Configuring the LiquidFiles Virtual Appliance
- Select Directory Manager.
- Select Groups.
- Select the Blue plus sign in the bottom right corner.
- Name the Group LiquidFiles Users.
Note: If you have other existing Groups for SSO users you can use one of these as well. - Select ADD GROUP.
- Select SSO Manager.
- Select the Blue plus sign in the bottom right corner.
- Select the Catalog Icon.
- Select LiquidFiles from catalog.
- Select Application Enabled.
- Select the desired Authentication Policy. Use default if you are not certain.
- Select Protocol Setup.
Reply to URL: https://<yourdomain.com>/saml/init
Audience URI: https://<yourdomain.com>/saml/consume - Select Attribute Transformation.
Update the attributes
Attribute Value: {User.PrincipalName}
Issue as type: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier
Select Add Mappying
select Add custom Attributes
Attribute Value: {User.EmailAddress}
Issue as type: email - Select Add Application.
- Select Permissions.
Select the group created in Step 4. - Select Save Changes.
Configure the LiquidFiles Virtual Appliance for Single Sign On
- Log into the LiquidFiles Virtual Appliance with an administrative account.
- Navigate to the Admin section and select Single Sign-On from the left menu.
- Specify the Protocol as SAML 2
- Set the IdP Login URL to the SP-Init endpoint in PasslySingle Sign On. This URL is located at https://<yourdomain.com>/sso/federation/passive/Saml2SPInit where “yourdomain.com” points to your Passly server
- Set the Logout URL to the Passly Single Sign On Single Sign Out URL (bit of a tongue twister, eh?). This URL is located at https://<yourdomain.com>/sso/federation/passive/signout. Note: Setting the logout URL to the SSO Log Out URL will cause you to logout of Passly Single Sign On when you log out of LiquidFiles. If you don’t want that to happen you can specify the SSO Portal as the logout URL, e.g. https://<yourdomain.com>/sso
- Specify the thumbprint from the Signing Certificate in the application configuration in Passly Single Sign On. You can find this by navigating to the LiquidFiles application in Passly Manager and opening the Certificate Authority section. The thumbprint can be copied directly into the LiquidFiles configuration.
- Finally, modify the Authentication Context tourn:oasis:names:tc:SAML:2.0:ac:classes:Password . Otherwise, you will be prompted to elevate credentials within Passly Single Sign On.
If you don’t want to modify the Authn Context in LiquidFiles and do not want to require elevation in Single Sign On, contact support to reconfigure the authentication type for the LiquidFiles application in Single Sign On.
- Save the changes and try logging into LiquidFiles from the Passly Single Sign On portal. You should see the application in the list.