Digital Ocean Spaces File Sharing with Active Directory Users using SSO
Digital Ocean spaces or Digital Ocean object storage file sharing with Active Directory users is now made easier with the secure file sharing and access management platform, NirvaShare. Active Directory is commonly used by organizations these days for managing users in a centralized manner that controls access across resources. NirvaShare is designed to be easily integrated with Active Directory to enable file sharing of Digital Ocean spaces object storage with its users. It also allows to use Active directory groups for improved collaboration and better access control.
It is necessary to create a login profile in NirvaShare to enable SSO with external identity provider. Refer to the below documentation to create one.
- Log in to Admin Console as an administrator.
- Click on Login Profiles from the left menu of the Admin Console.
- Click on CREATE button from the top right corner.
- Provide a name for the title.
- For Authentication, select External Single Sign On (SSO) and click on CREATE.
For external identity provider integration, you will require SAML metadata from the login profile of NirvaShare. To obtain the SAML metadata for the newly created login profile, follow the below steps.
- Edit the newly created login profile.
- Click on the Download Metadata link.
- This will download the XML metadata file for NirvaShare.
- This metadata file will be required to configure the external identity provider and hence it is advised to please save this file locally for further reference.
ActiveDirectory and Login Profile Configuration
We have to create an application SSO access point, i.e enterprise application in Active Directory to integrate with NirvaShare and share files:
- Sign in to Azure Portal https://portal.azure.com
- Open Active Directory service.
- From the left menu list, click on Enterprise applications.
To know more, you can also visit Microsoft site at HERE.
- On the top menu, click on New application.
- On the top menu, click on Create your own application.
- Provide a name as NirvaShare-userapp and click on Create.
- After selecting the newly created application, click on Single sign-on from the left menu tab.
- Next we have to enable SAML for which we should click on SAML block on right hand side.
- At this juncture, you will require SAML metadata file that was obtained from NirvaShare in the previous section.
- For this, click on Upload metadata file
- Select the NirvaShare SAML metadata file and upload.
- Save it.
- Now go to the next section, Attributes & Claims and click on edit.
- Click on Add a group claim from the top menu.
- Select All groups radio button and the Source attribute as Group ID.
- Move down and expand Advanced options.
- Click on checkbox to Customize the name of the group claim.
- Provide the name as member.
- Save it.
In the next step, we need to download Active Directory’s SAML metadata file.
- Scroll down to the section SAML Signing Certificate.
- Download the Federation Metadata XML file.
- Save the file.
Updating SAML Metadata
Go back to NirvaShare Admin Console.
- From the NirvaShare Admin Console, click on edit on the Login Profile that we created earlier.
- Upload the Federation Metadata XML content obtained from Active Directory by clicking on Browse next to Upload Metadata under External IDP SAML metadata.
- Save It.
With this, the required configuration to enable Active Directory Single Sign-On with Nirva Share is done. To test Digital Ocean file sharing with Active Directory users using SSO, proceed with the next section to create Shares.
At this stage, we are good to use the SSO with Digital Ocean object storage spaces. For this, let us create a folder Share and enable SSO. Please refer the below documentation to create new Share from the Storage. During the course of this Share configuration, make sure to select the login profile that we created in the above section. You can also create one or more shares and assign the same login profile.
- For this, go to Nirva Share Admin Console, right click on the login profile that we created and select Copy Shareable Link.
- Open the link in browser tab. This will redirect to AD for SSO.
- After the authentication, you should be able to access Shares assigned to the login profile.