Citrix ShareFile integration with Active Directory

We will be able to integrate Citrix ShareFile Enterprise accounts with our Active Directory users to allow Single Sign-on and validate the login of users with their DA credentials, so obviously our dear users will not have to remember two different passwords!

 

ShareFileSAML

In this image we can see how the process of connecting a client to the ShareFile environment is, where the logon is requested on Citrix servers and redirected to our datacenter, after authentication, we will be able to transfer files against Citrix servers or those of our datacenter if you have deployed previously a StorageZone Controller.

Since ShareFile uses SAML (Security Assertion Markup Language) for the SSO, we will configure ShareFile to communicate with our Microsoft Active Directory Federation Services (ADFS) that provide this single sign-on access. And users when they are validated in the ShareFile portal, user login requests will be securely redirected to AD.

User accounts in ShareFile require a name ID in email format, we must have a correct email address configured as the UPN (User Principal Name) of the user or alternatively the 'Email address' attribute’ of the user.

We will need to create an A record in our public domain (adfs.domain.eso) which we will redirect to this ADFS server (we can use a proxy in the DMZ to further secure accesses). We will also need a certificate already installed on the server for the site, we may have problems with Wilcards if the subdomain does not appear in the certificate.

 

citrix-sharefile-enterprise-50-bujarra

We'll start by deploying a Federation Services server on our network, is added using the 'Add Roles and Features Wizard'’ > 'AD FS’ > 'Federation Service'.

 

Citrix-ShareFile-Enterprise-51-Bujarra

Once installed, open the AD FS console and select “Configure the AD FS Federation Server Wizard”,

 

citrix-sharefile-enterprise-52-bujarra

As the first federation server is the first one we will select “Create a new federation service”,

 

citrix-sharefile-enterprise-53-bujarra

We will be able to create an independent server or a federation server farm that will allow us to have high availability in this critical service.

 

Citrix-ShareFile-Enterprise-54-Bujarra

Select the name of the federation service and the SSL certificate that we will use to encrypt the traffic,

 

citrix-sharefile-enterprise-55-bujarra

We will select the service account that we will use with ADFS,

 

Citrix-ShareFile-Enterprise-56-Bujarra

Click on “Following” to apply the settings on this first server,

 

Citrix-ShareFile-Enterprise-57-Bujarra

… we wait while the settings are applied…

 

Citrix-ShareFile-Enterprise-58-Bujarra

List, Once the settings have been applied, “Close”.

 

Citrix-ShareFile-Enterprise-59-Bujarra

We will need to create a rule for user trust in the AD FS system, since “Relationships of trust” > “Trusted user truthfulness” > “Add trusted user truthfulness…”

 

citrix-sharefile-enterprise-60-bujarra

A configuration wizard will open, “Initiate”,

 

citrix-sharefile-enterprise-61-bujarra

Select “Manually enter data about the relying party”,

 

Citrix-ShareFile-Enterprise-62-Bujarra

In the name to be displayed, we will identify the ShareFile site as a reference, for example, “Following”,

 

citrix-sharefile-enterprise-63-bujarra

Select “AD FS Profile” as it uses the SAML protocol 2.0, “Following”,

 

citrix-sharefile-enterprise-64-bujarra

We do not select any certificates for token encryption, “Following”,

 

citrix-sharefile-enterprise-65-bujarra

In the ShareFile admin panel, in “Configure Single Sign-On” we will have to copy the URL of Assertion Consumer Service (ACS), then we will return to this management console to enable SSO / SAML.

 

Citrix-Sharefile-Enterprise-66-Bujarra

Continuing with the Truthfulness Wizard, we must mark “Enable SAML Protocol Support 2.0 Web SSO” and the SAML SSO Service URL 2.0 of the relying party we will paste the URL copied in the previous step.

 

citrix-sharefile-enterprise-67-bujarra

We filter for the relying party to come only from the ShareFile portal by adding the ID string with the Sharefile site, with the format: 'dominio.sharefile.com’ & “Add” & “Following”,

 

Citrix-ShareFile-Enterprise-68-Bujarra

Mark “Allow all users to have access to this trusted user” & “Following”,

 

Citrix-ShareFile-Enterprise-69-Bujarra

We check that everything is correct in this summary & “Following” To apply the settings.

 

citrix-sharefile-enterprise-70-bujarra

Click on “Open the Edit Notification Rules dialog box for this relying party veracity when the wizard is closed”

 

Citrix-ShareFile-Enterprise-71-Bujarra

We must indicate to the AD FS what type of growths we will present, Click on “Add Rule…”

 

Citrix-ShareFile-Enterprise-72-Bujarra

We select the template “Send LDAP attributes as notifications” & “Following”,

 

citrix-sharefile-enterprise-73-bujarra

We give the notification rule a name, select the Attribute Store as 'Active Directory', select the LDAP 'E-Mail-Addresses' Attribute’ and under Notification type we will indicate 'Email address'. “End”

 

Citrix-ShareFile-Enterprise-74-Bujarra

Added an additional rule to transform the claim, Click again on “Add Rule…”

 

citrix-sharefile-enterprise-75-bujarra

We select as a template “Transform an incoming notification” & “Following”,

 

Citrix-ShareFile-Enterprise-76-Bujarra

We give the notification rule a name, we select as Incoming Notification Type 'Email Address', as Outgoing Claim Type 'Id. by name’ and as id format. outgoing name 'Email'. “End”,

 

Citrix-ShareFile-Enterprise-77-Bujarra

“Accept”,

 

Citrix-ShareFile-Enterprise-78-Bujarra

GOOD, in the AD FS console we must enter the properties of the newly created Trusted User Veracity.

 

Citrix-ShareFile-Enterprise-79-Bujarra

We will mark as Secure Hashing Algorithm 'SHA-1’ & “Accept”,

 

citrix-sharefile-enterprise-80-bujarra

We navigate in the console to “Service” > “Certificates” and on the Token Signing certificate click “View certificate…” to copy it and then import it into the ShareFile admin portal.

 

Citrix-ShareFile-Enterprise-81-Bujarra

Click on “Details” > “Copy to file…”

 

citrix-sharefile-enterprise-82-bujarra

We will export the certificate in X.509 coded base 64 (.CER)

 

Citrix-ShareFile-Enterprise-83-Bujarra

Open the file with a Notepad and copy the certificate,

 

Citrix-ShareFile-Enterprise-84-Bujarra

We log in to the ShareFile instance as an administrator, Select the “Admin”, Select the left menu “Configure Single Sign-On” and enable SAML by checking 'Enable SAML'.

In 'ShareFile Issuer' / Entity ID’ we will enter our domain registered in ShareFile in the format 'dominio.sharefile.com’
In 'Your IDP Issuer / Entity ID’ We'll enter 'https://dominio.sharefile.com/saml/info'In X.509 Certificate click on “Change” and…

 

citrix-sharefile-enterprise-85-bujarra

… We will paste the previously copied certificate! & “Save”,

 

Citrix-ShareFile-Enterprise-86-Bujarra

We finalize the configuration, with:

Login URL 'https://adfs.dominio.com/adfs/ls/’
Logout URL 'https://adfs.dominio.com/adfs/ls/?wa=wsignout1.0’
We verify that in SP-Initiated SSO certificate we have 'HTTP Redirect with no signature’ and that SP-Initiated Auth Context is a 'Integrated Windows Authentication'’

And we keep with “Save”!!!

 

User Management,

We will need the ShareFile User Management Tool to synchronize our AD users with our ShareFile users.

citrix-sharefile-enterprise-87-bujarra

We will download the installer from the MyCitrix, We start the wizard & “Next”,

 

Citrix-ShareFile-Enterprise-88-Bujarra

“Next”,

 

Citrix-ShareFile-Enterprise-89-Bujarra

… Wait a few seconds…

 

Citrix-ShareFile-Enterprise-90-Bujarra

“Close”.

 

Citrix-ShareFile-Enterprise-91-Bujarra

We open the User Management Tool console, we connect to our site with our Admin credentials & “Log on”,

 

citrix-sharefile-enterprise-92-bujarra

In Domain we will have to enter the local domain and administrator credentials to be able to manage the users, “Connect”,

 

citrix-sharefile-enterprise-93-bujarra

Let's go to the tab “Users”, and we explore the organizational unit where we have the users we want to add and select them. Then click on “Add Rute”,

citrix-sharefile-enterprise-94-bujarra

We mark the first two checks in addition to indicating that the authentication method is 'AD-Integrated’ and the 'Storage Zone'’ is the site of our data center where our data resides.

 

citrix-sharefile-enterprise-95-bujarra

We confirm that we have the users we want and click on “Commit Now”,

 

citrix-sharefile-enterprise-96-bujarra

“Accept”, already tells us that it synchronized the users of our Active Directory to ShareFile in order to allow them to use the Logon!!

 

With this, users could now log in to ShareFile with their user accounts, but when opening the ShareFile URL, users will be opened a window asking for the username and password (They will open 'https://dominio.sharefile.com’ and will be redirected to 'https://dominio.sharefile.com/saml/login'). The truth is that it does not have a portal that tells the user that they are in ShareFile, Maybe I'll confuse them! And also it will not allow us to have users stored in Citrix since it will always validate us against the Active Directory.

 

Configuring SAML to work with all browsers,

We would have access problems with Google Chrome for example :'( so it is convenient to solve it.

 

Citrix-ShareFile-Enterprise-97-Bujarra

In the IIS Management Console, We will select the default website > 'ADFS’ > 'ls', select Don't require SSL and Bypass client certificates.

 

citrix-sharefile-enterprise-98-bujarra

In the same virtual directory, select in the Authentication options, in the advanced settings of 'Windows Authentication', We'll turn off Extended Protection.

 

Setting up a custom portal for SAML,

If we want to make a ShareFile portal with custom Single Sign On, or at least let us know that we are in ShareFile, We must first, Contact the Citrix Support, Follow the steps below and instruct them to activate the portal.

 

citrix-sharefile-enterprise-100-bujarra

We must download the template from the portal of this link, Unzip and modify it. We will edit 'login.htm’ to replace the correct SAML URL, Change:

'https://subdomain.sharefile.com/saml/login’ with 'https://dominio.sharefile.com/saml/login’
'https://subdomain.sharefile.com/resetpasswordrequest.aspx’ with 'https://mysubdomain.sharefile.com/resetpasswordrequest.aspx’

Obviously we can edit the file as we want, or the images, Logos…

 

Citrix-ShareFile-Enterprise-101-Bujarra

In “Shared Folders” we will have to create a new shared folder called 'Customizations', Click on “Create Shared Folder”,

 

citrix-sharefile-enterprise-102-bujarra

In Folder Name we put 'Customizations', and in 'Add Users’ we will indicate 'Add Manually’ & “Create Folder”,

 

citrix-sharefile-enterprise-103-bujarra

We must enter in 'Email Address’ The support email address ‘his*****@sh*******.cOm‘ to share configuration files with you, We enter the other information and give download permissions. “Add User”,

 

citrix-sharefile-enterprise-104-bujarra

We must upload to this directory all the content that we had unzipped from the 'CustomLogin file Template.zip’

 

citrix-sharefile-enterprise-105-bujarra

And we will be able to check how by accessing 'https://dominio.sharefile.com/customlogin.aspx’ we already have the double ShareFile access portal configured to our liking; Active Directory users will be able to access from the left in SAML Login and Citrix users will be able to access from Email Login with their email addresses.

More info in the official documentation on configuration of Single Sign-On with ShareFile and the customization of the portal.

Recommended Posts

Author

nheobug@bujarra.com
Autor del blog Bujarra.com Cualquier necesidad que tengas, Do not hesitate to contact me, I will try to help you whenever I can, Sharing is living ;) . Enjoy documents!!!

Citrix ShareFile

4 February de 2014