Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| blocks:sso:adfs [2019-04-10 09:18] – max | blocks:sso:adfs [2024-08-20 09:11] (current) – Update for Windows Server 2022 melvin | ||
|---|---|---|---|
| Line 3: | Line 3: | ||
| ===Prerequisites=== | ===Prerequisites=== | ||
| - | To be able to follow the steps below you'll need to have Windows Server 2016 or later with the " | + | To be able to follow the steps below you'll need to have Windows Server 2016 or later with the " |
| ===Add an OpenID Connect configuration to ADFS=== | ===Add an OpenID Connect configuration to ADFS=== | ||
| Line 17: | Line 17: | ||
| - Paste and add the **Client Identifier** (from step 6) as the " | - Paste and add the **Client Identifier** (from step 6) as the " | ||
| - Select the access control policy you'd like to use and click next. | - Select the access control policy you'd like to use and click next. | ||
| - | - Make sure the box next to " | + | - Make sure the boxes next to " |
| - | - Click the "New scope..." | + | |
| - Finish the wizard. | - Finish the wizard. | ||
| Line 35: | Line 34: | ||
| ====Blocks specific steps==== | ====Blocks specific steps==== | ||
| - | - Open your Blocks configuration file on your Blocks server and add the " | + | - Open your Blocks configuration file on your Blocks server and add the " |
| * < | * < | ||
| server: | server: | ||
| + | type: pixilab_server | ||
| auth: | auth: | ||
| urlResolver: | urlResolver: | ||
| ajaxRequestResolver: | ajaxRequestResolver: | ||
| - | callbackUrl: | + | callbackUrl: |
| rolesOwner: attributes | rolesOwner: attributes | ||
| rolesPath: roles | rolesPath: roles | ||
| Line 47: | Line 47: | ||
| - org.pac4j.oidc.client.OidcClient: | - org.pac4j.oidc.client.OidcClient: | ||
| configuration: | configuration: | ||
| - | discoveryURI: | + | discoveryURI: |
| clientId: [CLIENT-ID] | clientId: [CLIENT-ID] | ||
| secret: [CLIENT-SECRET] | secret: [CLIENT-SECRET] | ||
| Line 55: | Line 55: | ||
| security: | security: | ||
| - matchers: internalMatcher | - matchers: internalMatcher | ||
| - | | + | |
| - | authorizers: | + | authorizers: |
| </ | </ | ||
| - Start Blocks and go to "/ | - Start Blocks and go to "/ | ||
| + | |||
| + | :!: Make sure you maintain all indentation as shown above, using only spaces for indentation. Here's more about [[blocks: | ||
| ===Role Mapping=== | ===Role Mapping=== | ||
| Line 76: | Line 78: | ||
| ====Filter the groups provided to Blocks==== | ====Filter the groups provided to Blocks==== | ||
| - | In the section named **Configure OpenID Connect to provide user groups to Blocks** we add a configuration that will provide Blocks with all of the user's groups. This may not be wanted since there can be thousand | + | In the section named **Configure OpenID Connect to provide user groups to Blocks** we add a configuration that will provide Blocks with all of the user's groups. This may not be wanted since there can be thousands |
| ===Configure OpenID Connect to provide user groups to Blocks=== | ===Configure OpenID Connect to provide user groups to Blocks=== | ||
| Line 87: | Line 89: | ||
| - Click the "Add Rule..." | - Click the "Add Rule..." | ||
| - Select "Send Claims Using a Custom Rule" and click next. | - Select "Send Claims Using a Custom Rule" and click next. | ||
| - | - Give the rule the name " | + | - Give the rule the name " |
| - | * c:[Type == " | + | |
| - Click finish and add yet another rule. | - Click finish and add yet another rule. | ||
| - Again, select "Send Claims Using a Custom Rule" and click next. | - Again, select "Send Claims Using a Custom Rule" and click next. | ||
| - | - Give this rule the name " | + | - Give this rule the name " |
| - | * c:[Type == " | + | - The " |
| - | - The part containing | + | |
| - Click finish. | - Click finish. | ||