snipe / snipe-it

A free open source IT asset/license management system
https://snipeitapp.com
GNU Affero General Public License v3.0
10.89k stars 3.14k forks source link

SAML integration issue with Azure Enterprise Application #9324

Open gzbabhishek opened 3 years ago

gzbabhishek commented 3 years ago

Following a tutorial, I have enabled SAML on Azure AD which is connected and having a positive response.

while configuring to SAML I am getting error as shown in below image. image

How shall I get SAML idP Metadata to insert in the given box?

welcome[bot] commented 3 years ago

👋 Thanks for opening your first issue here! If you're reporting a 🐞 bug, please make sure you include steps to reproduce it. We get a lot of issues on this repo, so please be patient and we will get back to you as soon as we can.

uberbrady commented 3 years ago

You'll need to install an openssl or openssl-devel package that will include the openssl.cnf file. Once that's there, SAML will be able to generate and read certificates for you.

gzbabhishek commented 3 years ago

Thanks, I did this configuration but the issue not resolved.

aranar-pro commented 3 years ago

If you are on Windows Server 2019, trying pointing OPENSSL_CONF System Environment Variable to location of your openssl.cnf maybe? EDIT: sorry if this isn't useful, I realized you'll probably need to do something different if you're running as webapp, but if the issue is the system environment variable there's a possible way to set it here.

fstorz commented 2 years ago

@gzbabhishek

How shall I get SAML idP Metadata to insert in the given box?

The pattern for the URL looks like this: https://login.microsoftonline.com/<tenant-id>/federationmetadata/2007-06/federationmetadata.xml?appid=<app-id>

You can find this URL in the Single-Sign-On settings of your enterprise app in the Azure portal.

  1. Login to Azure portal
  2. Go to enterprise apps
  3. Select your app
  4. Select in navigation "Single-Sign-On" (might have a different name in english translated portal)
  5. On item no. 3 ("SAML-Signature certificate") there is an element called "App-metadata-URL"
  6. Copy the shown URL to Snipe-IT