/
Configure CAM SSO

Configure CAM SSO

Information to Provide Litera

Provide the following information to Litera when asked to do so:

  • Let Litera know you are enabling SSO before starting for both AzureAD and ADFS.

  • Adding the Certificate on Step 5 for ADFS configurations

  • Adding the Public URL on Step 6b for ADFS configurations

  • The App Federation Metadata URL on Step 10 for AzureAD/EntraID configurations

Litera Provided Information

The following information is provided by Litera when you reach out to Litera Support OR Litera DevOps to enable SSO (support@litera.com):

  • AWSĀ User Pool Domain Name before starting

  • AWSĀ Cognito User Pool URN before starting

  • Certificate for the Relaying Party Trust on Step 5 for ADFS configurations for ADFS configurations

  • Documentation confirming SSO is configured on Step 11 for AzureAD/EntraID configurations

Ā 

Configuring CAMĀ SSOĀ (Single Sign-On) via On-PremisesĀ Active Directory

CAM supports SSO viaĀ SAML 2.0Ā which is available onĀ ADFS version 2.0Ā and above. To enable SSO for your domain, CAMĀ acts as the Service Provider (SP). An AD FS Identity Provider (IdP) must be deployed and configured to handle the sign-in process and provide your system user's credentials to CAM. This topic describes how to set up the Single Sign-On Service (SSO) for CAMĀ as the Service Provider (SP) and AD FS as theĀ Identity Provider (IdP).

These steps are similar if you are implementing teams, or even if you are not implementing teams.

Prerequisites

  • Active Directory Domain Services (ADDS) andĀ Active Directory Federation Services (AD FS) must be installed on your server.

  • It is recommended that the firm creates a new domain group and adds a list of users from the firm who will access CAM, for example,Ā CAM Users. This will allow administrators to filter user groups when enabling synchronization with CAM.

  • The user configuring the ADĀ FS and SSO setup must have domain administrator permissions.

  • Ā Please call Litera Support to enable SSO for your domain before beginning. Contact Litera support at support@litera.com

Step 1: ConfigureĀ Federation Server

  1. In the deployed ADĀ FSĀ Server launch theĀ Active Directory Federation Services Configuration Wizard

  2. On theĀ WelcomeĀ page, choose an option for a Federation Server, and then clickĀ Next. Proceed through the wizard.

  3. On theĀ Specify Service PropertiesĀ page select:

  • SSL Certificate:Ā This should be pre-populated. If it isnā€™t, select your valid certificate from the drop-down menu. CAMĀ will redirect to this URLĀ for authentication.

  • Federation Service Name: Enter a fully qualified domain name (FQDN). It is recommended this matches the SSL certificate name.

Note:Ā By default, the ADFS Configuration Wizard retrieves the SSL certificate bound to CAM in IIS. If you use a wildcard certificate you will need to enter the Federation Service name.

  • Federation Service Display Name: Enter a friendly display name

4. Continue with the configuration and clickĀ CloseĀ on completion.

Step 2: Add Your AmazonĀ CognitoĀ User Pool IDĀ as Relying Party Trust in ADĀ FS

  1. In ADFS Management, select theĀ Relying Party TrustsĀ folder.

  2. ClickĀ Add Relying Party Trusts from theĀ ActionsĀ sidebar.

  3. In theĀ AddĀ Relying Party Trust Wizard,Ā WelcomeĀ page, chooseĀ Claims awareĀ and clickĀ Start.

  4. On theĀ Select Data SourceĀ screen, clickĀ Enter data about the relying party manuallyĀ and clickĀ Next.

  5. On theĀ Specify Display NameĀ screen, enter a Display Name and enter any optional notes.

  6. Skip the Configure Certificate screen. ClickĀ Next.

  7. On theĀ Configure URL screen, select the box labeledĀ Enable Support for the SAML 2.0 WebSSO protocol.

  8. In the field underĀ Enable Support, enter the Amazon Cognito User Pool domain name. The URL should look something like thisĀ https://<yourDomainPrefix>.auth.<region>.amazoncognito.com/saml2/idpresponse

  9. URNā€™s would look like:

The URn should look something like thisĀ urn:amazon:cognito:<region>

Note:Ā Litera will generate and provide the AWSĀ User Pool Domain Name for your account.

9. On theĀ Configure IdentifiersĀ screen, enter the providedĀ Amazon Cognito User Pool URNĀ as the relying party trust identifier. The URN should look something like thisĀ urn:amazon:cognito:sp:<yourUserPoolID>

10. On theĀ Choose Access Contol PolicyĀ screen, selectĀ Permit everyone and clickĀ Next.

11. On theĀ Ready to Add TrustĀ screen, review your settings. Click theĀ EndpointsĀ tab to view the auto-configured endpoint forĀ SAML 2.0 POST binding (also known as the assertion consumer endpoint/URL). Based on the details entered in Step 8, the Endpoint is auto-configured. The URL should look something like this:Ā https://<yourDomainPrefix>.auth.<region>.amazoncognito.com/saml2/idpresponse. ClickĀ Next.

12. On theĀ FinishĀ screen, check the box forĀ Open the Edit Claim Rules dialog for this relying party trust when the wizard closesĀ and clickĀ Close. This opens the claim rule editor.

Step 3: CreateĀ Claim Rules

When using SAML login with ADFS, other values can be passed in addition to the authentication values. These values are defined asĀ Claim RulesĀ in the Relying Party Trust. Once the relying party trust has been created, you can create the claim rules. after the completion ofĀ Step 2Ā listed above, the claim rule editor opens by default. If the claim editor does not open to edit the Claim Rules, select the Relying Party Trusts folder from the ADFS panel, right-click the added Relying Party Trust, and then clickĀ Edit Claim Issuance Policy.

Step 4: Create Rules to Map Attributes from Active Directory with ADFSĀ 

CAM requires you to set upĀ fourĀ attribute rules for user authorization. You can also add any other additional attributes that you want to be sent over as claims. The table below specifies the four mandatory attributes to be configured and the pre-defined Claim template to be used to create the claim rule.

Attribute

Claim Template to be used

Attribute

Claim Template to be used

Name ID

Transform an Incoming Claim

Email

SendĀ LDAP Attributes as Claims

First Name

Send LDAP Attributes as Claims

Last Name

Send LDAP Attributes as Claim

Ā 

  1. In theĀ Edit Claim Issuance PolicyĀ dialog, clickĀ Add Rule

2. In theĀ Choose Rule TypeĀ node, from theĀ Claim Rule TemplateĀ drop-down selectĀ Transform an Incoming Claim. ClickĀ Next

Ā 

3. In theĀ Configure Claim RuleĀ node, enter the following settings and clickĀ FinishĀ to create the claim rule.

  • In the field forĀ the Claim rule name type, typeĀ Name ID

  • From the drop-down forĀ the Incoming claim type, selectĀ Windows account name

  • From the drop-down forĀ the Outgoing claim type, selectĀ Name ID.

  • From the drop-down forĀ the Outgoing Name ID Format, must be selected asĀ Persistent Identifier.

  • Select the radio button toĀ Pass through all claim values.

  • Ā 

  1. In theĀ Edit Claim Issuance PolicyĀ dialog, clickĀ Add Rule

  2. In the Choose Rule Type node, selectĀ Send LDAP Attributes as Claims from theĀ Claim Rule TemplateĀ drop-down. ClickĀ Next.

  3. In theĀ Configure Claim RuleĀ node, enter or select the following settings and clickĀ FinishĀ to create the claim rule.

    1. In the field for Claim Rule Name, typeĀ E-mail.

    2. From the drop-down forĀ the Attribute store, selectĀ Active Directory.

    3. From theĀ LDAP AttributeĀ drop-down, selectĀ E-Mail-AddressesĀ and map it toĀ Outgoing Claim Type:Ā E-Mail Address.

  1. In theĀ Edit Claim Issuance PolicyĀ dialog, clickĀ Add Rule

  2. In the Choose Rule Type node, selectĀ Send LDAP Attributes as Claims from theĀ Claim Rule TemplateĀ drop-down. ClickĀ Next.

  3. In theĀ Configure Claim RuleĀ node, enter or select the following settings and clickĀ FinishĀ to create the claim rule.

    1. In the field forĀ the Claim Rule Name,Ā typeĀ First Name.

    2. From the drop-down for theĀ Attribute store, selectĀ Active Directory.

    3. From theĀ LDAP AttributeĀ drop-down, selectĀ Given NameĀ and map it toĀ Outgoing Claim TypeĀ Given Name.

  1. In theĀ Edit Claim Issuance PolicyĀ dialog, clickĀ Add Rule.

  2. In the Choose Rule Type node, selectĀ Send LDAP Attributes as Claims from theĀ Claim Rule TemplateĀ drop-down. ClickĀ Next.

  3. In theĀ Configure Claim RuleĀ node, enter or select the following settings and clickĀ FinishĀ to create the claim rule.

    1. In the field forĀ Claim Rule Name,Ā typeĀ Last Name.

    2. From the drop-down for theĀ Attribute store, selectĀ Active Directory.

    3. From theĀ LDAP AttributeĀ drop-down, selectĀ SurnameĀ and map it toĀ Outgoing Claim Type Surname.

Step 5: Import the signature into the new Relying Party Trust

1. From theĀ Relying Party TrustsĀ folder, select your new Relying Party Trust, and from the Actions side bar clickĀ Properties.

2. Go to theĀ SignatureĀ Tab and ClickĀ AddĀ to add a certificate.

3. Navigate to theĀ EndpointsĀ tab and you should see aĀ SAML Assertion ConsumerĀ Endpoint that you inserted in theĀ Configuration Wizard. ClickĀ Add SAMLĀ to add a second endpoint.

4. From theĀ Endpoint typeĀ drop-down, chooseĀ SAML Logout.

5. From theĀ Binding drop-down, chooseĀ Redirect.

6. In theĀ Trusted URLĀ field, add the following:Ā https://YOUR-DOMAIN/adfs/ls/?wa=wsignout1.0Ā -where YOUR-DOMAIN matches the correct URL that you have specified duringĀ ADFS setup.

7. In theĀ Response URLĀ field, type your CAM domain, i.e.:Ā https://subdomain.domain.topleveldomain

8. ClickĀ OKĀ on theĀ Add an EndpointĀ window as well as theĀ Relying Party TrustĀ window to save your changes.

Step 6: Verify the Configuration

Your SSO integration with CAM should now be enabled. All CAMĀ users within your firm will be provided with the following sign-in prompt:

Step 6b: Provide Litera the public URL

Step 7: EditĀ Access Control Policy for User Groups

Edit the Access Control Policy list to deny user group(s) access to CAM.

  1. In the ADFS console, right-click theĀ Relying Party TrustĀ that you want to permit/deny access to and selectĀ Edit Access Control Policy.

  2. On the Access control policy, select your policy and then clickĀ ApplyĀ andĀ Ok.

Ā 

SSO on Microsoft Entra (Azure AD) Instructions

Prerequisites

Set-up

Create and configure an Entra Enterprise Application
The client will have to configure one Enterprise Application to be able to SSO through TeamsApp and CAM.

  1. Open the Azure portal, and choose Azure Active Directory on the list of services

  2. In the Active Directory left pane, choose ā€œEnterprise Applicationsā€

  3. In the opened section click on ā€œCreate on your Own Applicationā€.

  4. Name your application

  5. After the application is created you need to Assign the application to Users and Groups, to do so click on ā€œAssign Users and Groupsā€

  6. After assigning your application to your users, you need to set up SSO. On the main pane of the application click on ā€œConfigure Single Sign Onā€.

  7. After clicking you will be asked to choose a single sign-on method. Choose SAML
    You will then be redirected to the Single sign-on page. There you will have to modify the following values.

Identifier (Entity ID)

The URn should look something like this:Ā urn:amazon:cognito:<region>

urn:amazon:cognito:ap-southeast-1_TTvx

Reply URL (Assertion Consumer Service URL)

Based on your production endpoint region, set the URL should look something like this:

https://camapac-com-abl.auth.ap-southeast-1.amazoncognito.com/saml2/idpresponse

Redirect Endpoint URI's

RedirectĀ Endpoint URI's are as follows:

Domain

Region

URI

Staging/Production URLs are used for CAM to connect Office 365. Select staging or production URIs based on the environment you are setting up.

Staging

EU (eu-west-1)

https://indfh04pbk.execute-api.eu-west-1.amazonaws.com/v1/cam/auth/redirect

Staging

US East

https://4cpwp6xw51.execute-api.us-east-1.amazonaws.com/v1/cam/auth/redirect

Production

UK (eu-west-2)

https://5cerfmm2b5.execute-api.eu-west-2.amazonaws.com/v1/cam/auth/redirect

Production

EU (eu-west-1)

https://y20ve77is6.execute-api.eu-west-1.amazonaws.com/v1/cam/auth/redirect

Production

US East

https://90uqmfzsbl.execute-api.us-east-1.amazonaws.com/v1/cam/auth/redirect

Production

US West

https://1aj9ofu8f8.execute-api.us-west-2.amazonaws.com/v1/cam/auth/redirect

Production

APAC (ap-southeast-1)

https://c9efufodx8.execute-api.ap-southeast-1.amazonaws.com/v1/cam/auth/redirect

Production

Australia (ap-southeast-2)

https://43b9imoxzb.execute-api.ap-southeast-2.amazonaws.com/v1/cam/auth/redirect

If you are using the CAM teams app, then Microsoft Office 365 URIs are required. It allows accessing documents that a user has access to in Teams or all shared documents like Teams/SharePoint/OneNote/OneDrive.

Microsoft Office 365

UK

https://camteamapp.prosperowaredev.co.uk/team/ukprod/web/auth-end.html

Microsoft Office 365

EU

https://camteamapp.prosperowaredev.eu/team/euprod/web/auth-end.html

Microsoft Office 365

US

https://camteamapp.prosperoware.io/team/usprod/web/auth-end.html

Microsoft Office 365

APAC

https://camteamapp.camapac.com/team/apacprod/web/auth-end.html

Ā 

  1. After configuring the SAML single sign-on click on Save.

  2. Under the single sign-on pane Step 3, SAML Signing certificate please copy the App Federation Metadata URL.

Ā 

  1. Once Litera DevOps gets the App Federation Metadata URL, you will be notified by email when SSO is configured for you.

A PDF Guide of this information is below:

File/ Description

Attachment

File/ Description

Attachment

Single Sign On AzureAD Guide- For the setup of Azure AD to SSO

Ā 

FAQs

Does SSO need to be enabled separately for the CAM teams app?

  • Yes, there is a separate client in cognito for the teams app.

Related content

Configure Data Uploader
Configure Data Uploader
Read with this
2FA for Okta
2FA for Okta
More like this
Issue Resolution
Issue Resolution
Read with this
Create CAM User Accounts
Create CAM User Accounts
More like this
Data Uploader FAQ
Data Uploader FAQ
Read with this
User Group and Account FAQ
User Group and Account FAQ
More like this

Let's ConnectšŸ“Œ

ā˜Ž +1 630.598.1100
ā˜Ž ā€Ŗ+44 20 3880 1550ā€¬
šŸ“§ support@litera.com
šŸ’» https://www.litera.com/support/

šŸ“ Support is available:
4 am - 8 pm US Eastern
(9 am - 1 am GMT/BST
7 pm - 11 am AET) on normal business days (excluding holidays)

Ā© 2024 Litera