# OwnCloud

#### Introduction

* OwnCloud use SAML 2.0 to federate identities.

* In SAML terminology, there is a client application which is called Service Provider (SP) and an identity provider (IdP), here Trustelem.

    **Nota:** For more details about OwnCloud setup, contact us

#### Application configuration elements, on the SP side

* Definition of the pages where SSO authentication is enabled (LoginPath)

* Definition of the SAML URL for the SP side: Assertion Consumer Service (ACS)

* Definition of the identifier attribute (NameID) and its format

* Definition of the IdP (Trustelem) connection URLs

* Definition of the certificate(s) used for encryption and/or the signature of SAML content.  
  *Note: these configuration data can be requested in metadata.xml format.*

#### Application configuration elements, on the IdP side

* **EntityID:** application identifier → must be identical to what was indicated on the SP side

* **Assertion Consumer Service (ACS):** URL on the SP side for receiving SAML assertions generated by the IdP → must be identical to what was indicated on the SP side

* **NameID Attribute:** name of the attribute containing the user's identity in the SAML response provided by the IdP Trustelem to the SP application → must be identical to what was indicated on the SP side

* **NameID Format:** format of the NameID attribute. Except in special cases, use the default value → must be identical to what was indicated on the SP side

* **Attributes List:** additional attributes that can be embedded by the IdP into the SAML responses, and used by the application on the SP side

* **RelayState:** URL of the page to which the user should be redirected after authentication

* **Custom login URL:** URL used to initialize login via SAML 2.0 in the Trustelem user's dashboard

* **Custom scripting:** script to add/modify attributes in the SAML responses (example: attribute from the Active Directory)