Portal
Last updated
Last updated
In this use case, users will use a portal to access application in an organisation. Since Portal act as a SAML Service Provider (SP) you can decide on the SAML IdP side how users should authenticate themselves. In this use case we will use FortifiedID Integrity WEB as the SAML IdP (Identity Provider).
The IdP selector will provide one authenticator:
Username and Password This authenticator is used to show to login using an LDAP account. As LDAP creating this use case we used an Active Directory. For username we use mail attribute on an Active Directory user.
We will use Microsoft Active Directory as user store.
FortifiedID Integrity Web current version
Fortified Portal 2.0 current version
LDAP directory. Location are the users to authenticate. The example code is configured to use an Active Directory. We are using mail attribute of the Active Directory user. Make sure you have two test users, Anna Anderson and Paul Holmgren, created with following LDAP attribute:
Anna Anderson
Anna Anderson (displayName)
annaa (sAMAccountName)
anna.anderson@fortifiedid.se (mail)
aws; citrix; office365; servicenow; slack; vmware; zoom (carlicense) Above are the apps that will be used in the use case. We store the values in the multi-value attribute CarLicense. Make sure you type in lower case.
Set a password
Paul Holmgren
paul Holmgren (displayName)
paulh (sAMAccountName)
paul.holmgren@fortifiedid.se (mail)
Google_Workspace; Office365; Zoom (carlicense) Above are the apps that will be used in the use case. We store the values in the multi-value attribute CarLicense.
Set a password
Server platform. Docker, Windows or Linux. In this use case we have used a Windows server with an Active Directory.
Remember that this use case does not describe installation of the products. Products are expected to be installed in advanced.
Download ZIP containing configuration for Web and Portal
Click USE_CASE_LINK to download customer folders for Web and Portal.
Unzip the downloaded file
Add Integrity WEB configuration to your environment
Add the customer_WEB folder to you \..\fortifiedid\web\ folder. Rename the existing customer folder to customer_ORG and rename the added one to \customer.
Add Portal configuration to your environment.
Add the customer_PORTAL folder to you \..\fortifiedid\portal\ folder. Rename the existing customer folder to customer_ORG and rename the added one to \customer.
The downloaded folders contains all information needed. For example, a test certificate and metadata files are included and configured to work with the example applications. However, some data needs to be changed to map your environment. You need to update the LDAP data to map your environment. Since this example was done on a Windows server you might need to update file paths if you run something else. Also the http ports might need to be changed if they are not available in your environment.
To make it easy both application folders have a file called globals.json that contains the data you need to change. Config.json uses the variables in globals.json.
Open globals.json for \..\fortifiedid\portal\customer\config and \..\fortifiedid\web\customer\config folder and update:
LDAP data to map you environment if needed
File paths
HTTP if needed
When updated, start Integrity WEB and Portal in order described below.
Start Fortified ID WEB service. Wait until service is started before moving on. Verify server.log file that service running without errors.
Start Fortified ID Portal service Verify server.log file that service running without errors.
Open a browser
Browse to http://localhost:8445/portal You should now be redirected to http://localhost:8443/saml/authn/auth01
First log in as Paul Holmgren
In UserID, add paul.holmgren@fortifiedid.se and whatever password you configured then click Sign in.
For Paul Holmgren the result should be:
Second, log in as Anna Anderson
In UserID, add anna.anderson@fortifiedid.se and whatever password you configured then click Sign in.
For Anna Anderson the result should be:
As you can see above the, in this scenario, carLicense attribute will decide what application that are available for the user.
The config.json of Web can be found in the associated zip-file in this use case.