![]() If you want to use your own security certificate, select Use a certificate with a private key (pfx file) from your local storage then click Browse to open a file browser. If you want to use this standard certificate, skip to Drupal SAML Single Sign-On (SSO). It’s set by default to use the standard CyberArk Identity certificate. The bottom of the page displays current security certificate settings. See Choose a certificate file for the latest information. ![]() ![]() The description of how to choose and download a signing certificate in this document might differ slightly from your experience. p12 filename extension.) Make sure the file is accessible from your computer before working through these steps. If you’re going to use your organization’s certificate for connections to Drupal, you must supply that certificate along with its matching private key in a PKCS #12 archive file. ![]() You must then decide which security certificate to use. You can set the web application to create a new user account for every user who authenticates the first time through SSO.Īnonymous user, authenticated user, administrator, and any other roles defined by an administrator.Īdministrators may reset other users’ passwordsĪdd Drupal and set a security certificateīefore you can configure your Drupal-based web application for SSO and configure the Drupal application profile, you must add a Drupal application in the Identity Administration portal. User name/password sign-in is always available, so lockout after enabling SSO is not a problem. Separate sign-in for administrators after SSO is enabled DRUPAL AUTHENTICATION > Allow authentication with local Drupal accounts. User name/password sign-in still available after SSO set upĬonfigurable under SimpleSAMLphp Auth Settings. Users may use SSO to sign into a Drupal-based web application through the user portal or CyberArk mobile apps. Users may sign directly into a Drupal-based web application and then use CyberArk Identity SSO to authenticate. When you configure a Drupal-based web application for SSO and then administer it for your organization, it’s useful to know its SSO characteristics. CyberArk Identity already has the matching private key needed to sign messages using the certificate. If you use CyberArk Identity signing certificate (the default setting), you don’t need to provide a private key-simply download the standard certificate from the Identity Administration portal and provide it to the web application as described later. the Identity Administration portal requires your private key to sign SAML responses or messages for the web application using your certificate. If you use your own certificate, you must provide the certificate to the web application and then provide the same certificate along with your private key to the Identity Administration portal (both processes described later). You can use either a standard certificate provided by CyberArk Identity or a certificate provided by your organization. CyberArk Identity must have the same certificate and a private key that matches the public key in the certificate. The web application must have a security certificate containing a public key. Requirements for SSO configurationīefore you can configure a Drupal-based web application for SSO, you need the following:Īn active account with administrator rights for the web application’s server.Īn active account with administrator rights for the web application.Ī signed security certificate that is recognized by both the Identity Administration portal and Drupal.Ī secure connection for SSO between the web application and CyberArk Identity requires a security certificate and a public and private key pair. In the Identity Administration portal, configure the Drupal application profile to control how access for your Drupal-based application works through the user portal or CyberArk mobile apps.įor detailed information, see Configure a Drupal-based web application in the Identity Administration portal. On your application’s web site, configure the application for SSO via SAML.įor detailed information, see Configure the web application. For detailed information, see Configure simpleSAMLphp. For detailed information, see Preparing the server.Ĭonfigure the components. ![]() Install the components if they’re not present. For detailed information, see Add Drupal and set a security certificate.Įnsure that your web application’s server has the necessary components to support SAML SSO for Drupal: You’ll need information in the application profile to set up SSO. In the Identity Administration portal, add the Drupal application profile if it’s not already added and set the security certificate. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |