Enabling SSO connections with your OVHcloud account

Find out how to link your ADFS to your OVHcloud account using SAML 2.0

Last updated 13th October 2022

Objective

You can use single sign-on (SSO) to connect to your OVHcloud account. To enable these connections, your account and your Active Directory Federation Services (ADFS) have to be configured using Security Assertion Markup Language (SAML) authentications.

This guide explains how to link your OVHcloud account to an external Active Directory.

Requirements

Instructions

In order for a service provider (i.e. your OVHcloud account) to perform an SSO connection with an identity provider (i.e. your ADFS), the essential part is to establish a mutual trust relationship.

Establishing ADFS trust

Your ADFS acts as your identity provider. Authentication requests by your OVHcloud account will only be accepted if it is declared as a trusted party first.

In the Active Directory context, this means adding it as Relying Party Trust.

From your Server Manager, open the Tools menu and select AD FS Management.

Windows Server tools menu

Click on Relying Party Trusts.

ADFS Menu

Then click on Add Relying Party Trust....

ADFS relying party trusts menu

Select Claims aware and confirm with the Start button.

ADFS add relying party trust step 1

Here you can enter the relying party information manually or import it from a metadata file.

Importing the OVHcloud SP metadata

You can obtain the appropriate metadata file via the following links:

Select Import data about the relying party from a file and select your metadata file.

Then click the Next button.

ADFS add relying party trust step 2

Enter a display name for the relying party and click the Next button.

ADFS add relying party trust step 3

Click Next in the Access Control window.

ADFS add relying party trust step 4

Click Next again to proceed.

ADFS add relying party trust step 5

Click the Close button in the last window. The OVHcloud relying party trust is now added to your ADFS.

ADFS relying party trusts

With OVHcloud added as trusted relying party, you should be able to log in via an SSO connection already. However, any information about the identity of the user (in terms of the SAML "assertion") will remain unavailable until you configure a policy to map Active Directory LDAP fields to the attributes in the SAML assertion.

Mapping LDAP attributes to SAML attributes

Click on the OVHcloud relying party trust entry.

ADFS relying party trust mapping step 1

Then click on Edit Claim Issuance Policy....

ADFS relying party trust mapping step 2

Click the Add Rule... button.

ADFS relying party trust mapping step 3

Click Next.

Enter a rule name, then define your mapping.

Select "Active Directory" as "Attribute store".

The following settings can be configured freely in order for the Active Directory LDAP data to be read correctly by the service provider. You can refer to the image below as an example.

When you are done, click the Finish button.

ADFS relying party trust mapping step 4

ADFS relying party trust mapping step 5

Click the Apply button and confirm with OK.

ADFS relying party trust mapping step 6

With the mapping completed, your ADFS now trusts OVHcloud as a service provider. The next step is to ensure that the OVHcloud account trusts your ADFS as identity provider.

Establishing OVHcloud account trust and configuring the connection

Adding your ADFS as a trusted identity provider is done in the OVHcloud Control Panel where you can provide the identity provider metadata.

Log in and click on your profile in the top-right corner.

OVHcloud top menu

Click on your name to access your profile management page.

OVHcloud user infos

Open the User management tab.

OVHcloud profile menu

Click on the SSO Login button.

OVHcloud connect SSO step 1

Fill in the XML metadata of your ADFS. The "Group Attribute Name" is optional in this case. Click on Confirm.

OVHcloud connect SSO step 2

You should now see your ADFS as identity provider, as well as the default groups.

OVHcloud connect SSO step 3

Click the link below SSO service URL to view more information on it.

OVHcloud connect SSO step 4

OVHcloud connect SSO step 5

The ... button enables you to update or delete the SSO, and to see details.

OVHcloud connect SSO step 6

The trust of your ADFS as identity provider is thus established but you still have to add groups to your OVHcloud account.

If you try to connect at this stage via SSO, you will probably receive a Not in valid groups error message.

That is because your OVHcloud account checks if the authenticating user belongs to a group that actually exists on the account.

To resolve this, verify which information is mapped to the "Group" attribute that your ADFS returns.

Consider the following example of the user "John Doe" from your Active Directory as shown in the image below.

ADFS user

Next, check the mapping in ADFS:

ADFS relying party trust mapping

In this example, the "Group" attribute sent back by the Active Directory for the user "John Doe" is "title". This corresponds to the "job title" which is manager@<my-domain>.com.

You can also verify this in the SAML assertion:

<AttributeStatement>
    <Attribute Name="http://schemas.xmlsoap.org/claims/Group">
        <AttributeValue>manager@<my-domain>.com</AttributeValue>
    </Attribute>
    ...
</AttributeStatement>

This means that you need to add the manager@<my-domain>.com group to your OVHcloud account, attaching a role to it. Otherwise, your OVHcloud account wouldn't know what is the user allowed to do.

Add it by clicking on the Declare a group button and filling in the fields:

ADFS user management groups

ADFS user management groups

You can then check that the group is added to your OVHcloud account in the Groups section:

ADFS user management groups

When you connect with the Active Directory user "johndoe" now, your OVHcloud account will recognize that the user has the "REGULAR" role, specified by its group.

You can then disconnect from your account and log in again with your ADFS as identity provider.

Connect via SSO

On the OVHcloud login page, enter your NIC handle followed by /idp without entering a password, and click the Login button.

OVHcloud federation login

You are then redirected to your ADFS login page. Enter a login/password of a user of your LDAP Active Directory, then click the Sign in button.

OVHcloud federation login ADFS redirection

You are now logged in with the same NIC handle, but via your Active Directory user and using your ADFS SSO.

OVHcloud user infos federation

Go further

Creating an OVHcloud account

Securing my OVHcloud account and manage my personal information

Setting and managing an account password

Securing your OVHcloud account with two-factor authentication

Join our community of users on https://community.ovh.com/en/.


Did you find this guide useful?

Please feel free to give any suggestions in order to improve this documentation.

Whether your feedback is about images, content, or structure, please share it, so that we can improve it together.

Your support requests will not be processed via this form. To do this, please use the "Create a ticket" form.

Thank you. Your feedback has been received.


These guides might also interest you...

OVHcloud Community

Access your community space. Ask questions, search for information, post content, and interact with other OVHcloud Community members.

Discuss with the OVHcloud community

In accordance with the 2006/112/CE Directive, modified on 01/01/2015, prices incl. VAT may vary according to the customer's country of residence
(by default, the prices displayed are inclusive of the UK VAT in force).