Sign-in with SSO is a feature available for customers on Enterprise / Custom Plans.
In order to set up your account for AD FS SSO, please follow these steps:
Note: Different versions of Windows Server and AD FS might differ slightly in their UI
- Open the AD FS console, click
Add Relying Party Trust…
in the Actions pane, chooseClaims aware
and clickStart
in the wizard. - Select
Enter data about the relying party manually
and clickNext
. - Enter
Cloudinary
as adisplay name
and clickNext
. - Select
AD FS profile
and clickNext
. - Since you won't need a token encryption cert, click
Next
. - Check the box
Enable support for the SAML 2.0 WebSSO protocol
-
Set
Relying party SAML 2.0 SSO service URL
to https://cloudinary.com/saml/consume - and clickNext
. - Enter your Cloudinary
cloud name
(available in your account dashboard) in theRelying party trust identifier field
and clickNext
. - Configure multi-factor authentication or skip if not required
- Select which users you permit to access Cloudinary and click
Next
. Please note that Cloudinary does not auto-provision users by default, so users that were not defined in the Cloudinary account will not have access even if you permit all users to access this app. - Review, click
Next
, and Close - Click
Edit Claim Issuance Policy…
- Choose the Issuance Transform Rules tab and click
Add Rule…
. - Select
Send LDAP Attributes as Claims
and clickNext
. -
Enter a
Claim rule name
, such asGet Attributes
, and set the following settings:-
Attribute store
toActive Directory
E-Mail-Addresses
for the firstLDAP attribute
and set itsoutgoing typ
toE-Mail Address
.- Click
Finish
.
-
- Click
Add Rule…
on the Issuance Transform Rules tab again. - Select
Transform an Incoming Claim
and clickNext
. -
Enter a
Claim rule name
, such asName ID Transform
, and set the following settings:-
Incoming claim type
toE-Mail Address
, -
Outgoing claim type
toName ID
, -
Outgoing name ID format
toEmail
. - Select
Pass through all claim values
and clickFinish
.
-
- Click
OK
on the Edit Claim Rules dialog. - Go to Trust Relationships > Relying Party Trusts and open the Properties dialog for Cloudinary. Select the
Advanced
tab, then change thesecure hash algorithm
toSHA-1
and clickOK
. -
This step is required only when
Forms Authentication
is not enabled. Note that enablingForms Authentication
will apply to all sites configured.- Go to Authentication Policies and click
Edit under Primary Authentication Global Settings
. -
Under Intranet, check
Forms Authentication
and clickOK
. Alternatively, you can use forms as a fallback authentication method for Intranet using the following PowerShell command:
Set-AdfsGlobalAuthenticationPolicy -PrimaryIntranetAuthenticationProvider @('WindowsAuthentication','FormsAuthentication')
- Go to Authentication Policies and click
- On the screen that appears, under the Sign On tab, there should be a link
Identity Provider Metadata
with the following format:https://sts.<your domain>/federationmetadata/2007-06/FederationMetadata.xml
- Log in to your Cloudinary account with a Master Admin user (If you do not have this role, please contact one of the master admin's in the account to add it for you.) and navigate to the Users Tab of your Settings area, paste in the metadata URL above, and save your changes.
Comments
0 comments
Please sign in to leave a comment.