ShareFile is a secure content collaboration, file sharing and sync software that supports all the document-centric tasks and workflow needs of small and large businesses. The company also offers cloud-based or on-premises storage, virtual data rooms and client portals. ShareFile is owned by Citrix Systems. See https://www.sharefile.com. You can protect access to ShareFile by integrating ShareFile with Identity as a Service. Once integrated, users can use single sign-on to log in to their Freshworks account through Identity as a Service.
Note: This integration was tested using Identity as a Service version 5.37 and ShareFile. Other versions of ShareFile may require integration and configuration steps that differ from those documented in this procedure. For other versions of ShareFile , this integration guide may be used as an initial approach for integrating ShareFile. In the event of other issues, contact support@entrust.com for assistance.
Before you begin, open two browser windows. In one window, log in to your Sharefile administrator account. In the other window, log in to your IDaaS administrator account.
Copy the SAML Configuration from Identity as a Service
Log into your Identity as a Service administrator account.
Click
> Security > Applications. The Applications Lists page appears.
Under SAML Cloud Integrations, click SAML Configuration. The SAML Configuration dialog box appears.
This dialog box contains information you need to configure your SAML application for Identity as a Service authentication.
Do one of the following:
Leave this dialog box open to reference later in this procedure.
Copy the Entity ID, Single Sign-on URL, and Single Logout URL to a text file and save it to reference later in this procedure.
Note: Depending on the integration you are performing, you may not need all three of these SAML configuration values.
Copy a SAML signing certificate
Log in to your Identity as a Service administrator account.
Click
> Security > Applications. The Applications List page appears.
Under SAML Cloud Integrations, click SAML Signing Certificates. The SAML Signing Certificates page appears.
Click
next to the certificate to copy it to the clipboard.
You can additionally download the certificate and save it for future use.
Open a text editor, such as Notepad, and paste the contents of the certificate into the text file.
Save the file.
Note: Be sure to same the file with the .cer extension, for example, SAML_certifcate.cer.
Log in to your Sharefile administrator account. The Dashboard page appears.
Click Settings > Admin Settings. The Admin Overview page appears.
Expand Security and click Login & Security Policy. The Login & Security Policy page appears.
Scroll to Single sign-on / SAML 2.0 Configuration.
Open a text editor, such as Notepad, and copy and paste the following values:
Assertion Consumer Service (ACS) URL
SP-initiated Login URL
Leave this page open to return to later in this integration.
Scroll to Basic Settings, and do the following:
Set Enable SAML to Yes.
In the Sharefile Issuer / Entity ID field, copy the SP-Initiated Login URL without the /saml/login portion. For example,
The SP-Initiated Login URL is https://mydomain.sharefile.com/saml/login.
Copy https://mydomain.sharefile.com only, and paste it in the Sharefile Issuer / Entity ID field.
Under X.509 Certificate, click Change and paste the certificate file you copied in Step 2: Copy the SAML signing certificate from Identity as a Service.
In the Login URL field, enter the Single Sign-On URL you copied in Step 2: Copy the SAML signing certificate from Identity as a Service.
Scroll to Optional Settings and do the following:
Set Require SSO Login to Yes.
Set Enable Web Authentication to Yes.
From the SP-Initiated Auth Context drop-down lists, select User Name and Password and Minimum.
Click Save.
In Identity as a Service, click
> Security > Applications.
The Applications Lists
page appears.
Click Add. The Select an Application Template page appears.
Do one of the following:
Select SAML Cloud Integrations from the search drop-down list and scroll to find the application you want to add to IDaaS.
- or -
In the Search bar, enter a search option to filter for the application you want to add to IDaaS.
Click Sharefile. The Add Sharefile page appears.
Enter an Application Name.
Enter an Application Description.
Optional. Add a custom application logo.
Click
next to Application Logo. The Upload Logo dialog box appears.
Click
to select an image file to upload.
Browse to select your file and click Open. The Upload Logo dialog box reappears showing your selected image.
If required, resize your image.
Click OK.
Select the Authentication Flow that appears to users during login.
Click Next. The General page appears.
In the Default Assertion Consumer Service URL, paste the Assertion Consumer Service URL you copied in Step 1: Copy the Assertion Consumer Service URL and Entity ID URLs from Sharefile.
In the Service Provider Entity ID (Issuer) field, paste the SP-initiated Login URL you copied in Step 1: Copy the Assertion Consumer Service URL and Entity ID URLs from Sharefile.
Enter the SAML Session Timeout to the time when the SAML Assertion times out. The maximum is 720 minutes.
Enter the Max Authentication Age (seconds) to set the maximum amount of time that can elapse before a user is required to reauthenticate during a new login attempt. This applies for both SP-initiated and IDP-initiated login. Set this field to -1 to disable this feature.
From the SAML NameID Attribute drop-down list, select Email.
From the SAML NameID Encoding Format drop-down list, select Email.
From the SAML Signing Algorithm drop-down list, select SHA256.
From the SAML Signing Certificate from the drop-down list, select the SAML Signing Certificate.
Optional: Select Respond Immediately for Unsuccessful Responses to return to the application immediately after a login failure, rather than allow user to try again with a different userID.
Deselect Enable Go Back Button if you do not want users to be able to go back to the Sharefile login page to log in.
Leave the remaining settings at the default values.
Click Submit.
Testing Service Provider Login
Open a Web browser and enter the URL for your Sharefile account.
On the Login page, click SSO Login. You are directed to Identity as a Service.
Respond to the second-factor authentication challenge. If you respond successfully, you are logged in to the Keeper Security Console Home page.
Testing Identity as a Service redirect log in
Log in to your Identity as a Service account.
Go to your My Profile page if you are not already there.
Under Applications, click Sharefile.
Respond to the second-factor authentication challenge. If you respond successfully, you are logged in to Keeper Security Console Home page.