Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Custom SAML SSO login lets you decide upon the user, applicable role, and URL to which the user will be redirected. You can implement an interface that provides the ability to define a custom class implementation to authenticate the user information.

In this option, you need to define new Java class and place that in customClasses\custom\beans folder. This option provide the ability to define a custom implementation for providing the user role and redirect URL. 

Ideally we would like the AD groups to be passed as well within the SAML assertions and that AD group shall be translated to Adeptia role and the user can be signed into the appropriate roles.  We imagine the use case for that would be

 

 

  1. User types in the login URL
  2. SAML provider would intercept the URL and generate SAML assertion and do HTTP Post to the Adeptia portal
  3. Within the SAML assertion the email ID and the AD groups pertaining Adeptia would be passed along
  4. Adeptia would take the AD groups as part of SAML assertion and translate to the Adeptia roles and Sign the user to the application with appropriate roles.

...

  1.   This way the roles can be better managed within the Active directory as against the Adeptia application.

  1. Before generating an access token for the user (for SAML SSO interaction), we will provide the ability to define a custom implementation for providing the user role and redirect URL.
  2. As part of the solution implementation, MM needs to provide an implementer class that will map the customer user attributes to a Role and redirect URL. Here is the contract for this class:



Follow the steps below to create the custom class:

...