN matches the correct URL that you have specified duringĀ ADFS setup.
7. In theĀ Response URLĀ field, type your CAM domain, i.e.:Ā https://subdomain.domain.topleveldomain
8. ClickĀ OKĀ on theĀ Add an EndpointĀ window as well as theĀ Relying Party TrustĀ window to save your changes.
Step 6: Verify the Configuration
Your SSO integration with CAM should now be enabled. All CAMĀ users within your firm will be provided with the following sign-in prompt:
Step 6b: Provide Litera the public URL
Step 7: EditĀ Access Control Policy for User Groups
Edit the Access Control Policy list to deny user group(s) access to CAM.
In the ADFS console, right-click theĀ Relying Party TrustĀ that you want to permit/deny access to and selectĀ Edit Access Control Policy.
On the Access control policy, select your policy and then clickĀ ApplyĀ andĀ Ok.
Ā
SSO on Microsoft Entra (Azure AD) Instructions
Prerequisites
Set-up
Create and configure an Entra Enterprise Application
The client will have to configure one Enterprise Application to be able to SSO through TeamsApp and CAM.
Open the Azure portal, and choose Azure Active Directory on the list of services
In the Active Directory left pane, choose āEnterprise Applicationsā
In the opened section click on āCreate on your Own Applicationā.
Name your application
After the application is created you need to Assign the application to Users and Groups, to do so click on āAssign Users and Groupsā
After assigning your application to your users, you need to set up SSO. On the main pane of the application click on āConfigure Single Sign Onā.
After clicking you will be asked to choose a single sign-on method. Choose SAML
You will then be redirected to the Single sign-on page. There you will have to modify the following values.
Identifier (Entity ID)
The URn should look something like this:Ā urn:amazon:cognito:<region>
urn:amazon:cognito:ap-southeast-1_TTvx
Reply URL (Assertion Consumer Service URL)
Based on your production endpoint region, set the URL should look something like this:
https://camapac-com-abl.auth.ap-southeast-1.amazoncognito.com/saml2/idpresponse
Redirect Endpoint URI's
RedirectĀ Endpoint URI's are as follows:
Ā
After configuring the SAML single sign-on click on Save.
Under the single sign-on pane Step 3, SAML Signing certificate please copy the App Federation Metadata URL.
Ā
Once Litera DevOps gets the App Federation Metadata URL, you will be notified by email when SSO is configured for you.
A PDF Guide of this information is below:
File/ Description | Attachment |
---|---|
Single Sign On AzureAD Guide- For the setup of Azure AD to SSO | Ā |
FAQs
Does SSO need to be enabled separately for the CAM teams app?
Yes, there is a separate client in cognito for the teams app.
Related content
Let's Connectš
ā +1 630.598.1100
ā āŖ+44 20 3880 1550ā¬
š§ support@litera.com
š» https://www.litera.com/support/
š Support is available:
4 am - 8 pm US Eastern
(9 am - 1 am GMT/BST
7 pm - 11 am AET) on normal business days (excluding holidays)
Ā© 2024 Litera