It is necessary to configure the Azure instance to allow users within yourorganization to access the PADS4 (Legacy) CMS application. To enable this, please follow the steps in this document :
If you **don’t ** want to use an Application Proxy onyour on-premise application then continue on step 4 below and skip steps 7 and 8.If you **do **want to use an Application Proxy for your on-premise application then proceed to step 7 and skip steps 4, 5 and 6.
Name : PADS4 CMSInternal URL : URL of the PADS4 CMS installation (https://servername)Pre-authentication : Azure Active DirectoryConnector Group : SSO Connector (default). This is the connector group you have just set upThen Click on the add button
Step 9 : Navigate to the newly created application
Navigate to the newly created application by selecting “ Enterprise Applications” and use the search bar to find your application. Select it and then navigate to “Users and Groups” :
Add the users and groups that will have access to the application byselecting the “ Add user/group ” option
Select “None Selected” option to gain access to the groups and users :
Use the search bar to search for a user or group. Click “select” and “assign” upon completion
It is highly recommended to create a PADS4 CMS user group withthe Windows Server AD as the source.
Remark : If you have configured SSO on a version before 2023.1, the domain name wasn’t required in the URL when using only one domain. From version 2023.1 onwards, the domain name is required in the URL both for one and multi-domain setups.Therefore, when updating from a version before 2023.1 with SSO configured, to the latest release, make sure to add the domain to both the Identifier and Reply URL.Be sure to “Save” these configurations.
Step 12 : Whilst in the “ Single sign-on ” menu, select “Edit ” on the “ Attributes & Claims ” section.
By default, you would have a list of claims already, however, it isrequired that the claims matches the below example for successful authentication :Add the primarysid claim : Select “Add new claim”As per the example provided above, add a new claim to match the example table :Name : primarysidNamespace : http://schemas.xmlsoap.org/ws/2008/06/identity/claimsSource attribute : user.objectidSave all configurations.
Remark : If you now experience the following behavior, the SSObutton on the login page works and you are able to input yourcredentials but it will get redirected to the PADS4 Login portal with “Noaccount is defined for your authentication request” in the URL.There can be 2 causesthe group claim is incorrectly configuredThe user you are trying to log in with has the same email addressalready configured to a CMS / Workspace user.
You have now prepared SSO within Azure for your PADS4Application.
In order to configure SSO within PADS4 CMS,you will require the following :
Certificate of the federation serverFederation Service IdentifierSAML SSO URLMetadata URLURL of the Relying party and;Group ID of the User Group you have assigned to the application.
1. Obtaining the “Certificate of the federationserver”
Within your application, select “ Single sign-on ” in the left paneScroll down to the “ SAML Certificates ” headingSelect the “ Download ” option next to the “ Certificate (Raw) ” option.
2. Obtaining the “ Federation Service Identifier ”
Within your application, select “ Single sign-on ” in the left paneScroll down to the “Set up“ your_application_name ” headingSelect the “ Copy ” option next to the “ Azure AD Identifier ” option.
Within your application, select “ Single sign-on ” in the left paneScroll down to the “ Set up “your_application_name ” headingSelect the**“ Copy ”** option next to the “ Login URL ” option.
Within your application, select “Single sign-on ” in the left paneScroll down to the **“ SAML Certificates ” **headingSelect the “ Copy ” option next to the “ App FederationMetadata URL ” option.
Within your application, select “ Single sign-on ” in the left paneScroll to the “ Basic SAML Configuration ” headingCopy the string next to the **“ Identifier (Entity ID) ” **option.
6. Obtaining the “Group ID” of the group you assigned to your application:
For every user group added to utilize the PADS4 CMS application, a mapping table will be required to add the groups to the interface. Please provide the installers the Group ID’s and names of the Groups from Azure to ensure users will be able to login.
Select “home” in portal.azure.com and select “Microsoft Entra ID”Navigating to “Groups” in the left paneSearch for the group you assigned within your application and copy the**“Object Id”**