Uploaded by Razvan DasH

installation guides

advertisement
25-9-2019
TeamWizkunde / Magento2 WebSSO / wiki / Home — Bitbucket
Magento2 WebSSO
Wizkunde / Wizkunde Extensions / Magento2 WebSSO
Wiki
Source
Create page
Clone wiki
Magento2 WebSSO / Home
View
Commits
History
Edit
Branches
Pull requests
About the WebSSO Module
Setup step 1 - Installing the extension
Pipelines
Composer Installation: Contact us to get a token for your composer installation
Alternative Installation: Download and unpack the module
Setup step 2: Install the module
Setup Step 3: If you were in production mode you have to execute:
Setup Step 4: Deploy all the template files to the proper location:
Setup Step 5: Make sure all the caches are cleaned
Setup step 6: Creating a Identity Provider configuration setting
Deployments
Issues
Wiki
Downloads
Settings
General Information
SAML2: Identity Provider Information
SAML2: Certificate Generation
OAuth2: Identity Provider Information
Mappings
Setup step 7: Enabling the IDP in the proper store / website
Configuration: General Settings
Configuration: Frontend Firewall
Configuration: Audit Logging
Setup step 8: Go to the frontend/backend and see if the login page appears!
Your Service Provider Details
Metadata location FRONTEND
Metadata location BACKEND
About the WebSSO Module
This module allows your Magento 2 installation to communicate with Identity Providers including:
Microsoft ADFS2.x / 3.x / SharePoint
SalesForce
Google Accounts
NetIQ
OneLogin
SimpleSAMLPhp
And many more!
Protocols Supported: - SAML2.0 - OAuth2 - OpenID
Setup step 1 - Installing the extension
Composer Installation: Contact us to get a token for your composer
installation
You can easily install this extension with composer by going to your account page on our website and
follow the composer installation instructions available on the page.
Alternative Installation: Download and unpack the module
The module is in Marketplace format. Therefor, you need to do the following to install it:
Go to your project root and execute the following:
cd /your-project-root
mkdir -p app/code/Wizkunde/WebSSO
cd app/code/Wizkunde/WebSSO
https://bitbucket.org/TeamWizkunde/magento2-websso/wiki/Home
1/8
25-9-2019
TeamWizkunde / Magento2 WebSSO / wiki / Home — Bitbucket
Magento2 WebSSO
tar -zxvf Wizkunde_WebSSO-<version>.tgz
composer require wizkunde/samlbase:~1.2.8
composer require league/oauth2-client:~2.2
Source
Commits
Branches
Pull requests
Pipelines
Deployments
Issues
Wiki
Downloads
Settings
Setup step 2: Install the module
bin/magento setup:upgrade
Setup Step 3: If you were in production mode you have to
execute:
bin/magento setup:di:compile
Setup Step 4: Deploy all the template files to the proper
location:
bin/magento setup:static-content:deploy
https://bitbucket.org/TeamWizkunde/magento2-websso/wiki/Home
2/8
25-9-2019
TeamWizkunde / Magento2 WebSSO / wiki / Home — Bitbucket
Magento2 WebSSO
Source
Commits
Branches
Pull requests
Pipelines
Deployments
Setup Step 5: Make sure all the caches are cleaned
Run: bin/magento cache:clean
Issues
Wiki
Downloads
Settings
Setup step 6: Creating a Identity Provider configuration
setting
In Magento 2 go to Wizkunde -> Servers and click "Add new"
General Information
Name - A friendly name for display purposes
Identifier - A unique identifier, especially useful when you use 2 or more IDP's in your installation
Server Type - Protocol to use to communicate with your Identity Provider
SAML2: Identity Provider Information
https://bitbucket.org/TeamWizkunde/magento2-websso/wiki/Home
3/8
25-9-2019
TeamWizkunde / Magento2 WebSSO / wiki / Home — Bitbucket
Magento2 WebSSO
Source
Commits
Branches
Pull requests
Pipelines
Deployments
Issues
Wiki
Downloads
Settings
NameID - The Name ID of your current Service Provider which is known in the trust relation on
your IDP
Metadata URL - Identity Provider Metadata URL
Is Passive - Can allow authentication methods that do not show the user any input
SSO Binding - The binding needed for the SSO connection
SLO Binding - The binding needed for the SLO connection
Metadata expiration in seconds - We cache the metadata to speed up the site loading process
Sign SP Metadata - Weather to sign the Service Provider metadata or not
Ignore SSO - No session will be stored, if the magento session expires, a IDP login screen
reappears
Certificate Data (CRT): The X.509 Certificate used to communicate with the SAML2 IDP server
(preshared)
Private Key (PEM): The X.509 private key used to communicate with the SAML2 IDP Server
Certificate Passphrase: Optional passphrase to unlock the certificate
SAML2: Certificate Generation
You can since 1.9.0 conveniently generate a X.509 certificate by filling in the form on the bottom of the
page and click "Generate". This will prefill the form fields for you with a unique and secure X.509
certificate.
OAuth2: Identity Provider Information
https://bitbucket.org/TeamWizkunde/magento2-websso/wiki/Home
4/8
25-9-2019
TeamWizkunde / Magento2 WebSSO / wiki / Home — Bitbucket
Magento2 WebSSO
Source
Commits
Branches
Pull requests
Pipelines
Deployments
Issues
Wiki
Downloads
Settings
Server Type - The type of server, plain OAuth2 or OpenID
Scope Permissions - The permissions requested from the user at the Identity Provider
Authorization Endpoint - The endpoint for the OAuth2 request
Token Endpoint - The endpoint to request the tokens from
Userinfo Endpoint - The endpoint to request the user information
Client ID - The ID that has been made in the OAuth2 Identity Provider
Client Secret - The secret matching the client ID made in the Identity Provider
Mappings
External attribute: The attribute as exposed by the Identity Provider.
Transform: The transform applied on mappings
Internal attribute: The attribute known in magento.
Setup step 7: Enabling the IDP in the proper store / website
Go to Stores -> Configuration
In the left bar, find Wizkunde Configuration and click on it.
Select the right scope of your website / store to make sure you enable the IDP where you
want to enable it.
Adjust the settings according to your situation
Configuration: General Settings
https://bitbucket.org/TeamWizkunde/magento2-websso/wiki/Home
5/8
25-9-2019
TeamWizkunde / Magento2 WebSSO / wiki / Home — Bitbucket
Magento2 WebSSO
Source
Commits
Branches
Pull requests
Pipelines
Deployments
Issues
Wiki
Downloads
Settings
Enable SSO in frontend: Enable SSO for your end customers
Enable SSO in backend: Enable SSO for your administrative users
Frontend Server: The server that we're using to connect to the frontend
Backend Server: The server that we're using to connect to the backend
CMS Page for failed login: The page that will be shown when a login cannot be completed
Configuration: Frontend Firewall
Immediate login in frontend: If set to yes, the user will not see the Magento site before logging
in, it will be immediatly redirected to the IDP instead of after clicking on "login". Very useful for
B2B sites that only expose data to registered customers
CMS Whitelist: The pages which are allowed to be shown without logging in
IP Whitelist: The IP's which may access the frontend without facing the SSO login enforcement
Configuration: Audit Logging
https://bitbucket.org/TeamWizkunde/magento2-websso/wiki/Home
6/8
25-9-2019
TeamWizkunde / Magento2 WebSSO / wiki / Home — Bitbucket
Magento2 WebSSO
Source
Commits
Logging: Enable logging for this storeview
Log Severity: Set logging to either log everything or just failed attempts
Setup step 8: Go to the frontend/backend and see if the login
page appears!
Branches
Pull requests
Pipelines
Deployments
Issues
Wiki
Downloads
Settings
Your Service Provider Details
Metadata location FRONTEND
https://<your store>/sso/metadata
https://bitbucket.org/TeamWizkunde/magento2-websso/wiki/Home
7/8
25-9-2019
TeamWizkunde / Magento2 WebSSO / wiki / Home — Bitbucket
Metadata location BACKEND
Magento2 WebSSO
https://<your store>/sso/metadata/backend
All other data is visible in the metadata URL's provided
Source
Commits
Updated 2019-07-09
Branches
Pull requests
Pipelines
Deployments
Issues
Wiki
Downloads
Settings
https://bitbucket.org/TeamWizkunde/magento2-websso/wiki/Home
8/8
Download