This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
docpublic:systemes:shibboleth:docusign [2021/01/28 14:57] procacci@tem-tsp.eu [Mapped Attributes] |
docpublic:systemes:shibboleth:docusign [2023/10/24 14:46] (current) adminjp [shib IDP attribute-resolver] |
||
---|---|---|---|
Line 38: | Line 38: | ||
{{: | {{: | ||
- | We also set thet we use signe AuthN an use Post Method . | + | We also set that we use signed |
==== DocuSign SP Metadata ==== | ==== DocuSign SP Metadata ==== | ||
Line 60: | Line 60: | ||
=== SP metadata certificate === | === SP metadata certificate === | ||
- | the ducosing | + | the DocuSign |
get certificate from SP metadata element X509Certificate : | get certificate from SP metadata element X509Certificate : | ||
Line 229: | Line 229: | ||
===== shib IDP attribute-resolver ===== | ===== shib IDP attribute-resolver ===== | ||
- | In the IDP we use the **attribute-resolver-ldap.xml** file to define our customized for DocuSign for NameID mail attribute and permission (employeeType) | + | In the IDP we use the **attribute-resolver-ldap.xml** |
< | < | ||
[root@idptest conf]# grep attribute-resolver-ldap.xml services.xml | [root@idptest conf]# grep attribute-resolver-ldap.xml services.xml | ||
< | < | ||
- | </ | + | </ |
+ | |||
+ | ==== mapped attributes ==== | ||
+ | |||
+ | in order to map DocuSign domains ID to our mail domains we need to map values | ||
+ | |||
+ | attribute-resolver.xml mapped employeType | ||
+ | |||
+ | < | ||
+ | < | ||
+ | |||
+ | < | ||
+ | < | ||
+ | <!-- Values Prod --> | ||
+ | < | ||
+ | < | ||
+ | < | ||
+ | </ | ||
+ | < | ||
+ | < | ||
+ | < | ||
+ | </ | ||
+ | ... | ||
+ | < | ||
+ | < | ||
+ | < | ||
+ | </ | ||
+ | |||
+ | </ | ||
+ | |||
+ | </ | ||
+ | |||
+ | idem for staticDSAccountID | ||
+ | |||
+ | < | ||
+ | < | ||
+ | < | ||
+ | < | ||
+ | name=" | ||
+ | < | ||
+ | <!-- Values DocuSign Prod --> | ||
+ | <!-- < | ||
+ | < | ||
+ | < | ||
+ | </ | ||
+ | < | ||
+ | < | ||
+ | < | ||
+ | </ | ||
+ | < | ||
+ | < | ||
+ | < | ||
+ | </ | ||
+ | ... | ||
+ | < | ||
+ | < | ||
+ | < | ||
+ | </ | ||
+ | </ | ||
+ | </ | ||
==== Mail rewriting ==== | ==== Mail rewriting ==== | ||
Line 261: | Line 320: | ||
</ | </ | ||
</ | </ | ||
+ | </ | ||
when a user connect with it's email address of givenName.Surname@**domain2**.eu , it is finally transmited to DocuSign SP as givenName.Surname@**domain1**.eu . | when a user connect with it's email address of givenName.Surname@**domain2**.eu , it is finally transmited to DocuSign SP as givenName.Surname@**domain1**.eu . | ||
+ | ==== Permission map ==== | ||
+ | We also used a mapped attribute definition in oder to match Roles/ | ||
+ | |||
+ | < | ||
+ | < | ||
+ | |||
+ | < | ||
+ | < | ||
+ | < | ||
+ | < | ||
+ | < | ||
+ | </ | ||
+ | < | ||
+ | < | ||
+ | < | ||
+ | </ | ||
+ | < | ||
+ | < | ||
+ | < | ||
+ | </ | ||
+ | </ | ||
+ | </ | ||
+ | |||
+ | ==== static AttributeDefinition for AccountID ==== | ||
+ | |||
+ | DocuSign support told us also to send a static value for the accoundID so that automatic profile affectation could be done | ||
+ | |||
+ | we can get our API account ID from the E-Signature parameter screen , left menu => API-Keys | ||
+ | |||
+ | {{: | ||
+ | |||
+ | then we need our IDP to map and send that static value for everyone, so we creted a staticDataconnector and the associated decated static AttributeDefinition for thos DocuSign authZ feature with the creation of a custom staticDSAccountID attribute : | ||
+ | |||
+ | references : | ||
+ | |||
+ | * https:// | ||
+ | * https:// | ||
+ | |||
+ | in conf/ | ||
+ | |||
+ | < | ||
+ | |||
+ | < | ||
+ | |||
+ | < | ||
+ | < | ||
+ | < | ||
+ | name=" | ||
+ | </ | ||
+ | |||
+ | < | ||
+ | < | ||
+ | < | ||
+ | </ | ||
+ | </ | ||
+ | </ | ||
+ | </ | ||
+ | |||
+ | ==== Special case when unsing NAT ( checkAddress=" | ||
+ | |||
+ | clients in specific site which don't have many public IPs addresses use NAT , and it breaks the flow of using a proxied IDP | ||
+ | In that case we must disable " | ||
+ | |||
+ | Analagous to the SP, there' | ||
+ | |||
+ | https:// | ||
+ | |||
+ | |||
+ | from examples in the doc: | ||
+ | * https:// | ||
+ | I understand that I can specify the checkAddress attribute only for those "2nd Hand/ | ||
+ | < | ||
+ | < | ||
+ | < | ||
+ | < | ||
+ | < | ||
+ | < | ||
+ | < | ||
+ | < | ||
+ | </ | ||
+ | </ | ||
+ | < | ||
+ | < | ||
+ | <bean parent=" | ||
+ | </ | ||
+ | </ |