Authentication with ADFS4 using OAuth 2.0

<< Click to Display Table of Contents >>

Navigation:  Low-code Process Automation > Studio Cloud - Authoring environment > Bizagi Studio > Security definition > Work Portal Security > Work Portal Authentication > OAuth authentication >

Authentication with ADFS4 using OAuth 2.0

Overview

Bizagi supports ADFS4 as an identity provider using the OAuth 2.0 protocol.  This section explains step-by-step how to configure an ADFS server as an Identity Manager server with Bizagi.

 

 

ADFS4 Configuration

1.1 Open the ADFS Management Wizard. Right-click Application Groups and click Add Application Group.

ADFS4_1

 

1.2 Register the application name and select Server application in the Standalone section. Then click next.

 

ADFS4_2

 

1.3 Save the Client Identifier where the administrator can access it securely. Additionally, add the Redirect and Post-logout with the following format:

 

Redirect: https://[environment]-[project]-[company].bizagi.com/oauth2/client/callback

Post logout: https://[environment]-[project]-[company].bizagi.com/post-logout.html

 

ADFS4_3

 

Then click next.

 

1.4 Select the Generate a shared secret and Copy to clipboard the secret generated. Save it in a place where the administrator can get it securely.

 

ADFS4_4

Then click next twice after you close the configuration wizard.

1.5 In the ADFS Management wizard right-click the created application group and open its properties.

 

ADFS4_5

 

 

1.6 Add an application.

 

ADFS4_6

1.7 Select the Web API template:

 

ADFS4_7

1.7 In the Identifier field paste the Client identifier saved in step 1.3 of this section.

 

ADFS4_8

 

1.8 Select the Permit everyone access control policy.

 

ADFS4_9

 

1.9 Allow the OpenId permitted scope:

 

ADFS4_10

 

Finally, click next twice after you close the Application configuration wizard.

1.10 In the application properties, edit the Web API.

 

ADFS4_11

 

1.11 Add a new Issuance Transform Rule.

 

ADFS4_12

 

1.12 Select Send LDAP Attributes as Claims in the Claim rule template drop-down list.

 

ADFS4_13

 

1.13Now you need to map the attributes from the Active Directory considered as keys when Bizagi validates users' credentials against the Identity Provider. First register a rule name, select Active Directory in the Attribute drop-down list.

 

ADFS4_14

 

Map the following LDAP attributes:

 

LDAP Attribute

Outgoing Claim Type

E-Mail Addresses

E-Mail Address

User-Principal-name

UPN

 

Configure ADFS4 in Bizagi

In the Expert view, open the Security module, and select the Authentication nod. On the first drop-down list select OAuth 2.0. In the Second drop-down list, select ADFS4. Finally, select authorization_code on the last drop-down list.

 

ADFS4_15

 

You can also set or change these parameters from the Management Console.

 

ADFS4_15_MC

 

note_pin

In the management console, before modifying the authentication configurations, it is necessary to set the environment status as Maintenance from the maintenance window.

After doing the desired modifications, remember to restart the environment to reflect the changes.

 

Then configure the following attributes:

 

Parameter

Description

ADFS Identity Provider URL Server

Defines the Bizagi server URL, for that Server authenticating users. This value is set as https://[adfs4].com

Bizagi Server URL

Add the URL of the Bizagi Work Portal.

Client ID

Holds the client id as generated in step 1.3

Client Secret

Holds the client secret as generated in step 1.4

Cookie type

Persistent cookie: This cookies remains in your computer until they are removed (logging off) or expires. The remaining time of a cookie depends on how much time you have set in the waiting time for inactive sessions.

 

Session cookie: These cookies are temporary and they are removed when you close your browser

Idle sessions time-out

Defines the time (in minutes) after a session expires

Redirect to a logoff after logoff process

By default, when logging off, Bizagi redirects to the log in page. Change this value if you want to change this behavior.

Redirect URI

Defines the callback URI after successful authentication.

Show detailed authentication error messages

For security reasons, the authentication error causes does not appear in the Work portal.


Last Updated 3/9/2023 4:30:20 PM