<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>SSO Archives - Blog IT</title>
	<atom:link href="https://blogit.create.pt/category/security/sso/feed/" rel="self" type="application/rss+xml" />
	<link>https://blogit.create.pt/category/security/sso/</link>
	<description>Create IT blogger community</description>
	<lastBuildDate>Fri, 08 May 2020 08:35:07 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>
	<item>
		<title>BizTalk Server Single Sign On – Save config data in SSO</title>
		<link>https://blogit.create.pt/tiagooliveira/2015/01/05/biztalk-server-single-sign-on-save-config-data-in-sso/</link>
					<comments>https://blogit.create.pt/tiagooliveira/2015/01/05/biztalk-server-single-sign-on-save-config-data-in-sso/#respond</comments>
		
		<dc:creator><![CDATA[Tiago Oliveira]]></dc:creator>
		<pubDate>Mon, 05 Jan 2015 23:14:53 +0000</pubDate>
				<category><![CDATA[BizTalk Server]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[SSO]]></category>
		<category><![CDATA[Integration]]></category>
		<guid isPermaLink="false">http://blogit.create.pt/tiagooliveira/?p=1151</guid>

					<description><![CDATA[<p>This is my last post about using SSO on Biztalk Server. In this post I will show how to set and retrieve configuration data from SSO. To configure and set configuration data, Microsoft has an MMC Snap-In called “SSO Configuration Application”, that allow us to create and manipulate applications and their properties (http://www.microsoft.com/en-us/download/details.aspx?id=14524). From the [&#8230;]</p>
<p>The post <a href="https://blogit.create.pt/tiagooliveira/2015/01/05/biztalk-server-single-sign-on-save-config-data-in-sso/">BizTalk Server Single Sign On – Save config data in SSO</a> appeared first on <a href="https://blogit.create.pt">Blog IT</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This is my last post about using SSO on Biztalk Server. In this post I will show how to set and retrieve configuration data from SSO.</p>
<p>To configure and set configuration data, Microsoft has an MMC Snap-In called “SSO Configuration Application”, that allow us to create and manipulate applications and their properties (<a title="http://www.microsoft.com/en-us/download/details.aspx?id=14524" href="http://www.microsoft.com/en-us/download/details.aspx?id=14524">http://www.microsoft.com/en-us/download/details.aspx?id=14524</a>).</p>
<p>From the community there are several tools to set SSO configuration. The most well know was created by Richard Seroter in 2007 that allow us to manipulate previously created properties in an easy way (<a title="http://seroter.wordpress.com/2007/09/21/biztalk-sso-configuration-data-storage-tool/" href="http://seroter.wordpress.com/2007/09/21/biztalk-sso-configuration-data-storage-tool/">http://seroter.wordpress.com/2007/09/21/biztalk-sso-configuration-data-storage-tool/</a>).  There are also some Richard Seroter tool improvements, like a version from Mark Burch in <a title="http://biztorque.net/archive/2010/06/07/74.aspx" href="http://biztorque.net/archive/2010/06/07/74.aspx">http://biztorque.net/archive/2010/06/07/74.aspx</a>, that allow us to create new SSO properties.</p>
<p>BizTalk Deployment Framework also include an SSO module, that use a different approach of using the Excel to set SSO config data in each environment (<a title="http://biztalkdeployment.codeplex.com/" href="http://biztalkdeployment.codeplex.com/">http://biztalkdeployment.codeplex.com/</a>).</p>
<p>To get configuration from SSO by code, you can use “SSOConfigHelper.cs” included in Microsoft BizTalk Server 2006 SDK, but still working with the latest Biztalk server versions (<a title="http://www.getcodesamples.com/src/2B2085E1/C4A921B1" href="http://www.getcodesamples.com/src/2B2085E1/C4A921B1">http://www.getcodesamples.com/src/2B2085E1/C4A921B1</a>).<br />
Just get the code and include “Microsoft.BizTalk.Interop.SSOClient.dll” in SSO install folder (for example C:\Program Files\Common Files\Enterprise Single Sign-On\Interop1.1\Microsoft.BizTalk.Interop.SSOClient.dll) and call the read method, setting the previous create application and property name.</p>
<p>Hope that 4 posts about SSO will help you to use SSO more frequently in BizTalk programming.</p>
<p>The post <a href="https://blogit.create.pt/tiagooliveira/2015/01/05/biztalk-server-single-sign-on-save-config-data-in-sso/">BizTalk Server Single Sign On – Save config data in SSO</a> appeared first on <a href="https://blogit.create.pt">Blog IT</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blogit.create.pt/tiagooliveira/2015/01/05/biztalk-server-single-sign-on-save-config-data-in-sso/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>BizTalk Server Single Sign On &#8211; Using SSO with adapters</title>
		<link>https://blogit.create.pt/tiagooliveira/2014/12/10/biztalk-server-single-sign-on-using-sso-with-adapters/</link>
					<comments>https://blogit.create.pt/tiagooliveira/2014/12/10/biztalk-server-single-sign-on-using-sso-with-adapters/#respond</comments>
		
		<dc:creator><![CDATA[Tiago Oliveira]]></dc:creator>
		<pubDate>Wed, 10 Dec 2014 23:15:32 +0000</pubDate>
				<category><![CDATA[BizTalk Server]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[SSO]]></category>
		<category><![CDATA[Integration]]></category>
		<guid isPermaLink="false">http://blogit.create.pt/tiagooliveira/?p=1051</guid>

					<description><![CDATA[<p>In BizTalk Server there are several adapters that automatically support SSO without any code. Many BizTalk Adapters already support this feature, like SQL, most of WCF, Oracle, FTP, HTTP, etc. The SSO configuration to support this feature is very easy. First enter SSO Administration tool, and create a new affiliate application with the above settings (you can [&#8230;]</p>
<p>The post <a href="https://blogit.create.pt/tiagooliveira/2014/12/10/biztalk-server-single-sign-on-using-sso-with-adapters/">BizTalk Server Single Sign On &#8211; Using SSO with adapters</a> appeared first on <a href="https://blogit.create.pt">Blog IT</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In BizTalk Server there are several adapters that automatically support SSO without any code.<br />
Many BizTalk Adapters already support this feature, like SQL, most of WCF, Oracle, FTP, HTTP, etc.</p>
<p>The SSO configuration to support this feature is very easy.<br />
First enter SSO Administration tool, and create a new affiliate application with the above settings (you can put any name in the application name):</p>
<p><a href="http://blogit.create.pt/tiagooliveira/wp-content/uploads/sites/101/2014/12/image.png"><img fetchpriority="high" decoding="async" style="padding-top: 0px;padding-left: 0px;padding-right: 0px;border: 0px" title="image" src="http://blogit.create.pt/tiagooliveira/wp-content/uploads/sites/101/2014/12/image_thumb.png" alt="image" width="610" height="368" border="0" /></a></p>
<p><a href="http://blogit.create.pt/tiagooliveira/wp-content/uploads/sites/101/2014/12/image1.png"><img decoding="async" style="padding-top: 0px;padding-left: 0px;padding-right: 0px;border: 0px" title="image" src="http://blogit.create.pt/tiagooliveira/wp-content/uploads/sites/101/2014/12/image_thumb1.png" alt="image" width="608" height="361" border="0" /></a></p>
<p><a href="http://blogit.create.pt/tiagooliveira/wp-content/uploads/sites/101/2014/12/image2.png"><img decoding="async" style="padding-top: 0px;padding-left: 0px;padding-right: 0px;border: 0px" title="image" src="http://blogit.create.pt/tiagooliveira/wp-content/uploads/sites/101/2014/12/image_thumb2.png" alt="image" width="608" height="364" border="0" /></a></p>
<p><a href="http://blogit.create.pt/tiagooliveira/wp-content/uploads/sites/101/2014/12/image3.png"><img decoding="async" style="padding-top: 0px;padding-left: 0px;padding-right: 0px;border: 0px" title="image" src="http://blogit.create.pt/tiagooliveira/wp-content/uploads/sites/101/2014/12/image_thumb3.png" alt="image" width="606" height="358" border="0" /></a></p>
<p>In BizTalk Server Administration, when setting the receive location configuration, set the use SSO option, and use an isolated host with a running account that belongs to the SSO application administrators group (images above).</p>
<p><a href="http://blogit.create.pt/tiagooliveira/wp-content/uploads/sites/101/2014/12/image5.png"><img decoding="async" style="padding-top: 0px;padding-left: 0px;padding-right: 0px;border: 0px" title="image" src="http://blogit.create.pt/tiagooliveira/wp-content/uploads/sites/101/2014/12/image_thumb5.png" alt="image" width="401" height="563" border="0" /></a></p>
<p><a href="http://blogit.create.pt/tiagooliveira/wp-content/uploads/sites/101/2014/12/image4.png"><img decoding="async" style="padding-top: 0px;padding-left: 0px;margin: 0px;padding-right: 0px;border: 0px" title="image" src="http://blogit.create.pt/tiagooliveira/wp-content/uploads/sites/101/2014/12/image_thumb4.png" alt="image" width="608" height="359" border="0" /></a></p>
<p>In the send port adapter configuration set the affiliate application created earlier.<br />
<a href="http://blogit.create.pt/tiagooliveira/wp-content/uploads/sites/101/2014/12/image6.png"><img decoding="async" style="padding-top: 0px;padding-left: 0px;padding-right: 0px;border: 0px" title="image" src="http://blogit.create.pt/tiagooliveira/wp-content/uploads/sites/101/2014/12/image_thumb6.png" alt="image" width="399" height="548" border="0" /></a></p>
<p><a href="http://blogit.create.pt/tiagooliveira/wp-content/uploads/sites/101/2014/12/image7.png"><img decoding="async" style="padding-top: 0px;padding-left: 0px;padding-right: 0px;border: 0px" title="image" src="http://blogit.create.pt/tiagooliveira/wp-content/uploads/sites/101/2014/12/image_thumb7.png" alt="image" width="395" height="506" border="0" /></a></p>
<p>To finalize the configuration, you must set SSO to allow ticket usage (by default is not allowed).<br />
Execute the following instruction in the command prompt “ssomanage -tickets yes” (<a title="http://msdn.microsoft.com/en-us/library/aa559512.aspx" href="http://msdn.microsoft.com/en-us/library/aa559512.aspx">http://msdn.microsoft.com/en-us/library/aa559512.aspx</a>)</p>
<p>The credential mapping is working without any &#8220;hand made&#8221; code creation.</p>
<p>The post <a href="https://blogit.create.pt/tiagooliveira/2014/12/10/biztalk-server-single-sign-on-using-sso-with-adapters/">BizTalk Server Single Sign On &#8211; Using SSO with adapters</a> appeared first on <a href="https://blogit.create.pt">Blog IT</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blogit.create.pt/tiagooliveira/2014/12/10/biztalk-server-single-sign-on-using-sso-with-adapters/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>BizTalk Server Single Sign On &#8211; Get mapped credential by code</title>
		<link>https://blogit.create.pt/tiagooliveira/2014/11/13/biztalk-server-single-sign-on-get-mapped-credential-by-code/</link>
					<comments>https://blogit.create.pt/tiagooliveira/2014/11/13/biztalk-server-single-sign-on-get-mapped-credential-by-code/#respond</comments>
		
		<dc:creator><![CDATA[Tiago Oliveira]]></dc:creator>
		<pubDate>Thu, 13 Nov 2014 22:40:02 +0000</pubDate>
				<category><![CDATA[BizTalk Server]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[SSO]]></category>
		<category><![CDATA[Integration]]></category>
		<guid isPermaLink="false">http://blogit.create.pt/tiagooliveira/?p=711</guid>

					<description><![CDATA[<p>This is my second post about using single sign on in Biztalk Server. In this post i will show how to access mapped credentials by code. First create a new affiliate application and a credential mapping as i show in the last post. Create a new class library project called “Test.SSO” Add a reference to [&#8230;]</p>
<p>The post <a href="https://blogit.create.pt/tiagooliveira/2014/11/13/biztalk-server-single-sign-on-get-mapped-credential-by-code/">BizTalk Server Single Sign On &#8211; Get mapped credential by code</a> appeared first on <a href="https://blogit.create.pt">Blog IT</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This is my second post about using single sign on in Biztalk Server.<br />
In this post i will show how to access mapped credentials by code.</p>
<p>First create a new affiliate application and a credential mapping as i show in the last post.</p>
<ol>
<ol>
<li>Create a new class library project called “Test.SSO”</li>
<li>Add a reference to the assembly “Microsoft.BizTalk.Interop.SSOClient.dll”, located in “C:\Program Files\Common Files\Enterprise Single Sign-On”</li>
<li>Add the following code in a new class called SSOManager
<pre class="brush: csharp; title: ; notranslate">
using System;
using System.Collections;
using System.Collections.Specialized;
using Microsoft.BizTalk.SSOClient.Interop;
namespace Test.SSO
{
     public static class SSOManager
     {
          /// &lt;summary&gt;
          /// Get external application credentials.
          /// &lt;/summary&gt;
          /// &lt;param name=&quot;ticket&quot;&gt;Credential ticket generated by biztalk receive port.&lt;/param&gt;
          /// &lt;param name=&quot;appName&quot;&gt;Application name to get external credentials.&lt;/param&gt;
          /// &lt;param name=&quot;userAccount&quot;&gt;User account to get external credentials.&lt;/param&gt;
          /// &lt;returns&gt;ArrayList with mapped credentials.&lt;/returns&gt;
          public static ArrayList GetExternalApplicationCredentials(string ticket, string appName, string userAccount)
          {
               ISSOTicket ssoTicket = new ISSOTicket();
               string externalUsername;
               string&#x5B;] credentials = ssoTicket.RedeemTicket(appName, userAccount, ticket, SSOFlag.SSO_WINDOWS_TO_EXTERNAL, out externalUsername);

               if (credentials == null || credentials.Length == 0 || String.IsNullOrWhiteSpace(externalUsername))
               {
                    return null;
               }

               ArrayList credentialsList = new ArrayList();
               credentialsList.Add(externalUsername);
               credentialsList.AddRange(credentials);
               return credentialsList;
          }
     }
}
</pre>
</li>
<li>Create a new Orchestration called SSOOrch</li>
<li>Include a reference to the previous created class library</li>
<li>Publish a new wcf service  using “WCF Service Publishing Wizard” and publish it at basic auth (<a title="http://msdn.microsoft.com/en-us/library/bb226564.aspx" href="http://msdn.microsoft.com/en-us/library/bb226564.aspx">http://msdn.microsoft.com/en-us/library/bb226564.aspx</a>)</li>
<li>Set the Orchestration receive location to receive messages from the service created</li>
<li>Configure the receive location security área like the following image, but checking &#8220;Use Single-On&#8221; option.<br />
<a href="http://blogit.create.pt/tiagooliveira/wp-content/uploads/sites/101/2014/11/image_thumb.png"><img decoding="async" class="alignnone size-full wp-image-661" src="http://blogit.create.pt/tiagooliveira/wp-content/uploads/sites/101/2014/11/image_thumb.png" alt="image_thumb.png" width="294" height="407" /></a></li>
<li>Create na Orchestration variable called ssoMapping as ArrayList</li>
<li>Add a new expression shape in the orchestration</li>
<li>Add the following code in the previous expression Shape (TestApp is the name of the affiliate application previously created)<br />
ssoMapping = Test.SSO.SSOManager.GetExternalApplicationMapping(SSOOrch(BTS.SSOTicket), “TestApp”, SSOOrch(BTS.WindowsUser));</li>
<li>Complete the orchestration by setting a send shape to file system.</li>
<li>Deploy the orchestration and set the regular configurations, but <strong>very important</strong> &#8211; set an host instance with an account that belongs to a SSO application administration group<br />
<a href="http://blogit.create.pt/tiagooliveira/wp-content/uploads/sites/101/2014/11/image1.png"><img decoding="async" style="padding-top: 0px;padding-left: 0px;padding-right: 0px;border: 0px" title="image" src="http://blogit.create.pt/tiagooliveira/wp-content/uploads/sites/101/2014/11/image_thumb1.png" alt="image" width="312" height="230" border="0" /></a></li>
<li>Invoke the previously created wcf service with an account that you have set in the SSO mapping.</li>
<li>If you debug the orchestration, you will get in the ssoMapping ArrayList 4 parameters with the data you have set in “User Id”, “MappedUser”, “”MappedPassword” and “MappedDomain” as you see in the next image.<br />
<a href="http://blogit.create.pt/tiagooliveira/wp-content/uploads/sites/101/2014/11/image2.png"><img decoding="async" style="border: 0px currentColor;padding-top: 0px;padding-right: 0px;padding-left: 0px" title="image" src="http://blogit.create.pt/tiagooliveira/wp-content/uploads/sites/101/2014/11/image_thumb2.png" alt="image" width="336" height="166" border="0" /></a></li>
</ol>
</ol>
<p>Hope this example will help you to easily use SSO in BizTalk Server.<br />
Happy coding.</p>
<p>The post <a href="https://blogit.create.pt/tiagooliveira/2014/11/13/biztalk-server-single-sign-on-get-mapped-credential-by-code/">BizTalk Server Single Sign On &#8211; Get mapped credential by code</a> appeared first on <a href="https://blogit.create.pt">Blog IT</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blogit.create.pt/tiagooliveira/2014/11/13/biztalk-server-single-sign-on-get-mapped-credential-by-code/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>BizTalk Server Single Sign On Configuration</title>
		<link>https://blogit.create.pt/tiagooliveira/2014/10/30/biztalk-server-single-sign-on-configuration/</link>
					<comments>https://blogit.create.pt/tiagooliveira/2014/10/30/biztalk-server-single-sign-on-configuration/#comments</comments>
		
		<dc:creator><![CDATA[Tiago Oliveira]]></dc:creator>
		<pubDate>Thu, 30 Oct 2014 22:16:35 +0000</pubDate>
				<category><![CDATA[BizTalk Server]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[SSO]]></category>
		<category><![CDATA[Integration]]></category>
		<guid isPermaLink="false">http://blogit.create.pt/tiagooliveira/?p=601</guid>

					<description><![CDATA[<p>This is my first post (in a total of four) about using SSO on BizTalk Server. In this post i will show how to config an 1 on 1 credential mapping in SSO, in the next 3 posts i will show how to access mapped credentials by code, use SSO directly in BizTalk adapters, and [&#8230;]</p>
<p>The post <a href="https://blogit.create.pt/tiagooliveira/2014/10/30/biztalk-server-single-sign-on-configuration/">BizTalk Server Single Sign On Configuration</a> appeared first on <a href="https://blogit.create.pt">Blog IT</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This is my first post (in a total of four) about using SSO on BizTalk Server.<br />
In this post i will show how to config an 1 on 1 credential mapping in SSO, in the next 3 posts i will show how to access mapped credentials by code, use SSO directly in BizTalk adapters, and the most commonly used to store key pair values.</p>
<p>It’s very easy to configure SSO to store credential mapping data.<br />
First access mmc console and choose Enterprise Single-Sign-On application.</p>
<p><a href="https://blogit.create.pt////wp-content/uploads/2014/10/SSO1_1.png"><img decoding="async" class="alignnone" style="padding-top: 0px;padding-left: 0px;padding-right: 0px;border-width: 0px" title="SSO1_1" src="http://blogit.create.pt/tiagooliveira/wp-content/uploads/sites/101/2014/10/SSO1_1_thumb.png" alt="SSO1_1" width="495" height="346" border="0" /></a></p>
<p>Then choose Affiliate Applications and select “Create Application”.</p>
<p><a href="http://blogit.create.pt/tiagooliveira/wp-content/uploads/sites/101/2014/10/SSO1_2.png"><img decoding="async" style="padding-top: 0px;padding-left: 0px;padding-right: 0px;border-width: 0px" title="SSO1_2" src="http://blogit.create.pt/tiagooliveira/wp-content/uploads/sites/101/2014/10/SSO1_2_thumb.png" alt="SSO1_2" width="499" height="263" border="0" /></a></p>
<p>The application creation wizard starts. Choose “next”.</p>
<p><a href="http://blogit.create.pt/tiagooliveira/wp-content/uploads/sites/101/2014/10/SSO1_3.png"><img decoding="async" style="padding-top: 0px;padding-left: 0px;padding-right: 0px;border-width: 0px" title="SSO1_3" src="http://blogit.create.pt/tiagooliveira/wp-content/uploads/sites/101/2014/10/SSO1_3_thumb.png" alt="SSO1_3" width="501" height="263" border="0" /></a></p>
<p>For 1 on 1 credential mapping, select “Individual” application Type. To read about all mapping types, check <a href="http://msdn.microsoft.com/en-us/library/aa578204.aspx">http://msdn.microsoft.com/en-us/library/aa578204.aspx</a>.<br />
Select the application name, description and leave the other options unchecked (if you are using dev or single server, check the option “Allow local accounts for access accounts”).</p>
<p><a href="http://blogit.create.pt/tiagooliveira/wp-content/uploads/sites/101/2014/10/SSO1_4.png"><img decoding="async" style="padding-top: 0px;padding-left: 0px;padding-right: 0px;border-width: 0px" title="SSO1_4" src="http://blogit.create.pt/tiagooliveira/wp-content/uploads/sites/101/2014/10/SSO1_4_thumb.png" alt="SSO1_4" width="502" height="376" border="0" /></a></p>
<p>Set the Windows group that will manage this Affiliate Application in the “Application Administrators” picker.<br />
Set the windows group for which mappings can be created in “Application Users” picker.<br />
You can check more about this configurations in <a href="http://msdn.microsoft.com/en-us/library/aa561561.aspx">http://msdn.microsoft.com/en-us/library/aa561561.aspx</a>.</p>
<p><a href="http://blogit.create.pt/tiagooliveira/wp-content/uploads/sites/101/2014/10/SSO1_5.png"><img decoding="async" style="padding-top: 0px;padding-left: 0px;padding-right: 0px;border-width: 0px" title="SSO1_5" src="http://blogit.create.pt/tiagooliveira/wp-content/uploads/sites/101/2014/10/SSO1_5_thumb.png" alt="SSO1_5" width="502" height="373" border="0" /></a></p>
<p>In the Options menu check the following options:</p>
<ul>
<li style="list-style-type: none">
<ul>
<li>Enabled.</li>
<li>Allow Windows initiated SSO.</li>
<li>Tickets Allowed (with all ticket options selected).</li>
<li>Application Users cannot create mappings (only a security measure).</li>
</ul>
</li>
</ul>
<p>A ticket is a kind of SSO encrypted context, that contains the request user domain and username and the ticket expiration time.<br />
You can check more info about SSO tickets in  <a href="http://msdn.microsoft.com/en-us/library/aa578039.aspx">http://msdn.microsoft.com/en-us/library/aa578039.aspx</a>.</p>
<p><a href="http://blogit.create.pt/tiagooliveira/wp-content/uploads/sites/101/2014/10/SSO1_6.png"><img decoding="async" style="padding-top: 0px;padding-left: 0px;padding-right: 0px;border-width: 0px" title="SSO1_6" src="http://blogit.create.pt/tiagooliveira/wp-content/uploads/sites/101/2014/10/SSO1_6_thumb.png" alt="SSO1_6" width="514" height="383" border="0" /></a></p>
<p>In the fields menu, you must choose the destiny application attributes to map in this SSO affiliate application.<br />
I have created 3 attributes (Mapped User, Password and Domain).<br />
The User ID mapping is created by default and is a mapped credential unique key.<br />
The masked attribute is used for the password fields, and the synchronized attribute determines that the field is used for password synchronization.</p>
<p><a href="http://blogit.create.pt/tiagooliveira/wp-content/uploads/sites/101/2014/10/SSO1_7.png"><img decoding="async" style="padding-top: 0px;padding-left: 0px;padding-right: 0px;border-width: 0px" title="SSO1_7" src="http://blogit.create.pt/tiagooliveira/wp-content/uploads/sites/101/2014/10/SSO1_7_thumb.png" alt="SSO1_7" width="517" height="384" border="0" /></a></p>
<p>The affiliate application is created successfully.</p>
<p><a href="http://blogit.create.pt/tiagooliveira/wp-content/uploads/sites/101/2014/10/SSO1_8.png"><img decoding="async" style="padding-top: 0px;padding-left: 0px;padding-right: 0px;border-width: 0px" title="SSO1_8" src="http://blogit.create.pt/tiagooliveira/wp-content/uploads/sites/101/2014/10/SSO1_8_thumb.png" alt="SSO1_8" width="516" height="382" border="0" /></a></p>
<p>After creating the affiliate application it’s very easy to create a mapped credential.<br />
Just go to the Affiliate Applications menu, select the previously created “TestApp” application and “New Mapping” option.</p>
<p><a href="http://blogit.create.pt/tiagooliveira/wp-content/uploads/sites/101/2014/10/SSO1_9.png"><img decoding="async" style="padding-top: 0px;padding-left: 0px;padding-right: 0px;border-width: 0px" title="SSO1_9" src="http://blogit.create.pt/tiagooliveira/wp-content/uploads/sites/101/2014/10/SSO1_9_thumb.png" alt="SSO1_9" width="518" height="272" border="0" /></a></p>
<p>In the “Create New Mapping” menu select the windows account to map and the unique destiny account name to map.<br />
Check the “Set credentails for this mapping” option.</p>
<p><a href="http://blogit.create.pt/tiagooliveira/wp-content/uploads/sites/101/2014/10/SSO1_10.png"><img decoding="async" style="padding-top: 0px;padding-left: 0px;padding-right: 0px;border-width: 0px" title="SSO1_10" src="http://blogit.create.pt/tiagooliveira/wp-content/uploads/sites/101/2014/10/SSO1_10_thumb.png" alt="SSO1_10" width="528" height="262" border="0" /></a></p>
<p>In the Set Credentials menu, set the mapped data.<br />
The user id can be used to store the mapped user data, but beware because user id must be unique. So I have created the MappedUser field, because I can have multiple source accounts to map to the same destiny account data.</p>
<p><a href="http://blogit.create.pt/tiagooliveira/wp-content/uploads/sites/101/2014/10/SSO1_11.png"><img decoding="async" style="padding-top: 0px;padding-left: 0px;padding-right: 0px;border-width: 0px" title="SSO1_11" src="http://blogit.create.pt/tiagooliveira/wp-content/uploads/sites/101/2014/10/SSO1_11_thumb.png" alt="SSO1_11" width="534" height="262" border="0" /></a></p>
<p>The new mapped credential appears in the “TestApp” affiliate application mapped credentials.</p>
<p><a href="http://blogit.create.pt/tiagooliveira/wp-content/uploads/sites/101/2014/10/SSO1_12.png"><img decoding="async" style="padding-top: 0px;padding-left: 0px;padding-right: 0px;border-width: 0px" title="SSO1_12" src="http://blogit.create.pt/tiagooliveira/wp-content/uploads/sites/101/2014/10/SSO1_12_thumb.png" alt="SSO1_12" width="533" height="200" border="0" /></a></p>
<p>In the next post I will show how to get the mapped credentials data by code, to use for example in a BizTalk Orchestration or Pipeline.</p>
<p>The post <a href="https://blogit.create.pt/tiagooliveira/2014/10/30/biztalk-server-single-sign-on-configuration/">BizTalk Server Single Sign On Configuration</a> appeared first on <a href="https://blogit.create.pt">Blog IT</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blogit.create.pt/tiagooliveira/2014/10/30/biztalk-server-single-sign-on-configuration/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
	</channel>
</rss>
