Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Instead of only using the Picturepark IDS, you can connect an OpenID Provider, which will serve as an Identity Provider to the Picturepark IDS. The selected Identity Provider (IdP) must support the standardized Open ID Connect protocol, which itself allows a flexible implementation that varies in required metadata or ACR values. 

...

Expand
titleCreate Identity Provider (Claim) Mappings

Create Identity Provider (Claim) Mappings

You can configure claim mappings and group mappings for your external Identity Provider. 

Include Page
TERMS:Identity Provider
TERMS:Identity Provider

Prerequisites

Create Claim Mappings

  1. Open Settings > IdP Settings.

  2. You will see a setting entry for your new Identity Provider in the list. Double-click to open it.

  3. On the right side, in the first tab, you can add the claim mapping:

    1. Add claim mapping.

    2. Provide the claim name from your AD, which holds the user attributes e.g., company, telephone number. Ensure the correct spelling! 

    3. Map to Picturepark user attributes.

On the right side in the second tab, you can add the group mapping:

  1. Add group mappings.

    1. Provide the claim name (issued claims) from your AD, which holds your user group assignments, e.g., Groups. Ensure the spelling is correct!

    2. Define a Fallback user role. The fallback user role of the IdP will only be used if none of the group mappings find a matching role or the default user role is not defined for the Picturepark. This cannot be Super Admins. 

    3. Map Group names from your AD to user roles in Picturepark. 

Note

Without group mappings , your users will be able to login to Picturepark but will either have only the default role or fallback user role of your Picturepark assigned (if there is any these are configured) . You can or will not have any access. Be aware that you can also add roles to federated users in Picturepark. 

Warning

There is a Microsoft limitation for ADFS 2.0 which prevents using Domain Local Groups in a claim. Choose global or universal groups. More details on this limitation: https://social.technet.microsoft.com/wiki/contents/articles/13829.ad-fs-2-0-domain-local-groups-in-a-claim.aspx

Automatic Claim Mappings

The following attributes are mapped automatically in CP (if not overridden by a claim mapping). 

Further information about claims here: https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/technical-reference/the-role-of-claims

User attribute

Claim types (first to have a value wins)

Email

email, that will be used as a username in Picturepark (mandatory). 

sub

User identifier of the user within the IdP (mandatory; provided by ADFS in basic configuration).

First name

given_name

Last name

family_name

Language code

  • Default language coming from IDS

  • Default customer language, only acceptable values are en and de. 

locale

After Creating Identity Provider Mappings

  1. Add Identity Provider to users

...

Expand
titleDelete Identity Provider

Delete Identity Provider

  1. Open Settings > IdP setup.

  2. In the list, delete your Identity Provider.

Before deleting Identity Provider

  1. Open Users.

  2. Switch Search Mode to Advanced.

  3. Search for all users which have the Identity Provider assigned
    identityProviderId:<id> 

  4. Update those users, as otherwise, they can no longer log in to Picturepark.

Effects of deleting Identity Provider

  • The users who were using this Identity Provider can no longer log in. 

  • No default or fallback Identity Provider will be assigned. 

Expand
titlePurge Identity Provider

Purge Identity Provider

  1. Open Settings > IdP setup.

  2. In the list, select your Identity Provider.

  3. Choose “Purge”.

  4. In the confirmation dialog, select Purge.

Effects of purging Identity Provider

  • Claims of all users will be purged.

  • Users must login again and claims will be updated with the latest information of the IdP.

...