You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 5 Next »


Introduction


Recently, there have been questions from customers, partners and the community asking for comparisons between Joget Workflow and Microsoft SharePoint. Actually, the two products are not competing, but in fact complement each other.

SharePoint is a web application portal platform for team collaboration, intranets and enterprise document and content management. While it is possible to extend the capabilities of SharePoint through apps, developing apps for SharePoint is not easy as it requires traditional programming, as described in the SharePoint 2013 development overview article at https://msdn.microsoft.com/en-us/library/office/jj164084.aspx

On the other hand, Joget is a platform to easily build web apps and automate processes. With single sign-on (SSO) integration from SharePoint to Joget, organizations can easily extend the capability of SharePoint by allowing users to seamlessly access custom apps, visually design their own custom applications, or download ready made apps from the Joget Marketplace

This article describes how SSO can be achieved using Active Directory Federation Services (https://msdn.microsoft.com/en-us/library/bb897402.aspx), which supports the Security Assertion Markup Language (SAML) standard. 


Configuring Joget SharePoint SSO

i. Pre-requisites

Before configuring the SharePoint-Joget SSO integration, you will need to have installed and configured:

  • SharePoint integrated with Active Directory Federation Services

  • Joget

The appendices provide some resources on installing and configuring these pre-requisites.


ii. Configure SAML for Joget 

Export AD FS Token Signing Certificate

  1. In the Windows Server Manager, launch Tools > AD FD Management


  2. In the AD FS Management console, select Service > Certificates in the left navigation pane.

  3. Select the Token-signing certificate and click on the View Certificate link on the right pane. 


  4. Click on the Details tab, and click on the Copy to File… button


  5. This starts the Certificate Export Wizard. On the Welcome to the Certificate Export Wizard page, click Next.

  6. On the Export Private Key page, click No, do not export the private key, and then click Next.

  7. On the Export File Format page, select Base-64 encoded X.509 (.CER), and then click Next.

  8. On the File to Export page, type the name and location of the file that you want to export, and then click Next. For example, enter C:\ADFS.cer.

  9. On the Completing the Certificate Export Wizard page, click Finish.

Configure SAML Directory Manager for Joget 

  1. Download the SAML Directory Manager from the Joget Marketplace

  2. In Joget, login as an administrator

  3. In Settings > Manage Plugins, click on Upload Plugin. Select the downloaded JAR file and click on the Upload button to upload the downloaded JAR file

  4. In Settings > Directory Manager, choose the SAML Directory Manager and click on Select.


  5. Open the contents of the exported AD FS certificate in a text editor and copy the contents.

  6. In the Plugin Configuration page, paste the contents into the IDP Certificate field (copy-paste without the BEGIN and END lines) 


  7. Copy the value of the ACS URL (to be used in AD FS configuration later).

  8. With User Provisioning Enabled checked, a user will be created on first login if the username does not already exist. To integrate with Active Directory directly to retrieve users and groups, configure the External Directory Manager to LDAP Directory Manager https://dev.joget.org/community/display/KBv5/LDAP+Directory+Manager

  9. Click on Submit to save the settings.



iii. Configure Relying Party Trust between AD FS and Joget 

Add Relying Party Trust

  1. In the Windows Server Manager, launch Tools > AD FD Management

  2. In the AD FS Management console, click on Trust Relationships > Relying Party Trusts in the left navigation pane.

  3. In the right page, click on Add Relying Party Trust


  4. On the Welcome to the Add Relying Party Trust Wizard page, click Start.

  5. Select Enter data about the relying party manually, and then click Next.

  6. Type a relying party name (e.g. Joget) and then click Next.

  7. Make sure Active Directory Federation Services (AD FS) 2.0 Profile is selected, and then click Next.

  8. Do not use an encryption certificate. Click Next.

  9. Click to select the Enable support for the SAML 2.0 WebSSO protocol check box.

  10. In the Relying party SAML 2.0 SSO service URL field, type the URL copied from the Joget SAML Directory Manager earlier, e.g. https://mysite.cloud.joget.com/jw/web/json/plugin/org.joget.plugin.saml.SamlDirectoryManager/service

  11. Paste the URL into the relying party trust identifier, and then click Add. Click Next.

  12. Select Permit all users to access this relying party. Click Next.

  13. On the Ready to Add Trust page, there is no action required, click Next.

  14. On the Finish page, click Close. This opens the Rules Editor Management console.

Edit Claim Rules

  1. On the Issuance Transform Rules tab, click Add Rule


  2. On the Select Rule Template page, select Send LDAP Attributes as Claims. Click Next.

  3. On the Configure Rule page, type the name of the claim rule in the Claim rule name field e.g. User Attributes.

  4. From the Attribute Store drop-down list, select Active Directory.

  5. In the Mapping of LDAP attributes to outgoing claim types section, key in the following mappings: 

    LDAP Attribute

    Outgoing Claim Type

    SAM-Account-Name

    Name ID

    E-Mail-Addresses

    email

    Given-Name

    User.FirstName

    Surname

    User.LastName

  6. Click Finish, and then click OK.

  7. At this point, the SSO should be operational. Test the login by accessing the the AD FS login page e.g. https://windows.local/adfs/ls/idpinitiatedsignon.aspx 


  8. Select the appropriate site e.g. Joget and click on Sign in.

  9. Login to SharePoint using your AD account 


  10. On successful login, you should be automatically logged into Joget


iv. Add Link in SharePoint site

  1. In SharePoint, click on Edit Links in the left menu 


  2. Click on (plus) link, and key in the text to display (e.g. Joget) and the direct SSO link e.g. assuming the AD FS server is https://windows.local and the Joget server is https://mysite.cloud.joget.com, the link will be https://windows.local/adfs/ls/idpinitiatedsignon.aspx?logintoRP=https://mysite.cloud.joget.com/jw/web/json/plugin/org.joget.plugin.saml.SamlDirectoryManager/service 


  3. Once the link is created, clicking on the link will SSO the user into the Joget installation.




Appendix: Resources for Installing Pre-requisites

Install SharePoint Foundation 2013

  1. Download SharePoint Foundation 2013: https://www.microsoft.com/en-us/download/details.aspx?id=35488

  2. Install SharePoint 2013 on a single server with a built-in database: https://technet.microsoft.com/en-us/library/cc263202.aspx

  3. Fix SharePoint installation issues on Windows 2012 R2:


    1. http://www.someshinyobject.com/posts/server-2012-r2-and-sharepoint-2013-the-tool-was-unable-to-install-application-server-role-web
    2. https://www.axian.com/2014/06/11/sharepoint-2013-configuration-wizard-issues-when-installing-local-development-instance/
    3. http://sandbox2010.kwizcom.com/sites/demo-data-view-plus/admin-corner-blog/Lists/Posts/Post.aspx?ID=4

Install Active Directory Federation Services (AD FS)

  1. Install the AD FS software on Windows Server 2012 R2: https://msdn.microsoft.com/en-us/library/azure/dn528857.aspx

Configure SharePoint to use AD FS

  1. Configure SAML-based claims authentication with AD FS in SharePoint 2013: https://technet.microsoft.com/en-us/library/hh305235.aspx

Install Joget 

  1. Options for installing Joget:


    1. Install On-Premise: Installation Guide
    2. Install on Docker: Joget on Docker
    3. Install on OpenShift: Joget on OpenShift
    4. Sign up for Joget Workflow On-Demand: https://cloud.joget.com



  • No labels