This guide will show how to configure Dataedo to work with a SAML identity provider. For this article, we'll be using Azure AD as the IdP, but similar steps can be taken for other providers too.
Initial configuration in Azure Portal (SAML provider)
Open Azure Portal and go to Enterprise Applications. Choose the New application option:
In the next window, choose the Create your own application option:
In the newly opened tab type in the application name for your internal use (I chose "Dataedo Web") and click Create.
After a moment, you should see your new application screen. In the Getting started section, choose Assign users and groups.
Now, use the Add user/group option to add user.
In the menu to the left, chooose Single Sign-on, then from the options to the right choose SAML.
Click Edit in the Basic SAML Configuration section.
You should see a new tab, looking like this:
In the Identifier field, paste the address Dataedo Web will be accessed with from your organization. Note that only HTTPS addresses are allowed.
In the Reply URL section, type in the address your Dataedo Web will be accessed on followed by /api/api/auth/assertion-consumer (for example https://your-Dataedo-Web.address/api/api/auth/assertion-consumer).
Click Save. The tab should now look like this:
Back in the Set up Single Sign-On with SAML tab on the left, find the SAML Signing Certificate section.
Copy the adress marked as App Federation Metadata Url - you will need it later.
Configuring SAML in Dataedo Web settings file
Find the installation path of Dataedo Web (default address is: *C:\Dataedo Web*), then go to Applications\API\ subfolder.
Right click and edit the appsettings.json file, and find the Saml2 section:
"Saml2": {
"IdPMetadata": "",
"Issuer": "",
"SignatureAlgorithm": "http://www.w3.org/2001/04/xmldsig-more#rsa-sha256",
"CertificateValidationMode": "ChainTrust",
"RevocationMode": "NoCheck"
},
Paste the App Federation Metadata Url link in the IdPMetadata field (alternatively, paste in the path for the metadata xml file).
In the Issuer field, paste the address specified before in the Identifier field in Azure (you can check it in Basic SAML Configuration > Identifier field in the application details in Azure Portal).
If required, correct the signature algorithm if you don’t use the default RSA_SHA256 algorithm - for example, for RSA_SHA1 the field should have the http://www.w3.org/2001/04/xmldsig-more#rsa-sha1 value.
Find the Saml2Client section:
"Saml2Client": {
"DisplayName": "",
"ClientUrl": "http://192.168.0.21:80"
},
Fill the DisplayName field – this will be the name shown when logging in to Dataedo for the Identity Provider.
Make sure the ClientUrl field correctly leads to your Dataedo Web address.
After changes, the edited parts should look like this:
"Saml2": {
"IdPMetadata": "https://login.microsoftonline.com/b411bcba-01b1-4de5-9fa1-45272da91a0c/federationmetadata/2007-06/federationmetadata.xml?appid=db0e60a2-0f7b-4a61-939a-56fbae2d8b8c",
"Issuer": "https://127.0.0.1:4435",
"SignatureAlgorithm": "http://www.w3.org/2001/04/xmldsig-more#rsa-sha256",
"CertificateValidationMode": "ChainTrust",
"RevocationMode": "NoCheck"
},
"Saml2Client": {
"DisplayName": "Azure AD SAML",
"ClientUrl": "https://127.0.0.1:4435"
},
Go to IIS Manager, and restart the Dataedo Web app for changes to take effect.
The next time you open Dataedo Web, you should have an option to login with Azure AD:
Clicking it will either take you to the Azure login page or if you’re already logged in, directly to your Dataedo Web page.