Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Section
Column

 is a multi-tenant application. Tenants allow you to segregate groups of users and roles. Users from one tenant cannot access users in any other tenant. Note: this does not apply to public forms/flow which do not require login access to a tenant.

The  In-house superuser admin can create as many tenants on your form server as needed. Once the superuser admin creates the tenant, the tenant admin user can then login to manage the tenant, configure LDAP, add users & roles, etc. See the Admin Home Page for differences between the superuser admin and tenant admin. 

Info

trial tenants in the cloud are initially configured with the frevvo Default security Manager. Once you have purchased your license, seamless migration of forms/flows, users and roles and submissions is possible if you want to switch the security manager of your tenant.

Tenants using the Default Security Manager can be migrated to:

  • Default Security Manager → LDAP
  • Default Security Manager → SAML
  • LDAP → SAML

If you are planning to switch the Security Manager of your tenant to the LDAP Security Manager or a tenant using the SAML security manager and you are using LDAP for authentication, here's what we recommend:

  • Make sure the users created in the default security manager tenant have the same user names as the users in your LDAP server..
  • Migration of your trial tenant to LDAP or SAML or from an LDAP to SAML security manager automatically syncs your existing frevvo default security manager username accounts with your LDAP or SAML security manager username accounts.
  • Users need the frevvo.User role to access . This should be configured in your Active Directory on your LDAP server.

Refer to the Edit Tenant topic to see how easy it is to change the security manager for your production tenant.

Column
width350px

On this page:

Table of Contents
maxLevel2

...

LDAP Configuration Properties

These are the properties used to configure the LDAP/Active Directory security manager. The properties in bold are required.

Property Description
Connection URLldap server url
Connection User

User to connect to LDAP. This user must have the proper permissions to read and run queries in the ldap server.

If using Active Directory, it is common to specify the domain. For instance, TEST\Administrator refers to the user Administrator in the TEST domain.

Connection PasswordPassword for the user defined in com.frevvo.security.ldap.connection.name.
Users BaseSearches for users will start from the ldap node specified by this property.If the value is empty the searches will start from the root domain.
Groups BaseSearches for the groups will start from the ldap node specified by this property. If the value is empty, searches will start from the root domain
UserId Display

User attribute that will be visible in frevvo. This is what will be displayed in the list of users a tenant admin sees and has to be unique in the server.

Another restriction is that the values for the attribute configured here cannot have spaces.

For instance, don't configure CN as the value since it can contain spaces in most systems.

GroupId Display

Group attribute that will be visible in frevvo. This is, for instance, what will be displayed in the list of groups a tenant admin sees or the groups used in workflows. This attribute has to be unique in the server.

 

Notify checkboxNotifications are emails sent by frevvo to workflows participants. If checked, notifications will be sent.
All Groups Filter

The expected value is an LDAP filter expression.

The expression should return the groups that will be available to be used in frevvo workflows. com.frevvo.security.ldap.groupIdDisplayAttribute

All Users Filter

The expected value is an LDAP filter expression. The expression should return the users that will be available to be used in frevvo work flows and authentication. com.frevvo.security.ldap.groupIdDisplayAttribute

User Member OfAttribute on a user object storing the groups the user is a member of.
Group MemberAttribute on a group object storing the users that are a member of this group.
First Name

Name of the user ''first name'' attribute

Last NameName of the user ''last name'' attribute.
Email
Name of the user ''email'' attribute in the LDAP server. This value can be used in a rule is used in email notifications
ManagerAttribute on a user object storing the DN of the user’s manager. This value can be retrieved in a rule or used in flow navigation using the subject.reports.to data available in .
Ignore Case checkboxIf checked,  ignores the case stored in LDAP systems, primarily for the purpose of determining roles.
CustomThis is a a comma separated list of attribute names to be retrieved from the LDAP Server.
TLSThis enables simple authentication over TLS. If checked, a trusted certificate for the LDAP server is required.

Sample Configurations

Property Active Directory Sample Configuration

OpenLDAP Sample Configuration

Connection URL

ldap://[your server]:[port, typically the default is 389 ]

ldap://[your server]:[port, typically the default is 389 ]

Connection User

[user name]

cn=admin,dc=test,dc=frevvo,dc=com
Connection Password

[user password]

[user password]

Users Base

CN=Users,DC=test,DC=windows,DC=frevvo,DC=com

DC=test,DC=frevvo,DC=com

Groups Base

CN=Users,DC=test,DC=windows,DC=frevvo,DC=com

DC=test,DC=frevvo,DC=com

UserId Display

sAMAccountName

uid

GroupId Display

sAMAccountName

entryDN

Notify checkbox

Check the Notifications checkbox

 
All Groups Filter

(objectClass=group)

( | (objectClass=groupOfUniqueNames)(objectClass=organizationalRole))

All Users Filter

(objectClass=user)

(objectClass=person)

Group Member

member

uniqueMember

 User Member Of

memberOf

" "

 First Name

givenName

cn

 Last Name

sn

sn

 Email

mail

mail

Manager

manager

manager 

Ignore CasCheck the Ignore Case checkboxCheck the Ignore Case checkbox
CustomcarLicense, employeeNamecarLicense
TLSCheck to secure the connection using TLSCheck to secure the connection using TLS

Refer to this documentation for more information and here for some troubleshooting tips. 

Configuring the LDAP Container Security Manager

...

Several additional steps are required to complete the LDAPCSM configuration. Return to Configuring the LDAP Container Security Manager for further instructions. \

Configuring the SAML Security Manager

...

  1. Log onto as the superuser (on-premise) or the tenant admin (cloud).
  2. Access the Add Tenant (on-premise) or Edit Tenant (cloud) screen.
  3. Select SAML Security Manager from the Security Manager Class dropdown.
  4. Copy the Service Provider (frevvo) metadata into the Service Provider field. The xml should be pasted without the prolog. For example, the image shows an example of the frevvo metadata file before pasting:
  5. Retrieve the metadata for your Identity Provider. For example, for the Shiboleth product the metadata is located in the idp-metadata file.
  6. Paste the IDP metadata into the Identity Provider field. This metadata should also be pasted without the prolog.
  7. Check the Ignore Case checkbox if you are using LDAP for authentication and you want to ignore the case stored in LDAP systems for users/roles. Refer to the Mixed or Upper case User Names topic for more information.
  8. Map the attributes configured in your Identity Provider by entering the name for each attribute in the corresponding field on the screen. Be sure to provide the attribute name - not the friendly name. Here is an example of the attribute-resolver.xml file in a Shibboleth IDP implementation.

...

  1. Image Modified
    The image below shows the attribute mapping on the screen with the

...

  1. attribute names from the Shibboleth file:

...

  1. Image Added

 

 

  1. Custom attributes can be retrieved from your Identity provider by typing the attribute names in the Custom field separated by a comma.
  2. Refer to this topic which discusses an example that pulls additional attributes from Active Directory into a form using business rules. 
  3. Click Submit. 
  4. Return here to see how to login to your SAML tenant. to Logging into LiveForms in a SAMLTenant for login instructions.

 

Edit Tenant

A tenant admin or a superuser admin can use the Tenant page to configure or edit information about a tenant. 

...