Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Corrected links that should have been relative instead of absolute.

Uploading Adeptia Connect metadata to IdP server allows IdP server to fetch the details of Service Provider such as server name, metadata information, certificate, encryption, single logout, and much more.

 

This page helps you in configuring multiple IDPs in Adeptia Connect. The steps may vary for various IDP providers (e.g. SSO Circle, Keycloak, Okta, etc.). This page guides the multiple IDP configuration through an example of SSO circle. For a clustered set up, you can repeat the steps given in every node of the environment.

Configure Multiple IDP in Adeptia Connect

To configure multiple IDP in Adeptia Connect, configure SAML SSO using IDP provider (for example, SSO circle). Click here to get more details.

  • Download Save the multiple IdP server metadata file.Provide any name idp.xml file and rename it (for example, idp_1.xml and idp2idp_2.xml).Place it at the …<ConnectPortalInstallFolder>\resources_config\saml location.

...



Placing Multiple IDP metadata Metadata in Adeptia Connect

Placing IdP metadata information within Adeptia Connect allows Service Provider to read the details of IdP Server from a particular location.

After you have placed the multiple both idp.xml file, you need to set up the bean in securityContextfor both idp.xml file. Uncomment the following bean from the securityContext.xml file: files. By default there will be one bean in the file, you may copy-paste the bean and change the file name. Refer to the image below (securityContext.xml file). 




Setting Default SAML SSO IDP

  1. Go to …<ConnectPortalInstallFolder>\resources_config\saml location.
  2. Open securityContext.xml file. Add the following property as below:
    Image Removed
    Image Added

    Where,

    • Value is the entityID value from idp.xml file.
    • To get the entityID, go to  …<ConnectPortalInstallFolder>\resources_config\saml location and open the IDP metadata file that you want to set as default.

  3. Restart the Connect Portal.

Configure IDP Initiated SSO

...

Open the browser and type the below URL using IDP initiated SSO

...

Enabling multiple SAML IDP Provider in clustered environment

...

(for SSO Circle).

For Example, https://<IDP Server Host>/sso/idpssoinit?metaAlias=/publicidp&spEntityID=<value of SP entity Id>

Where,
spEntityID is the name that is specified in the metadata of your service provider.

Info

In case of multiple IDP providers, the log out from SAML will happen only through the provider that has been set up as default. Even if you logout from a secondary provider, the log-out call will be directed to the default provider only.