Technology Blogs by Members
Explore a vibrant mix of technical expertise, industry insights, and tech buzz in member blogs covering SAP products, technology, and events. Get in the mix!
cancel
Showing results for 
Search instead for 
Did you mean: 
cosmo83
Active Participant
3,986

In continuation of our previous blog post , we will be focusing on adding the attributes which are being used by SAP CloudFoundry. This will be helpful for you to focus on transferring the groups and their access rights into the applications, whether they are a Simple Ui5 App, or a REST/ODATA API or it could be a Fiori Launchpad with a set of UI5 Apps embedded in them



The following are the attributes that get transferred from SAML to your Application.

























User Attribute Assertion Attribute
First Name first_name
Last Name last_name
E-Mail mail
Groups Groups

We will have to configure our keycloak instance to pass the same to SAP XSUAA which will transfer the same to our Application(s)

Lets go back to our Clients to the Realm we have created in the previous tutorial and to the client we have created in our previous section.


Please use the mappers tab, to map your SAML attributes.


The mappings are already created as you can see in the screenshot. I will go into detail on two types of attributes.

  • User Property Mapper -> email, firstName, lastName


 




 

  • Group Mapper -> groups



 

Now that SAML Attributes are mapped. Lets see how we can map the groups from KeyCloak -> Roles Assignment in SAP CF.

You can create the User Groups and assign the same to user.



Now mapping this roles in SAP Cloudfoundry..

 

Backt to my Trust Management and configuring the roles to SAML. User in portal_admin will be assigned the Role Collection of AGX_PORTAL_ADMIN and so on..


 

In the final post we will be discussing about some more features like enabling social logins like facebook / Google /Twitter for keycloak and impersonate user identities.
2 Comments
Labels in this area