on ‎2021 Aug 16 10:13 AM
Hi SAP Community,
We have a CAP application deployed in a cloud foundry subaccount on the SAP BTP. That subaccount has been configured to trust 3 identity providers so, when users go to the UI application URL, they get presented with the screen to choose which IdP to use.
Is there a way to specify which IdP the users should be directed to in the application code so that they don't see the IdP selection screen and just go straight to authenticating with the one we configure?
Thanks,
Johnnie.
Request clarification before answering.
sabaric No, we were not successful in achieving the functionality. Considering that this problem dates back a year, suggest to raise it with SAP and see whether anything new has been added?
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
@Ravi Joseravi.joseph - Yes, we have raised it with SAP and I shall also update this thread if we have any positive response back from SAP. Thanks responding though!
Thanks Ivan, I am looking to get this functionality working for a site created using BTP CF Launchpad service. Will there be a possibility to modify the Approuter config file for the standard launchpad service site?
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
ivan.mirisola Hi Ivan is the SAML2IDP applicable for CF based apps? we have been trying to access our the Launchpad site using this paremeter unsuccesfully.
https://xxx.launchpad.cfapps.xxxx.hana.ondemand.com/site/xxxx?saml2idp=sap.custom
Jo
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Hi Ravi Joseph,
No, for CF apps you should use AppRouter's configuration file to redirect to different IdPs.
This is described here:
https://answers.sap.com/answers/12910551/view.html
Best regards,
Ivan
Hi joachim.vanpraet ,
Apologies for reaching out directly but I saw that you provided an answer to a similar question here: Using multiple trust IDP (identity providers) in sap cloud foundry node.js application | SAP Communi.... You show a property in the xs-app.json file called "identityProvider" however it isn't clear from the documentation where the value of this property comes from. Could you let me know where to find the correct value please?
I've asked the development team to test it out using the Name as configured in the subaccount trust settings but it would be very helpful if you could let me know your thoughts on the above in the meantime.
Thanks,
Johnnie
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Hi ,
Yes, there is. When you have two IdPs registered, one of them is set as default - whenever you enter your credentials and hit enter, it will be the IdP used.
If you wish to open an application on Neo directly specifying the IdP to be used on the URL, you could use this:
https://<app name>.hana.ondemand.com/index.jsp?saml2idp=<idp name>
or
https://<launchpad-instance>.cfapps.<btp-landscape>.hana.ondemand.com/portal.portal/site?
saml2idp=#Shell-home
If you wish to open an application in CF, then you must use the AppRouter's configuration file, like so:
Here you may find a complete example:
https://answers.sap.com/answers/12910551/view.html
If you don't want to use any of the above mentioned approaches, you can also think about IdP Initiated SSO - where you first logon into your IdP's URL and it will present you a list of Service Providers - one of them being your Application deployed on BTP. When clicked, the application will open without requesting any additional authentication.
Best regards,
Ivan
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Hi Ivan,
Thank you for the response - I've tried the solution you suggestions however I still get redirected to the /login page. The URL I'm using has the form shown below which has a few differences to the one you suggested:
https://<app name>.hana.ondemand.com/<app route>/index.html?saml2idp=<IdP name>
The application is hosted in the Cloud Foundry environment and is an HTML one - would any of this suggest your above solutions wouldn't work or do I need to continue trying different variations of the URL?
I'll look into IdP-initiated SSO but I think there would be a few challenges for using it in our scenario, although it's definitely worth looking into in case the alternatives don't work out.
Thanks again for your suggestions on this,
Johnnie.
Hi hubbardj001,
Could you paste the URL again here as CODE instead of plain text? I cannot really review it in the way it is as the editor removes some of the special characters.
In addition to it, you are probably using an AppRouter application in front of it, correct?
If so, what is your xs-app.json configuration?
Best regards,
Ivan
Hi Ivan,
Ah right, apologies I didn't see the URL had been mangled - here it is as code as requested:
https://<app name>.eu10.hana.ondemand.com/<app route>/index.html?saml2idp=<idp name>
That's right, we're using an app router. I'll request the xs-app.json file from the development team and will share the relevant section shortly.
Thanks,
Johnnie.
Hi hubbardj001,
Please see the answer here on how to setup different routes in your app router to select a particular IdP:
Best regards,
Ivan
Hi ,
For the identityProvider property you should use the name entered on the "origin.key" field found in your Trust Configuration under your subaccount.
Best regards,
Ivan
| User | Count |
|---|---|
| 11 | |
| 7 | |
| 6 | |
| 5 | |
| 4 | |
| 4 | |
| 4 | |
| 3 | |
| 3 | |
| 3 |
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.