April 27, 2020
Estimated Post Reading Time ~

How to configure SAML SSO for Adobe CQ5

Configure Apache Referrer Filter: Navigate to the web console: http://localhost:4502/system/console/configMgr

Expand Apache Sling Referrer Filter
Add the SAML SSO server hostname to the Allowed Hosts section (depending on the authoring environment you are configuring), Check the Allow Empty checkbox and Click Save.



Configure Adobe Granite SAML 2.0 Authentication Handler:Configured the required details for authentication
Path
/
Service Ranking
5002
IPD URL
https://host/SAML2/sso/SAML2Service - URL of the IDP where the SAML Authentication Request should be sent to
IDP HTTP Redirect
Unchecked - Use an HTTP Redirect to the IDP URL instead of sending an AuthnRequest-message to request credential
Service Provider Entity ID
http://dev-author.com/ - ID which uniquely identifies this service provider with the identity provider
Default Redirect
/
User ID Attribute
UserID - The name of the attribute containing the user ID used to authenticate and create the user in the CRX repository
Use Encryption
Unchecked - Whether or not this authentication handler expects encrypted SAML assertions
Autocreate CRX Users
Unchecked - Whether or not to autocreate nonexisting users in the repository
Add to Groups
Unchecked - Whether or not a user should be autmatically added to CRX groups after successful authentication
Group Membership
<empty--no value> - The name of the attribute containing a list of CRX groups this user should be added to
NameIDPolicy Format
urn:oasis:names:tc:SAML:2.0:nameid-format:unspecified - The value of the NameIDPolicy format parameter to send in the AuthnRequest message.


Click Save

Add the SAML certificate:

Log into the Authoring server using ssh.
Create a file called /tmp/idp.pem on the Authoring server, and paste the contents of the certificate into the file. Save the file.
e.g.
-----BEGIN CERTIFICATE-----
v0+H34mZVykVp1QmXs6r6xPppTMZ6YbGs8l+RfmMy4pAFphTimiQz/y/eWJCpvo7
Hg+VqF/9Kong61W9ogDbkAsCzWoyQyE1OkzqjLM19N6QDmbGheUQMS70bhiPEagz
…….
-----END CERTIFICATE-----


Run this command to push the certificate into AEM, replacing PASSWORD with the admin password:
curl -u admin:PASSWORD -F idp_cert=\<idp.pem -F idp_cert@TypeHint=Binary http://localhost:4502/etc/key/saml

Browse to the AEM server (http://localhost:4502/)and you should be redirected to the SSO server for authentication and send it to the AEM screen upon successful authentication(http://localhost:4502/)).



By aem4beginner

No comments:

Post a Comment

If you have any doubts or questions, please let us know.