
d setup wso2 download#
Then, now you can now click on Download SAML MetaData.Įdit the downloaded Metadata file and check if SingleLogoutService and SingleSignOnService point to IDP Server name and port:
d setup wso2 update#
We will update Metadata later on, if necessary. Do not take care about SSO URL and Logout URL pointing on Localhost, I did not find the way to change it (a bug maybe…). Please check and change if necessary Destination URLs to ensure that host name is pointing to your IDP server. Then, open Inbound Authentication Configuration / SAML2 Web SSO Configuration folder. Select Resident from Identity Providers folder. By the way, We could also have set WSO2 IS pointing on another third party IdP. As you can guess, we are going to use the resident IDP available in WSO2 IS. Let’s first get metadata file from our resident IdP in WSO2 IS. Select User Profile for the newly created user.Įnter eMail address which is required for IdP attribute mapping and click Update.Īt this step, we are going to change SAC Identity Provider from standard SCI IdP to our own WSO2 IS IdP. You have now to update your user profile. Select your Service Provider in the role list and click Finish.
d setup wso2 password#
Select Add in Identity folder / Users and RolesĮnter User Name and password and click Next. Then, you have completed Service Provider settings. By applying such settings, we have chosen to use eMail address as user attribute to map with the Identity Provider You should get the following page with prefilled Service Provider definition:Ĭlick on Cancel button and go to the Claim Configuration folder, select Use Local Claim Dialect and choose Subject claim URI dropdown list box. Now select Inbound Authentication Configuration/SAML2 Web SSO Configuration folder and Edit: On WSO2 IS application in the current Service Provider Definition, select Choose file, select your previously SAC downloaded metadata file and click to Upload button: Now, login to your SAC tenant with admin privileges and navigate to System/Administration/ Security folder.Ĭlick on Edit connection and choose SAML Single Sign-On: You need to upload SAC SAML2 metadata into WSO2 IS Service Provider definition. Select folder Inbound Authentication Configuration folder and click to Configure Select Add in Service Provider folder from WSO2 IS Identity Server home pageĮnter your Service Provider name and description and select Register It has to be changed as soon as possible.Īt this step, we are going to create a WSO2 IS Service Provider for SAC. The first time, default password is admin. Then, before starting any Service Provider setup, please check host name in WSO2 IS Server Home page.įrom your preferred browser, open the WSO2 admin console url: Warning : If you do not set Host Name accessible from SAP Analytics Cloud, metadata will mention localhost by default… To complete setup do not forget to change default IdP settings to be in Production configuration by clicking on WSO2 Deploying Identity Server in Production.
d setup wso2 install#
To Install and setup WSO2 Identity Server, please refer to documentation by clicking on WSO2 Installation & Prerequisite.įor this PoC, I have installed WSO2 IS on Linux Ubuntu 16.04 LTS 64-bit and set adequate network settings to enable access from User Browser. Setup of WSO2 Identity Server Installation & prerequisites Create an html page with embedded story and test.Disable X-FRAME-OPTIONS in IDP Tomcat Server.Creating a web page with iFrame and SAC story.The setup of SSO between SAP Analytics Cloud and WSO2 IS is divided into 3 main steps: By choosing WSO2 IS, I am able to customize my authentication page and show how you can set suitable X-FRAME-OPTIONS in Tomcat Server. We will address specific settings of SAC URL API, Single Sign-on with SAML2 federation in the context of embedded Story in an iFrame.įor this proof of concept (PoC), I did with a french customer, I used the Open Source application WSO2 Identity Server (WSO2 IS) as Identity Provider (IdP) to configure SAML2 Single Sign-on with SAP Analytics Cloud.Įmbedding SAC story in an iFrame requires to control ClickJacking Protection of IdP authentication page and SAML2 posting. This blog post is intended to help customers and partners using SAP Analytics Cloud (SAC) to embed story into Corporate Web site.
