SAML SSO Configuration

Vous êtes ici:
< Back

SAML SSO For Damaris RM

1 – Introduction

This article describes how to configure Damaris RM to use SAML SSO (Single Sign On) connector.


2 – Pre-requisits

To use SAML SSO connecteor you need to provide several information:

  • SAML Server’s certificate
  • Damaris RM declared Company name which will use SAML SSO connector
  • ADFS downloaded meta data


3 – Installation

Step1. SAML Server Certificate Installation

Import ADFS certificate in Tomcat keystore. Please ask system administrator to send you public ADFS certificate.

You also can connect to the server by using a Browser (Firefox or Google Chrome) and download the public certificate.

Here is a screenshot of certificate down process:


SAML SSO Certificate Download


The following command could be used as a sample:

keytool -import -trustcacerts -alias hrboss.local -file D:/Share/licenses-certificates/hrboss.local.crt -keystore src\main\resources\tomcat\tomcat-ssl.keystore


Step2. Configure Damaris RM’s SAML Option

Modify ../webapps/DamarisRM/WEB-INF/config/ file and set the company name that you want to use to the field useSAMLforCompany:



For example, if you declared “Damaris” company, so you have to configure the value as follows:



Step3. Configure Spring Context XML File

Modify ../webapps/DamarisRM/WEB-INF/spring-context-security.xml file and

  • Find tag <authentication-provider ref=”samlAuthenticationProvider”/> and uncomment it.
  • Uncomment block which starts with <!–Spring SAML Configurations Start–> and ends with <!– Spring SAML Configurations End –>
  • Find tag <beans:property name=”entityId” value=”damarisrm-saml-entity-id”/> and replace damarisrm-saml-entity-id by  cfs-saml-id.


Step4. Update idp.xml ADFS Meta Data File

Replace ../webapps/DamarisRM/WEB-INF/classes/saml/idp.xml with production ADFS metadata file.


Step5. Replace Login Form HTML Page

  • Rename ..webapps/DamarisRM/loginForm.xhtml into ..webapps/DamarisRM/loginCustom.xhtml
  • Rename ..webapps/DamarisRM/loginForm_SAML.xhtml into ..webapps/DamarisRM/loginForm.xhtml.


Step6. Restart Tomcat

Restart Tomcat


Step7. Generate Meta Data

Generate metadata file using following URL: https://YOUR_HOST/DamarisRM/saml/metadata



Step8. Send Generated Meta Data to ADFS Server

Send metadata file generated at step7 to your Administrator and ask to configure production ADFS server.


Step9. SAML Test

After execution of step8, test SSO by trying to login.


4 – Configuration

You can configure Damaris RM to create automatically connecting users.

Please choose Administration / Company menu.

Select the company and click on EDIT button.

A similare popup opens:

SAML Users Creation Configuration


Select “Create User” to ask Damaris RM to create SAML connecting users to be created.

Here you can choose which SAML Group corresponds to Damaris RM’s Department and role.


If don’t want Damaris RM to automatically create users, please uncheck the option. In that case, you will need to pre-create authorized users or to synchronize users list with AD Sync Task.


SAML SSO Configuration