Create a Web Logon Procedure
- Login to the DualShield Administration Console
- In the main menu, navigate to “Authentication | Logon Procedures”
- Click the “+Create” button on the toolbar
- Enter a suitable “Name”, then select 'Type' from the drop-down as "Web SSO".
- Click “Save” to confirm creation.
- Click back on the context "..." menu of the newly created Logon Procedure, then select “Logon Steps”
- In the popup window on the right, select "+ ADD" button, to add a new authentication method.
- Select from the list the required authentication method, i.e. “Static Password” (AD Password)
- Click "Save" to add the Step.
- Repeat 7 - 9 for any additional authentication steps you wish to use:
Create a Web Application
- In the main menu, navigate to “Authentication | Applications”
- Click the “+ CREATE” button in the toolbar
- Enter an appropriate “Name”
- Select the internal “Realm”
- Select the Logon Procedure created previously.
- Click "SAVE" to complete the Application creation.
- Click the context "..." menu of the newly created application, then "Agents"
- Select the "Single Sign-on Server | SSO Server"
- Click "SAVE" button to confirm.
- Click the context "..." menu of the newly created Application, then "Self Test" to confirm all components are correctly associated.
Create a new Service Provider
- In the main menu, navigate to "SSO | Service Providers"
- Click the "+ CREATE" button
- Select the "Single Sign-on Server"
- nt, and enter "Name"
- Select "Type" as "WS-Federation"
- Click on the "Edit" button to add Attributes
You now need to add attributes that match the 'RoleClaims' and 'identity claims' as specified in the Powershell scripts that will be set up and run in the 'SharePoint Configuration' section.
5. Click 'Create'
6. Create an attribute for the 'RoleClaims'. This will have a fixed value which will contain the name of the role you have setup in the Link Groups script
(Remember to replace NameOfRole with the actual name specified in the RoleClaims)
7. You now create the 'identity claims attributes' which will be mapped to AD attributes. There are usually three attributes containing emailaddress, givenname and surname. (see enable SSO script)
You can map a value as follows:
In the "Maps To" section click on the corresponding search button
Here you will select the Identity Source corresponding with your domain and choose the Email identity attribute from the drop down list.
Remember to make sure Return Response is enabled on all your attributes.
Click Save
8. Repeat the process for givenname and surname attribute mappings until you get a list as below:
9. Click "Save"
10. Click "Save" at the bottom of the New Service Provider window.












