On this page
Magic Collaboration Studio authentication server can be integrated with a 3rd party Identity Provider, which supports SAML v2.0 protocol. In this integration, the authentication server acts as a Service Provider.
Integration with the SAML v2.0 Identity Provider allows authentication to Magic Collaboration Studio with users from the Identity Provider. Successful authentication requires one of the following two conditions to be true:
SAML integration requires SAML parameters, these parameters are configured in the authserver.properties file. |
To integrate with the SAML v2.0 based Identity Provider follow the steps below.
To install/configure the SAML v2.0 Identity Provider
Configure Name ID value mapping; for example, add urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName=uid to the mapping. The authentication server needs to know which user's attribute should be used to identify the user. The value of this attribute will be used as the username in the Magic Collaboration Studio. By default, it uses urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName format (configured in authserver.properties, parameter authentication.saml.name.id.format). Thus, if the Identity Provider has mapping urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName=uid or similar, then the uid attribute will be used as the username.
To configure authentication server parameters in authserver.properties
(Re)start the authentication server.
To register an authentication server as a remote SAML v2.0 Service Provider in a 3rd party product
If needed, fill in attributes mapping in the registered Service Provider if the 3rd party product has that ability. You can select the Identity Provider's user attribute and map it to the Magic Collaboration Studio user attribute. Currently, Magic Collaboration Studio supports the following attribute names: name, email, mobile, department.
Values of mapped attributes can be saved in Magic Collaboration Studio only if a new Magic Collaboration Studio user is created automatically after the first successful authentication. Attributes are not updated after subsequent successful authentications. |
After these steps, users should be able to log in to the Magic Collaboration Studio through SAML v2.0 Identity Provider by clicking the SAML integration button on the authentication server's login page.