Sign in with SSO is a feature available for customers on Enterprise / Custom Plans.
In order to set up your account for AD FS SSO, please follow these steps:
Note: Different versions of Windows Server and AD FS might differ slightly in their UI
- Open the AD FS console, click "Add Relying Party Trust…" in the Actions pane, choose “Claims aware” and click Start in the wizard.
- Select "Enter data about the relying party manually", click Next.
- Enter Cloudinary as a display name, click Next.
- Select "AD FS profile", click Next.
- You won't need a token encryption cert, click Next.
- Check the box "Enable support for the SAML 2.0 WebSSO protocol",
- Relying party SAML 2.0 SSO service URL box should be https://cloudinary.com/saml/consume - click Next.
- Enter your Cloudinary cloud name (available on https://cloudinary.com/console Dashboard) in the "Relying party trust identifier field", and click Next.
- Configure multi-factor authentication or skip if not required
- Select which users you permit to access Cloudinary, click Next. Please note that Cloudinary does not auto-provision users by default, so users that were not defined in the Cloudinary account will not have access even if you permit all users to access this app.
- Review, click Next, and Close
- Click “Edit Claim Issuance Policy…”
- Choose the Issuance Transform Rules tab and click "Add Rule…".
- Select Send LDAP Attributes as Claims and click Next.
- Enter a Claim rule name, such as Get Attributes, then set the Attribute store to Active Directory, type in E-Mail-Addresses for the first LDAP attribute and set its outgoing type to E-Mail Address. Click Finish when you are done.
- Click Add Rule… on the Issuance Transform Rules tab again.
- Select Transform an Incoming Claim and click Next.
- Enter a Claim rule name, such as Name ID Transform, set Incoming claim type to E-Mail Address, set Outgoing claim type to Name ID, and set Outgoing name ID format to Email. Select Pass through all claim values and click Finish.
- Click OK on the Edit Claim Rules dialog.
- Go to Trust Relationships > Relying Party Trusts and open the Properties dialog for Cloudinary. Select the Advanced tab, then change the secure hash algorithm to SHA-1 and click OK.
- This step is required only when Forms Authentication is not enabled. Note that enabling Forms Authentication will apply to all sites configured.
- Go to Authentication Policies and click Edit under Primary Authentication Global Settings.
- Under Intranet, check Forms Authentication and click OK. Alternatively, you can use forms as a fallback authentication method for Intranet using the following PowerShell command:
Set-AdfsGlobalAuthenticationPolicy -PrimaryIntranetAuthenticationProvider @('WindowsAuthentication','FormsAuthentication'
)
- Obtain your metadata URL. On the screen that appears, under the 'Sign On' tab, there should be a link 'Identity Provider Metadata'. Copy that link (it should look like:
https://sts.<your domain>/federationmetadata/2007-06/FederationMetadata.xml
). - Log in to your Cloudinary account and under the Users tab in the Settings page (https://cloudinary.com/console/settings/users) you can paste in the metadata URL and save your changes.
- Must have user role Master Admin to see this option. If you do not have this role, please contact one of the master admin's in the account to add it for you.
Good luck!
Comments
0 comments
Please sign in to leave a comment.