The following steps assume that you have an account with a supported identity provider. You need to know the SAML Login URL and have the x.509 certificate supplied by your identity provider. You should also be familiar with the format of the SAML identity response from your SAML provider.
Enabling SAML authentication
As a user with administrator privileges, go to Settings > Authentication Provider.
On the SAML tab, check Enable Single Sign-On
(make sure that $conf['auth_remote'] in the file admin/config.inc.php is set to1)
Select an Authentication Mode, which defaults to Only SAML Authentication allowed. The available options are:
Both built-in and SAML Authentication allowed - User will be able to log in to KBPublisher using SSO and/or built-in authentication.
Only SAML Authentication allowed - User can only log in using SSO.
Only SAML Authentication allowed, try auto authentication - User can only log in using SSO and, if possible, auto-authentication on the SAML server will be applied.
Enter the following SAML Configuration settings:
Name - The name for your SSO provider, to be presented on the login page.
Issuer - Unique identifier for your Identity Provider (typically a URL). In some cases, this is called the Entity ID.
Single Sign-On Service Url - The SAML Login URL where the Controller will route Service Provider (SP)-initiated login requests. This is required.
Single Logout Service Url - The URL where the Controller will redirect users after they log out. If you do not specify a logout URL, users will get the KBPublisher login screen when they log out.
Single Sign-On Service Binding and Single Logout Service Binding - You can change the binding for login and logout URLs. Defaults to HTTP-Redirect. The other option is HTTP-POST.
Public X.509 Certificate - The x.509 certificate from your identity provider configuration.
In the SAML User Mapping Fields settings, specify how SAML-authenticated users are identified in the KBPublisher Controller:
Remote User Id - Unique identifier for the user in the SAML response. This value is responsible to identify user in authentication requests. It defaults to the SAML NameID element.
First Name - The first name for the user corresponding to the KBPublisher First Name field. Given the sample response, this value would be User.firstName.
Last name - The last name for the user corresponding to the KBPublisher Last Name field. Given the sample response, this value would be User.lastName.
Email - The user's email address, corresponding to KBPublisher email field. The value must be unique among all SAML users. Given the sample response, this value would be User.email.
Username - This value corresponds to the KBPublisher username field. The value must be unique among all SAML users. Given the sample response below, the value for this setting would be User.email.
To map SAML group attributes to KBPublisher privileges and roles, configure the SAML attribute for Privileges and SAML attribute for Roles settings. The settings you use depends on the structure of the SAML group attribute in the response.
Note: You can skip this step. If you leave these settings empty they will never be rewritten on user login. You can assign required privileges and/or roles later in KBPublisher.
Click the ellipsis button in the SAML attribute for Privileges field to open the Group-to-Privilege Mapping dialog box.
Enter the SAML group attribute name, the SAML group attribute value,and choose a KBPublisher privilege to map to. In the sample response provided below, we map group User.group with value Editor.
When you have added all mapping rules, click Done.
Attention: If you map SAML groups to KBPublisher privileges, all matched users will be assigned the specified privilege. If you do not have an Unlimited license and the number of allowed staff users is exceeded, the privilege will not be assigned to the user.
Use the same steps to map SAML attribute for Roles.
Set up Service Provider values.
Metadata - Use this information to register the Knowledgebase with your identity provider.
Public X.509 Certificate - If your identity provider requires signing and/or encryption, copy the contents of your certificate and paste it here.
Private Key - If your identity provider requires signing and/or encryption, copy the contents of your private key and paste it here.
Signing algorithm - Select a signing method for all SAML requests.
Rewrite user on login - This is the time, in seconds, to rewrite user data on login. Enter 0 to disable updates to user data on login. Enter 1 to rewrite user data on every authentication request.
User account info - This field indicates whether or not the user is able to update his account info. Available options include:
0 - OFF, user can't update his account info
1 - ON, user can update his account info
2 - AUTO, depends on other remote settings
[Important] Note about Remote User ID mapping when switching authentication
If you are switching between LDAP and SAML authentication, make sure that the Remote User ID mapping value remains the same. If it differs, a new user will be created in KBPublisher.
For example: Using LDAP authentication and mapping Remote User ID to "uid", User A is "user-a". If there's a switch to SAML authentication, the Remote User ID should be the same for this user. By default, SAML uses the NameID attribute. Therefore, NameID for this user should be "user-a".
Another option is to reset this field in the database. If this field is reset, you do not need to retain an identical value for Remote User ID. Instead, users will be identified by their email address, so you must have the same email for the user. To reset the field, run the below SQL: