< All Topics

Share Files from Linode Storage with Active Directory Users Using SSO

Sharing Files from Linode Storage with Active directory users using SSO is now made easier by Nirvashare. Active directories are invariably used by enterprise organizations nowadays as they have proven to be successful in managing users and regulating access controls. In order to obtain better file collaboration, AD groups can also be used along with good access control.

Prerequisites

Before you begin, make sure NirvaShare installation and storage configuration is complete. Ensure that  NirvaShare is installed in your system environment either manually or from Market Place.

To configure storage, please refer to the documentation below.

Login Profile

Follow the below steps to create a new login profile to integrate with the external identity provider.

  • Log in to Admin Console as an administrator.
  • Click on Login Profiles from the left menu of the Admin Console.
  • Click on CREATE button from the top right corner.
  • Under the Basic Info tab, provide a name for the title and an optional description.
FTPS Login Profile

Access

  • Provide an IP Address or IP Addresses in the IP Address Restriction field.
  • Choose the language in the Language field. By default it is set to English.

Note – To restrict access to only certain white listed IP address or a range, please refer to Access Restriction with IP Address

au

Authentication

  • Click on the Authentication tab.
  • For the Authentication, select External Single Sign On (SSO) and click on CREATE.
sso

SAML Metadata

For external identity provider integration, you will require SAML metadata from the login profile of NirvaShare. To obtain the SAML metadata for the newly created login profile, follow the below steps.

  • Edit the newly created login profile.
  • Click on the Download Metadata link.
  • This will download the XML metadata file for NirvaShare.
  • This metadata file will be required to configure the external identity provider and hence you are required to save this file locally for further reference.
metadata

Note – Later stage, you will also require SAML metadata from identity provider and the content of the same has to be pasted in the textbox and saved in the login profile.

Active Directory and Login Profile Configuration

We need to create an application SSO access point, i.e., enterprise application in Active Directory to integrate with NirvaShare:

  • Sign in to Azure  Portal https://portal.azure.com
  • Open Active Directory service.
  • From the left menu list, click on Enterprise applications.

To know more, you can also visit Microsoft site HERE.

Share Vultr files
  • In the top menu, click on New application.
  • In the top menu, click on Create your own application.
  •  Provide a name as NirvaShare-userapp and click on Create.
createApp
  • Once the newly created application is selected, click on Single sign-on from the left menu tab.
  • We need to enable SAML, hence click on SAML block on right hand side.
saml
  • At this instant, you will require SAML metadata file that was obtained from NirvaShare in the previous section.
  • Click on Upload metadata file.
  • Select the NirvaShare SAML metadata file and upload.
  • Save it.
  • Go to the section Attributes & Claims and click on edit.
  • Click on Add a group claim from the top menu.
  • Select the All groups radio button and Source attribute as Group ID.
group
  • Scroll down and expand Advanced options.
  • Enable checkbox to Customize the name of the group claim.
  • Provide the name as member.
  • Save it.
member

In the next step, we need to download Active Directory’s SAML metadata file.

  • Scroll down to the section SAML Signing Certificate.
  • Download the Federation Metadata XML file.
  • Save the file.
metadata1

Updating SAML Metadata

 Go back to NirvaShare Admin Console.

  1. From the NirvaShare Admin Console, click on edit on the Login Profile that we created earlier.
  2. Upload the Federation Metadata XML content obtained from Active Directory by clicking on Choose File next to Upload Metadata under External IDP SAML metadata.
  3. Save It.
saml metadata

With this, the required configuration to enable Active Directory Single Sign-On with NirvaShare is done. To test this, proceed with the next section to create Shares.

Shares

At this stage, we are good to use the SSO with Linode Object Storge. Now we can create a folder Share to share files with Active Directory Users using SSO.  Refer to the below documentation to create new Share from Storage. During the Share configuration, ensure that you select the login profile that we created in the above section. You can also create one or more shares and assign the same login profile.

Verification

  • Go to the NirvaShare Admin Console and right click on the login profile that was created earlier and select Copy Shareable Link.
  • Open the link in browser tab. This will redirect to AD for SSO.
  • After the authentication, you will be able to access Shares assigned to the login profile.
Table of Contents