6.2 Configuring the Connector for Accellion

The connector for Accellion creates a SAML 2.0 connection between Access Manager Appliance and Accellion. The connector helps in creating a federated connection between Access Manager Appliance and Accellion. After the connection is made, when users log in to the User Portal page, they need to authenticate only once. For more information, see Section 1.2, Understanding Federated Single Sign-On with SAML 2.0.

To configure the connector for Accellion:

  1. Log in to Administration Console as an administrator.

  2. In Dashboard, under Administrative Tasks, click Applications.

  3. Select the appropriate Identity Server cluster to use application.

  4. Click the plus sign + to import the SAML 2.0 connector for Accellion.

    1. Click Add Application from Catalog, then search for the SAML 2.0 connector for Accellion.

      For more information, see Section 2.0, Using the Application Connector Catalog.

      or

    2. Click Import Application from File, then browse to and select the file.

  5. Specify the following details:

    Option

    Description

    Name

    Specify a unique name for the connector.

    Description

    (Optional)

    Specify a description of the connector.

    You can configure multiple connectors for Accellion. Ensure that you use a unique name and a description to help determine differences between the connectors.

    Change Image

    (Optional)

    Change the default image that the User Portal page displays to the users as appmark. Each connector contains a default image. The maximum image size is 200 x 200 pixels and the ideal image size is 100 x 100 pixels. You can use an image from the Image Gallery or upload your own image.

    Application Connector Setup: This section displays the metadata information that Access Manager Appliance requires from Accellion to create the federated connection.

    Domain name

    Specify the Accellion domain name that is the custom part of your Accellion domain. When you log in to your site administration, this name appears as customerdomain. For example, https://CUSTOMERDOMAIN.accellion.net/courier/ApplicationID.

    Metadata

    Displays the metadata for the connector. You can view or download the metadata. If you have not saved the connector, the system creates the SAML 2.0 metadata using the values provided and other values from the connector.

    IMPORTANT:This field does not appear until you save the connector.

    Unique ID

    or

    Entity ID

    Displays the value of the Unique ID or Entity ID if specified.

    For more information, see Section 4.4, Unique ID.

    IMPORTANT:This field appears only after you save the connector and you had specified the unique ID or entity ID to resolve the Entity ID conflict while saving the connector first time.

    Signing Certificate

    (Optional) If your service provider uses a signing certificate, upload a signing certificate file to secure communication between Access Manager and Accellion. Or, it displays the content of the signing certificate if you have saved the connector.

    You can upload up to two service provider signing certificates.

    For more information, see Minimizing Service Interruption of SAML 2.0 Service Providers in the NetIQ Access Manager Appliance 4.4 Administration Guide.

    When you add two certificates, the identity provider picks up the appropriate certificate from the metadata. Both of the certificates are active simultaneously. When two certificates are used, ensure that the certificate information (X.509 data) is sent along with the signed document.

    You can view details, download, and delete the uploaded certificates.

    The system automatically adds new certificates to the trust store for Administration Console. However, the new certificates are not automatically added to the trust store for the Identity Server cluster.

    IMPORTANT:You must manually add signing certificates to the Identity Server cluster trust store and to the OCSP trust store. Else, the health of the Identity Server cluster turns yellow and users do not see appmarks configured for this application when they log in to the User Portal page. For more information, see Managing Certificates and Keystores in the NetIQ Access Manager Appliance 4.4 Administration Guide.

    Attributes: This section allows you to manage attributes that are part of the SAML 2.0 assertion.

    Replace Attribute Set

    If you want to import existing attributes from attribute sets already configured on the local Access Manager system, click this option. Select the required attribute sets from the list.

    IMPORTANT:Selecting an existing Attribute Set replaces any attributes available in the application.

    NameID

    Select the appropriate attribute from Accellion for the ID of the users. Typically, the users’ email address.

    Access and Roles: This section allows you to control who has access to the application.

    Roles

    Select the role assignments to determine the user accessibility of this application.

    The Role assignments made in the Appmark editor determine the user visibility of the appmarks associated with this application, not the accessibility of the application.

    Contracts

    Select the contracts presented to users when they click the appmark or attempt service provider initiated authentication. The users see these contract unless the contract is satisfied during login or through the authentication levels.

    System Setup: This section displays the metadata information from Access Manager Appliance to use in Accellion to create the federated connection.

    Metadata

    You can view or download the metadata information from Access Manager Appliance to create the federated connection.

    Signing Certificate

    You can view or download the signing certificate from Access Manager Appliance to create the federated connection.

    Federation Instructions

    Contains instructions with steps to perform at Accellion to create the federated connection. The information in the Federation Instructions is specific to your Access Manager environment.

    Click Show to view copy Access Manager signing certificates and endpoint URLs based on your configuration.

    NOTE:The Advanced Setup does not appear in any of these sections until you save the connector.

  6. Click Save.