2020-07-01 05:52:17 -04:00
# Authentication guide - SAML
2018-03-20 09:44:01 -04:00
2020-07-02 11:22:52 -04:00
*Note:* This guide was written before the renaming. Just replace `HackMD` with `HedgeDoc` in your mind :smile: thanks!
2018-06-24 08:04:35 -04:00
2018-03-20 09:44:01 -04:00
The basic procedure is the same as the case of OneLogin which is mentioned in [OneLogin-Guide ](./saml-onelogin.md ). If you want to match your IdP, you can use more configurations as below.
2020-07-01 05:52:17 -04:00
- If your IdP accepts metadata XML of the service provider to ease configuration, use this url to download metadata XML.
- {{your-serverurl}}/auth/saml/metadata
- *Note:* If not accessible from IdP, download to local once and upload to IdP.
- Change the value of `issuer` , `identifierFormat` to match your IdP.
2020-07-02 11:22:52 -04:00
- `issuer` : A unique id to identify the application to the IdP, which is the base URL of your HedgeDoc as default
2020-07-01 05:52:17 -04:00
- `identifierFormat` : A format of unique id to identify the user of IdP, which is the format based on email address as default. It is recommend that you use as below.
- urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress (default)
- urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified
- `config.json` :
2019-03-31 14:10:32 -04:00
```javascript
2018-03-20 09:44:01 -04:00
{
"production": {
"saml": {
/* omitted */
2020-07-02 11:22:52 -04:00
"issuer": "myhedgedoc"
2018-03-20 09:44:01 -04:00
"identifierFormat": "urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified"
}
}
}
2019-03-31 14:10:32 -04:00
```
2020-07-01 05:52:17 -04:00
- environment variables
```env
2020-07-02 11:22:52 -04:00
CMD_SAML_ISSUER=myhedgedoc
2019-03-31 14:10:32 -04:00
CMD_SAML_IDENTIFIERFORMAT=urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified
```
2018-03-20 09:44:01 -04:00
2020-07-01 05:52:17 -04:00
- Change mapping of attribute names to customize the displaying user name and email address to match your IdP.
- `attribute` : A dictionary to map attribute names
2020-07-02 11:22:52 -04:00
- `attribute.id` : A primary key of user table for your HedgeDoc
2020-07-01 05:52:17 -04:00
2020-07-02 11:22:52 -04:00
- `attribute.username` : Attribute name of displaying user name on HedgeDoc
2020-07-01 05:52:17 -04:00
- `attribute.email` : Attribute name of email address, which will be also used for Gravatar
- *Note:* Default value of all attributes is NameID of SAML response, which is email address if `identifierFormat` is default.
- `config.json` :
2019-03-31 14:10:32 -04:00
```javascript
2018-03-20 09:44:01 -04:00
{
"production": {
"saml": {
/* omitted */
"attribute": {
"id": "sAMAccountName",
"username": "displayName",
"email": "mail"
}
}
}
}
2019-03-31 14:10:32 -04:00
```
2020-07-01 05:52:17 -04:00
- environment variables
2019-03-31 14:10:32 -04:00
```sh
CMD_SAML_ATTRIBUTE_ID=sAMAccountName
CMD_SAML_ATTRIBUTE_USERNAME=nickName
CMD_SAML_ATTRIBUTE_EMAIL=mail
```
2018-03-20 09:44:01 -04:00
2020-07-01 05:52:17 -04:00
- If you want to control permission by group membership, add group attribute name and required group (allowed) or external group (not allowed).
- `groupAttribute` : An attribute name of group membership
2020-07-02 11:22:52 -04:00
- `requiredGroups` : Group names array for allowed access to HedgeDoc. Use vertical bar to separate for environment variables.
2020-07-01 05:52:17 -04:00
2020-07-02 11:22:52 -04:00
- `externalGroups` : Group names array for not allowed access to HedgeDoc. Use vertical bar to separate for environment variables.
2020-07-01 05:52:17 -04:00
- *Note:* Evaluates `externalGroups` first
- `config.json` :
2019-03-31 14:10:32 -04:00
```javascript
2018-03-20 09:44:01 -04:00
{
"production": {
"saml": {
/* omitted */
"groupAttribute": "memberOf",
2020-07-02 11:22:52 -04:00
"requiredGroups": [ "hedgedoc-users", "board-members" ],
2018-03-20 09:44:01 -04:00
"externalGroups": [ "temporary-staff" ]
}
}
}
2019-03-31 14:10:32 -04:00
```
2020-07-01 05:52:17 -04:00
- environment variables
2019-03-31 14:10:32 -04:00
```sh
CMD_SAML_GROUPATTRIBUTE=memberOf
2020-07-02 11:22:52 -04:00
CMD_SAML_REQUIREDGROUPS=hedgedoc-users|board-members
2019-03-31 14:10:32 -04:00
CMD_SAML_EXTERNALGROUPS=temporary-staff
```