You have 영어 (미국) selected as language but this page has not been translated yet. Translate the page or view the content in the default space language below.
Display defaultRegister an application in Azure Portal
- Go to Azure Portal > Enterprise Application > New application > Create your own application.
After creating new application go to Single sign-on > SAML.
Edit Basic SAML configurations.
Identifier (Entity ID)
https://[authserverdomain:port]/auth/saml/metadeta
Reply URL (Assertion Consumer Service URL)
https://[authserverdomain:port]/auth/saml/sso
Logout Url
https://[authserverdomain:port]/auth/saml/SingleLogout
NOTE
In case of pro service customer, client can skip this step and edit later when URLs are provided from Samsung.
Download Certificate, Federation metadata XML, copy App Federation Metadata URL and provide to Samsung.
Requirement for Non Pro service customer
- App registration in IDP portal.
- Get SAML signing certificate, Federation metadata XML, App Federation Metadata URL from client. Download certificate is required to make the build for the client. This will be changed in the next version and separate guide regarding the steps to be followed will be provided.
- Install the build provided with required SAML configurations. Refer sample config.properties file for more information.
- As most of the IDPs require HTTPS endpoints, guide the customer to boot Auth server over HTTPS and do the configurations required in this case. (Refer to the end of the document for different possible scenarios and actions required).
Requirement for Pro service customer
- App registration in IPD portal.
- Get SAML signing certificate, Federation metadata XML, App Federation Metadata URL from client.
- Basic SAML configurations URLs to be provide by Samsung.
- Get dummy users credentials for testing.
- For POC purpose self-signed certs can be used.
MIS (HTTP) | MIS (HTTPS) | |
Auth Server (HTTP) | No SSL certificate required. Not a practical configuration to test with external IPDS. | SSL Certificate bind with domain name is required for MIS. As most of the IPDs demand HTTPS endpoints for security. This is not a practical configuration setup for testing with external IPDs because Auth server is hosted over HTTP. |
Auth Server (HTTPS) | SSL certificate bind with domain name required for Auth Server. If client wants to run MIS without SSL then this configuration can be setup for testing with external IPDS as Auth server is hosted over HTTPS. | SSL certificate bind with domain name is required for both. This is the ideal configuration setup for testing with external IDPs. NOTE
|