Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Corrected links that should have been relative instead of absolute.

This page helps you in configuring multiple IDPs in exposing the metadata of multiple Identity Providers to Adeptia Connect. The steps may vary for various IDP providers different IdPs (e.g. SSO Circle, Keycloak, Okta, etc.). This page guides the multiple IDP configuration through an example of SSO circle. For a clustered set up, you can repeat the steps given in every node of the environment.

Configure

Exposing multiple

IDP

IdP Metadata in Adeptia Connect

To configure multiple IDP in Adeptia Connect, configure SAML SSO using IDP provider (for example, SSO circle). Click here to get more details.

Save the multiple idp.xml file and rename it (for example, 

Follow the steps given below to expose multiple IdP metadata.

  1. Download the IdP servers' metadata files from different Identity Providers.
  2. Give a unique number to each file name, starting with idp_.xml. For example, idp_1.xml
 and 
  1. , idp_2.xml
)
  1. , etc.

Placing multiple IDP Metadata in Adeptia Connect

Placing IdP metadata information within Adeptia Connect allows Service Provider to read the details of IdP Server from a particular location.

After you have placed both idp.xml file, you need to set up the bean for both idp.xml files. By default there will be one bean in the file, you may copy-paste the bean and change the file name. Refer to the image below (securityContext.xml file). 

  1.  
  2. Create environment variables to store the path of each idp xml file.

    Note: The name of each environment variable must contain the number part in incremental fashion, for example, SAML_SSO_IDPS_CONFIGURATION_0_METADATA_LOCATION

null (file path or URL)SAML
  1. , SAML_SSO_IDPS_CONFIGURATION_1_METADATA_LOCATION

null (file path or URL)

If local, file:<file path>

If http, provide direct URL (also you can use below timeout)

SAML_SSO_IDPS_CONFIGURATION_0_REQUEST_TIMEOUT
0Setting Default SAML SSO IDP
Image Removed
  1. Go to …<ConnectPortalInstallFolder>\resources_config\saml location.
  2. Open securityContext.xml file. Add the following property as below:

    SAML_SSO_METADATA_MANAGER_DEFAULT_IDP
    null

    Service Provider Configuration

    Image Removed

    Where,

  3. Value is the entityID value from idp.xml file.
  4. To get the entityID, go to  …<ConnectPortalInstallFolder>\resources_config\saml location and open the IDP metadata file that you want to set as default.
    Image Removed
  5. Restart Connect Portal.
  6. , etc.

    Tip
    For more information on how to create an environment variable on Windows or Linux, refer to this page.


Configure IDP Initiated SSO

Open the browser and type the below URL using IDP initiated SSO (for SSO Circle).

For Example, https://<IDP Server Host>/sso/idpssoinit?metaAlias=/publicidp&spEntityID=<value of SP entity Id>

Where,
spEntityID is the name that is specified in the metadata of your service provider.

Info

In case of multiple IDP IdP providers, the log out from SAML will happen only through the provider that has been set up as default. Even if you logout from a secondary provider, the log-out call will be directed to the default provider only.

Next step

Login Log in to Adeptia Connect with SAML