Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Please ensure that you have gathered all the requirements needed for this section. If not, please visit the requirements documentation.

Only when all requirements have been met, you'll be able to enable AAD login for Digizuite products.

Configuration in the web.config (optional)

There are three login modes for your products: One where you can only log in with SSO (value="sso"), one where you can only log in using normal login - i.e. disable SSO (value="normal"), and lastly, one where both login modes are enabled simultaneously (value="mixed").

By default, your site is set up to be "mixed", to ensure that both modes are enabled out of the box.

You may, however, choose to change this value, to either disable SSO or to have it be solely SSO.

To do this, please access your DC's web.config file, and navigate to Confuguration → appSettings and change the value in the node with the key named "LoginMode" (See the image below.)

Configuration via the MM

To configure AAD on the Digizuite side, open Media Manager and go into General settings → SSO

Once that page loads, select WsFederation in the drop-down. When pressed, some new fields will be loaded in the UI. They are as follows:

Template member ID (Optional)

If not set (i.e. set to 0), the user will be created with the default rights given to new users. (Usually the group "Trusted" is applied)

The ID can be found in the DAM Center in its "user" menu.

Insert the ID of a user you want SSO users to look like when they log in the first time. Please be aware that the new SSO users will get the default groups (Trusted by default, as mentioned before) in addition to the groups and roles they get from the template user

Group sync level

Check the tool-tips in MM for specifications about what the individual levels does. 

Name

Next give the configuration a "name". This name is arbitrary and does not matter for usage, it's just for internal reference. 

Metadata address

Next provide the "Metadata address" for the ADFS server.

It'll most likely look something like this: "https://login.microsoftonline.com/6e80d0d2-c049-4101-ad8d-8fd678b61299/federationmetadata/2007-06/federationmetadata.xml"
(The guid in the link is the "Directory (tenant) ID" of the app registration)

App ID

Provide the "App ID".

It'll probably look something like this: "api://0619b1d1-f2b9-4a72-8052-8772847f870f" 


Lastly, save and press "activate".

When you see the page saying Latest is active, AAD is good to go.

Table of Contents