Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
blocks:sso:adfs [2019-04-08 08:45] max |
blocks:sso:adfs [2024-08-20 09:11] (current) melvin Update for Windows Server 2022 |
||
---|---|---|---|
Line 3: | Line 3: | ||
===Prerequisites=== | ===Prerequisites=== | ||
- | To be able to follow the steps below you'll need to have Windows Server 2016 or later with the " | + | To be able to follow the steps below you'll need to have Windows Server 2016 or later with the " |
- | ===Add | + | ===Add |
- Open the "AD FS Management" | - Open the "AD FS Management" | ||
Line 17: | Line 17: | ||
- Paste and add the **Client Identifier** (from step 6) as the " | - Paste and add the **Client Identifier** (from step 6) as the " | ||
- Select the access control policy you'd like to use and click next. | - Select the access control policy you'd like to use and click next. | ||
- | - Make sure the box next to " | + | - Make sure the boxes next to " |
- Finish the wizard. | - Finish the wizard. | ||
Line 34: | Line 34: | ||
====Blocks specific steps==== | ====Blocks specific steps==== | ||
- | - Open your Blocks configuration file on your Blocks server and add the " | + | - Open your Blocks configuration file on your Blocks server and add the " |
* < | * < | ||
server: | server: | ||
+ | type: pixilab_server | ||
auth: | auth: | ||
urlResolver: | urlResolver: | ||
ajaxRequestResolver: | ajaxRequestResolver: | ||
- | callbackUrl: | + | callbackUrl: |
- | rolesOwner: | + | rolesOwner: |
- | rolesPath: | + | rolesPath: roles |
clients: | clients: | ||
- org.pac4j.oidc.client.OidcClient: | - org.pac4j.oidc.client.OidcClient: | ||
configuration: | configuration: | ||
- | discoveryURI: | + | discoveryURI: |
clientId: [CLIENT-ID] | clientId: [CLIENT-ID] | ||
secret: [CLIENT-SECRET] | secret: [CLIENT-SECRET] | ||
Line 54: | Line 55: | ||
security: | security: | ||
- matchers: internalMatcher | - matchers: internalMatcher | ||
- | | + | |
- | authorizers: | + | authorizers: |
</ | </ | ||
- Start Blocks and go to "/ | - Start Blocks and go to "/ | ||
+ | |||
+ | :!: Make sure you maintain all indentation as shown above, using only spaces for indentation. Here's more about [[blocks: | ||
===Role Mapping=== | ===Role Mapping=== | ||
- | Since the groups you've configured for your users in your windows server does not match the roles used by Blocks, you must add role mappings to the Blocks configuration file. You do this by defining a server.auth.rolesMapping parameter where the keys are the group names of your windows server configuration and the values the roles Blocks know about. For example: | + | Since the groups you've configured for your users in your windows server does not match the roles used by Blocks, you have to add role mappings to the Blocks configuration file. Do this by defining a server.auth.rolesMapping parameter where the keys are the group names of your windows server configuration and the values the roles Blocks know about. For example: |
< | < | ||
rolesMapping: | rolesMapping: | ||
- | | + | |
- | | + | |
- | | + | |
- | | + | |
- | | + | |
- | | + | |
</ | </ | ||
Line 75: | Line 78: | ||
====Filter the groups provided to Blocks==== | ====Filter the groups provided to Blocks==== | ||
- | In the section named **Configure OpenID Connect to provide user groups to Blocks** we add a configuration that will provide Blocks with all of the user's groups. This may not be wanted since there can be thousand | + | In the section named **Configure OpenID Connect to provide user groups to Blocks** we add a configuration that will provide Blocks with all of the user's groups. This may not be wanted since there can be thousands |
===Configure OpenID Connect to provide user groups to Blocks=== | ===Configure OpenID Connect to provide user groups to Blocks=== | ||
Line 86: | Line 89: | ||
- Click the "Add Rule..." | - Click the "Add Rule..." | ||
- Select "Send Claims Using a Custom Rule" and click next. | - Select "Send Claims Using a Custom Rule" and click next. | ||
- | - Give the rule the name " | + | - Give the rule the name " |
- | * c:[Type == " | + | |
- Click finish and add yet another rule. | - Click finish and add yet another rule. | ||
- Again, select "Send Claims Using a Custom Rule" and click next. | - Again, select "Send Claims Using a Custom Rule" and click next. | ||
- | - Give this rule the name " | + | - Give this rule the name " |
- | * c:[Type == " | + | - The " |
- | - The part containing | + | |
- Click finish. | - Click finish. |