Enable SSO

About Host Names

Using the Host Names feature, you can:

When you use a URL to access GE Digital APM, you can access the data sources that are mapped to the host name. For example, if two data sources (data_source1 and data_source2) are associated with a GE Digital APM server, you can create two different URLs (https://data_source1/meridium/index.html and https://data_source2/meridium/index.html) using the host names that are mapped to the data sources. If you log in to GE Digital APM with https://data_source1/meridium/index.html or https://data_source2/meridium/index.html, you can access data_source1 or data_source2, respectively.

In the Host Names page, you can add multiple host names. However, only the host name of the URL with which you have logged in to GE Digital APM is listed.

Enable SSO On Site Authentication Using Active Directory

Procedure

  1. Run the LDAP Synchronization Process Manually or Schedule a LDAP Synchronization Process .
  2. Log out of GE Digital APM.
  3. Log in to GE Digital APM with the Windows user name and password.
    You are logged in.

Results

  • SSO On-Site Authentication is enabled.

What To Do Next

Enable SSO Off-Site Authentication Using GE Digital APM Server Setup

About This Task

Note: The settings shown below may vary depending on your system.

Procedure

  1. In the module navigation menu, select Admin > Operations Manager > Host Names.
    The Host Names page appears.

  2. In the left pane, select .
    The workspace for a new host name appears, displaying default values.

  3. In the Name box, replace the default text with the GE Digital APM Server's fully qualified hostname.
  4. In the IDP URL box, replace the default text with the SAML Issuer ID that is specified on the IDP.
  5. Select the SSO Enabled check box.
  6. Select .
    The host name is saved.
  7. Log out of GE Digital APM.
  8. On the GE Digital APM Server, in the GE Digital APM program files, navigate to the folder ..\ApplicationServer\api.
    Note: If you installed the software in the default location, the folder location will be C:\Program Files\Meridium\ApplicationServer\api.
  9. Replace the text urn:componentspace:MvcExampleIdentityProvider with the SAML Issuer ID that is specified on the IDP.
    Note: The settings in saml.json must be configured to match the environment to which you are connecting. For example, the URL listed in SingleSignOnServiceUrl should point to the URL where you want to authorize the users.
  10. Modify the assertion and response signing settings to match the signing settings that are specified on the IDP, and then save and close the file.
  11. In your system's IDP, specify urn:componentspace:Meridium as the Audience Restriction.
    Note: If the IDP is doing assertion and/or response signing, then the IDP signature algorithm must be SHA1.
  12. Place the idp.cer file in the following location C:\Program Files\Meridium\ApplicationServer\api.
    Note: The idp.cer file should be obtained from the team responsible for setting up the SAML Identity Provider (IDP).
  13. Reset IIS.
    IIS is reset.
  14. Access GE Digital APM via a web browser.
    The user is logged in, and SSO off-site authentication is enabled.

What To Do Next