This article describes how to set up access to Nexus GO Signing with Azure Active Directory as identity provider (IDP).
The configuration is done in three steps: first preparation in Azure Active Directory, then in Nexus GO Signing and then configuration is completed in Azure Active Directory.
Prerequisites
Prerequisites
In Azure Active Directory:
In Nexus GO:
- PDF Signing environment created in Nexus GO.
In Azure Active Directory, do the configuration to set up Nexus GO Signing as an Enterprise application using SAML 2.0 federation.
Configure Enterprise application
- Go to Azure Active Directory, click Enterprise applications.
- Click New application and Non-gallery application.
- Enter a Name, for example Nexus GO Signing, click Add.
- In Quick Start, click Single sign-on.
- In the drop-down list Single Sign-on Mode, choose SAML-based Sign-on.
- Under bullet number 3. User Attributes, check View and edit all other user attributes.
- Click Add attribute, Name=emailaddress, Value=user.mail, click OK.
- Click Add attribute, Name=displayname, Value=user.displayname, click OK.
- Optional: Click Add attribute, Name=role, Value=user.assignedroles, click OK.
- Optional: Remove attributes not used in federation (surname, givenname, name etc).
- Scroll down to bullet number 4. SAML Signing Certificate. In column Download, click Metadata XML, and save it for next step ("Configure in Nexus GO").
- Stay on this web page but open a new tab.
This example uses a custom administrator role, configured for the service, to determine which users/groups that will get admin access in Nexus GO Signing. There are other ways to do this, for example, to use other attributes from Azure Active Directory, such as department or title.
Set up Nexus GO Signing to use Azure Active Directory as identity provider.
Set up local IDP
- In the Nexus GO administration portal, click Services and Signing.
- Select your PDF Signing environment.
- Click Set up local IDP
- Enter a Display Name (this is shown within the signing- and admin-portal), and upload IDP SAML Metadata that was downloaded from the Azure Portal in previous step. Click Next.
Configure SAML mappings then click Next, our example:
email | emailaddress |
displayName | displayname |
Optional: Configure Role mappings then click Next, our example:
Role mappings | Attribute | Value |
Contributor | role | signadmin |
The role Contributor gives a user access to the admin portal and possibility to create signing requests. To add multiple values, use the +.
If the check-box Everyone from this IDP is a contributor is selected, all users authenticating through the IDP will get access to the Nexus GO administration portal.
- Confirm your configuration and click Submit.
- Now back at the overview of your PDF Signing environment, at SAML SP Metadata, click Download.
- Copy Logon URL to clipboard.
In Azure Active Directory, continue to configure Nexus GO Signing as an Enterprise application.
Continued configuration in Azure Portal
- Go back to the Azure Portal tab.
- Under bullet number 2. Nexus GO PDF Signing Domain and URLs, click Upload metadata file, and select the SAML SP Metadata downloaded from Nexus GO.
- In Sign on URL, paste Logon URL from clipboard.
- Click Save.
Change Enterprise application properties
Configure appearance and make the application visible to end users.
Change properties of the Enterprise application
- Go to Azure Active Directory, click Enterprise applications.
- Click Nexus GO PDF Signing.
- Click Properties.
- Upload one of the logotypes (215x215 pixels PNG format, first download and save the wanted logotype).
- User assignment required – If yes, assign users and/or groups manually in Users and groups menu.
- Visible to end users – If yes, assigned users will see the application on their access panel and Office 365 app launcher.