summaryrefslogtreecommitdiff
path: root/docs/content/guides/auth/saml.md
blob: 9cc1f8ba3bb005b84d9bd1c404aba8b5db12314a (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
# Authentication guide - SAML

*Note:* This guide was written before the renaming. Just replace `HackMD` with `HedgeDoc` in your mind 😃 thanks!

The basic procedure is the same as the case of OneLogin which is mentioned in [OneLogin-Guide](./saml-onelogin.md). If
you want to match your IdP, you can use more configurations as below.

- If your IdP accepts metadata XML of the service provider to ease configuration, use this url to download metadata XML:
  `{{your-serverurl}}/auth/saml/metadata`  
  *Note:* If not accessible from IdP, download to local once and upload to IdP.

- Change the value of `issuer`, `identifierFormat` to match your IdP.
  - `issuer`: A unique id to identify the application to the IdP, which is the base URL of your HedgeDoc as default

  - `identifierFormat`: A format of unique id to identify the user of IdP, which is the format based on email address as
    default. It is recommend that you use as below.
    - urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress (default)
    - urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified

  - `config.json`:
    ```javascript
    {
      "production": {
        "saml": {
          /* omitted */
          "issuer": "myhedgedoc"
          "identifierFormat": "urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified"
        }
      }
    }
    ```

  - environment variables
    ```shell
    CMD_SAML_ISSUER=myhedgedoc
    CMD_SAML_IDENTIFIERFORMAT=urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified
    ```

- Change mapping of attribute names to customize the displaying user name and email address to match your IdP.
  - `attribute`: A dictionary to map attribute names

  - `attribute.id`: A primary key of user table for your HedgeDoc

  - `attribute.username`: Attribute name of displaying user name on HedgeDoc

  - `attribute.email`: Attribute name of email address, which will be also used for Gravatar
    - *Note:* Default value of all attributes is NameID of SAML response, which is email address if `identifierFormat`
      is default.

  - `config.json`:
    ```json
    {
      "production": {
        "saml": {
          /* omitted */
          "attribute": {
            "id": "sAMAccountName",
            "username": "displayName",
            "email": "mail"
          }
        }
      }
    }
    ```

  - environment variables
    ```shell
    CMD_SAML_ATTRIBUTE_ID=sAMAccountName
    CMD_SAML_ATTRIBUTE_USERNAME=nickName
    CMD_SAML_ATTRIBUTE_EMAIL=mail
    ```

- If you want to control permission by group membership, add group attribute name and required group (allowed) or
  external group (not allowed).
  - `groupAttribute`: An attribute name of group membership

  - `requiredGroups`: Group names array for allowed access to HedgeDoc. Use vertical bar to separate for environment
    variables.

  - `externalGroups`: Group names array for not allowed access to HedgeDoc. Use vertical bar to separate for environment
    variables.
    - *Note:* Evaluates `externalGroups` first

  - `config.json`:
    ```json
    {
      "production": {
        "saml": {
          /* omitted */
          "groupAttribute": "memberOf",
          "requiredGroups": [ "hedgedoc-users", "board-members" ],
          "externalGroups": [ "temporary-staff" ]
        }
      }
    }
    ```

  - environment variables
    ```shell
    CMD_SAML_GROUPATTRIBUTE=memberOf
    CMD_SAML_REQUIREDGROUPS=hedgedoc-users|board-members
    CMD_SAML_EXTERNALGROUPS=temporary-staff
    ```