Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 2 Next »

Uploading Adeptia Connect metadata to IdP server allows IdP server to fetch the details of Service Provider such as server name, metadata information, certificate, encryption, single logout, and much more.

To upload the Connect metadata, you need to first download Adeptia (SP) metadata file and upload it to the IdP server. Perform the following steps to upload Adeptia metadata to IdP Server:

Open the browser and hit the URL in the format:

<protocol_name>://<ip_address>:<port_number>/saml/metadata

where,

<protocol_name> is the name of the protocol, for example, HTTP or HTTPS.

<ip_address> is the IP address of the computer hosting Adeptia Connect.

<port_number> is the port number of the computer hosting Adeptia Connect. 

For example, http://192.168.1.10:8080/saml/metadata.

 

Configure Multiple IDP in Adeptia Connect

 

 

Placing Multiple IDP metadata in Adeptia Connect

Placing IdP metadata information within Adeptia Connect allows Service Provider to read the details of IdP Server from a particular location.

Depending upon the IdP server you are using, download the multiple IdP server metadata file, rename it (for example, idp_1.xml and idp2.xml) and place it at the …<ConnectPortalInstallFolder>\resources_config\saml location.

After you have placed the multiple idp.xml file, you need to set up the bean in securityContext.xml file. Uncomment the following bean from the securityContext.xml file:



Setting Default SAML SSO IDP

  1. Go to …<ConnectPortalInstallFolder>\resources_config\saml location.
  2. Open securityContext.xml file.

Update the following property as below:


Where,

  • Value is the entityID value from idp.xml file.
  • To get the entityID, go to  …<ConnectPortalInstallFolder>\resources_config\saml location and open the IDP metadata file that you want to set as default.
  • To access different ID server other than default use IDP initiated SSO URL.
  • Restart the Connect Portal.

 

Configure IDP Initiated SSO

Enabling multiple SAML IDP Provider in clustered environment

  • No labels