summaryrefslogtreecommitdiff
path: root/docs/content/guides/auth/saml-onelogin.md
blob: cbf31b735e760ce5a50ddef35185864ea95c743a (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
# Authentication guide - SAML (OneLogin)

**Note:** *This guide was written before the renaming. Just replace `HackMD` with `HedgeDoc` in your mind 😃 thanks!*

1. Sign-in or sign-up for an OneLogin account. (available free trial for 2 weeks)

2. Go to the administration page.

3. Select the **APPS** menu and click on the **Add Apps**.  
   ![onelogin-add-app](../../images/auth/onelogin-add-app.png)

4. Find "SAML Test Connector (SP)" for template of settings and select it.  
   ![onelogin-select-template](../../images/auth/onelogin-select-template.png)

5. Edit display name and icons for OneLogin dashboard as you want, and click **SAVE**.  
   ![onelogin-edit-app-name](../../images/auth/onelogin-edit-app-name.png)

6. After that other tabs will appear, click the **Configuration**, and fill out the below items, and click **SAVE**.
  - RelayState: The base URL of your HedgeDoc, which is issuer. (last slash is not needed)

  - ACS (Consumer) URL Validator: The callback URL of your HedgeDoc. (serverurl + /auth/saml/callback)

  - ACS (Consumer) URL: same as above.

  - Login URL: login URL(SAML requester) of your CopiMD. (serverurl + /auth/saml)  
    ![onelogin-edit-sp-metadata](../../images/auth/onelogin-edit-sp-metadata.png)

7. The registration is completed. Next, click **SSO** and copy or download the items below.
  - X.509 Certificate: Click **View Details** and **DOWNLOAD** or copy the content of certificate ....(A)

  - SAML 2.0 Endpoint (HTTP): Copy the URL ....(B)  
    ![onelogin-copy-idp-metadata](../../images/auth/onelogin-copy-idp-metadata.png)

8. In your HedgeDoc server, create IdP certificate file from (A)
9. Add the IdP URL (B) and the Idp certificate file path to your config.json file or pass them as environment variables.
  - `config.json`:
    ```json
    {
      "production": {
        "saml": {
          "idpSsoUrl": "https://*******.onelogin.com/trust/saml2/http-post/sso/******",
          "idpCert": "/path/to/idp_cert.pem"
        }
      }
    }
    ```

    - environment variables
      ```shell
      CMD_SAML_IDPSSOURL=https://*******.onelogin.com/trust/saml2/http-post/sso/******
      CMD_SAML_IDPCERT=/path/to/idp_cert.pem
      ```

10. Try sign-in with SAML from your HedgeDoc sign-in button or OneLogin dashboard (like the screenshot below).  
   ![onelogin-use-dashboard](../../images/auth/onelogin-use-dashboard.png)