Single Sign On Authentication


 

You can set up single sign on to access ADManager Plus through NTLM or SAML authentication.

 

  • NTLM authentication
  • SAML authentication
  •  

    NTLM authentication

     

    To enable single sign-on for domains, follow the steps listed below:
    • Click AD Delegation tab.
    • Select Single Sign On under Configuration in the left navigation section.
    • Mark the check-box Enable Single-Sign On with Active Directory.
    • Select the domains that you wish to enable single-sign on from the Select Domains drop-down box.
    • Click Save Settings.

    To modify existing single sign-on settings,


    • Click AD Delegationtab.
    • Select Single Sign On under Configuration in the left navigation section.
    • Click the edit icon in the status column against the domain that you wish to modify the settings.
    • Enter the Computer Name and Password in the respective fields.
    • Click on the Create this computer account in the domain check-box to create a computer with the entered credentials if it is already not present in the domain.
    • If the message Error in creating coputer account appears, then the DNS Servers and DNS Site can be entered manually.
    • Click Save.
         

    To identify the DNS Server IP address:


    • Open Command Prompt from a machine belonging to the domain that you have selected.
    • Type ipconfig /all and press enter.
    • Use the first IP address displayed under DNS Server.

    To identify the DNS Site:


    • Open Active Directory Sites and Services in Active Directory.
    • Expand the Sites and identify the Site in which the Domain Controller configured under the selected domain appear.
    • Use the Site name for DNS Site.

    Troubleshooting steps for SSO:


    Trusted sites are the sites with which NTLM authentication can occur seamlessly. If SSO has failed, then the most probable cause is that the ADManager Plus URL isn't a part of your browser's trusted sites. Kindly add the ADManager Plus URL in the trusted sites list. Follow the steps given below:

    • Internet Explorer
    • Google Chrome
    • Mozilla Firefox


    Note:
    • It is recommended that you close all browser sessions after adding the URL to the trusted sites list for the changes to take effect.
    • Google Chrome and Internet Explorer use the same internet settings. Changing the settings either in Internet Explorer or in Chrome will enable NTLM SSO in both browsers. It is again recommended to close both the browser sessions for the changes to be enabled.
     

    Internet Explorer:

    • Open Internet Explorer and click the Tools button.
    • Click Internet options.
    • In the Internet options dialog box that opens, click the Security tab, and then click a security zone (Local intranet, Trusted sites, or Restricted sites).
    • Click Sites.
    • If you are using IE 11, click on the advanced button and add the ADManager Plus site to the list of intranet site.
    • If you are using versions lower than IE 11, add the ADManager Plus site to the list of intranet sites.
    • Click Close, and then click OK.
    • Close all browser sessions and reopen your browser.
    •  

    Google Chrome

    • Open Chrome and click the Customize and control Google Chrome icon (3 horizontal lines icon on the far right of the Address bar).
    • Click Settings, scroll to the bottom and click the Show advanced settings link.
    • Under the Network section click Change proxy settings.
    • In the Internet Properties dialog box that opens, navigate to the Security tab --> Local Intranet, and then click Sites.
    • Click Advanced and add the URL of ADManager Plus in the list of intranet sites.
    • Click Close, and then OK.
    • Close all browser sessions and reopen your browser.

    Mozilla Firefox

    • Open Firefox web browser and type about:config in the address bar.
    • Click I'll be careful, I promise in the warning window.
    • In the Search field, type: network.automatic-ntlm-auth.trusted-uris.
    • Double-click the "network.automatic-ntlm-auth.trusted-uris" preference and type the URL of AD360 in the prompt box. If there are sites already listed, type a comma and then the URL of ADManager Plus. Click OK to save the changes.
    • Close all browser sessions and reopen your browser.

     

    SAML authentication

    You can set up single sign on to access ADManager Plus through any of these popular identity providers.  

     

    Steps to set up single sign on to ADManager Plus

     

    Step 1: Add ADManager Plus as a custom app in the identity management solution

    Step 2: Configure the identity management solution's settings in ADManager Plus

     

    Configure single sign on using Okta

     

    Step 1: Configure ADManager Plus in Okta 

     
    • Logon to Okta portal.
    •  
    • Under Apps tab, click Add  and select Create New App.
    • Select Platform as Web and choose Sign on method as SAML 2.0 and click Create. 
    • In General Settings, provide a name for the connection. For example, ADManager Plus - MFA and upload a logo for the application.
    •  
    • In Configure SAML section, enter the value for Single Sign URL and Audience URI which can be obtained from ADManager Plus ->AD Delegation -> Configuration tab -> Single Sign on -> SAML Authentication -> Okta -> ACS/Recipient url. 
    • Click Finish. Once the configuration is complete, navigate to Sign on tab to download metadata file. 

    Step 2: Configure Okta in ADManager Plus

    • Logon to ADManager Plus.
    •  
    • Click AD Delegation tab. Select Single Sign on option under the Configuration section. Click SAML authentication.
    • Select Okta from the drop down list.
    • Upload the metadata file obtained in step 1. 
    • Click Save to complete the configuration. 
     

    Configure single sign on using OneLogin

     

    Step 1: Configure ADManager Plus in OneLogin

    • Logon to OneLogin portal. 
    • Click Apps tab and select Add Apps. 
    • Click SAML Test Connector in the apps category.
    • Enter the configuration display name and upload the logo for the application. Click Next. 
    • Under Configuration tab, enter Recipient, Audience URI and ACS URL, which can be obtained from ADManager Plus portal under AD Delegation -> Configuration tab -> Single Sign on -> SAML Authentication -> OneLogin -> ACS/Recipient URL. 
    • Click More Actions in the top panel and click SAML Metadata to download the metadata file. 
    • Click Save to complete the configuration in Onelogin. 

    Step 2: Configure OneLogin in ADManager Plus:

    • Logon to ADManager Plus. 
    • Click AD Delegation tab. Select Single Sign on option under Configuration. Click SAML authentication.
    • Select Onelogin from the drop down list.
    • Upload the metadata file obtained in step 1. 
    • Click Save to complete the configuration. 
    •  

    Configure single sign on using Ping Identity

     

    Step 1: Configure ADManager Plus in Ping Identity 

     
    • Logon to Ping Identity portal. 
    • Click Applications -> My Applications -> Add Application -> New SAML Application.
    • Enter the application name, description, category and logo to proceed to the next step.
    • To auto-populate the configuration details of ADManager Plus, you can upload the metadata file which can be downloaded by logging onto to ADManager Plus -> AD Delegation -> Configuration tab -> Single Sign on -> SAML Authentication -> Ping Identity -> Download SP Metadata.
    • The alternative option is to enter the ACS URL and entity ID which can be obtained by logging on to ADManager Plus -> AD Delegation -> Configuration tab -> Single Sign on -> SAML Authentication -> OneLogin -> ACS/Recipient URL. 
    • In the next step, click Save & Publish.
    • Once the configuration is complete, the metadata file can be downloaded.

    Step 2: Configure Ping Identity in ADManager Plus

    • Logon to ADManager Plus. 
    • Click AD Delegation tab. Select Single Sign on option under Configuration. Click SAML authentication.
    • Select Ping Identity from the drop down list.
    • Upload the metadata file obtained in step 1. 
    • Click Save to complete the configuration. 
     

    Configure single sign on using custom identity provider

    You can configure any custom identity provider of your choice to enable single sign on to access ADManager Plus. To do so, configure ADManager Plus settings in the preferred identity provider by following the steps explained above.

    Configure custom identity provider in ADManager Plus

    • Logon to ADManager Plus. 
    • Click AD Delegation tab. Select Single Sign on option under Configuration. Click SAML authentication.
    • Select custom identity provider from the drop down list.
    • Upload the metadata file of the custom identity provider.
    • Click Save to complete the configuration. 

    Troubleshooting tips:

  • If the following error message after the identity provider configuration,"Sorry, the page you requested was not found.Please check the URL for proper spelling and capitalization. If you\'re having trouble locating a destination, try from our home page." Please reenter the ACS/Receipient URL and try again.
  • If an error occurs while accessing ADManager Plus from identity provider portal, kindly ensure if the deafult relay state field is configured.