kiteworks

Before You Begin

Introduction

This document describes how to configure Oracle Identity Cloud Service to provide Single Sign-On (SSO) for kiteworks using SAML.

About kiteworks

The kiteworks app is a secure mobile file sharing and collaboration solution that increases business productivity, ensures data security, and compliance for current mobile workforce. It is designed for corporations and government agencies to make it easy for their employees to work securely inside and outside the office on any type of device.

After integrating kiteworks with Oracle Identity Cloud Service:

  • Users can access kiteworks using their Oracle Identity Cloud Service login credentials.
  • Users can start kiteworks using the Oracle Identity Cloud Service My Apps console.
  • Admins can assign and revoke user access to the kiteworks app using the Oracle Identity Cloud Service administration console.

What Do You Need?

  • An Oracle Identity Cloud Service account with authorization rights to manage apps and users (Identity Domain Administrator or Application Administrator).
  • A kiteworks account with authorization rights to configure federated authentication.

Configuring the kiteworks App in Oracle Identity Cloud Service

Use this section to register and activate the kiteworks app, and then assign users to the app.

Prerequisite Step

A dedicated domain name is required before you can register and activate the kiteworks app. You obtain that domain name from kiteworks.

The kiteworks domain name appears in the kiteworks home URL: https://<Domain_Name>.kiteworks.com that you received in an email from kiteworks.

Registering and Activating the kiteworks App

  1. Access the Oracle Identity Cloud Service administration console, select Applications, and then click Add.

  2. Click App Catalog.

  3. Search for kiteworks, and then click Add.

  4. In the App Details section, enter your kiteworks Domain Name, and then click Next.

    Note: This is the domain name value that you obtained while performing the steps in the "Prerequisite Step" section.

  5. Click Download Signing Certificate.

    Tip: Use this file later during the kiteworks configuration in the "Configuring SSO for kiteworks" section.

  6. Click Download Identity Provider Metadata. To learn about other methods you can use to access SAML metadata, see Access SAML Metadata.

    Tip: Use this file later during the kiteworks configuration in the "Configuring SSO for kiteworks" section.

  7. Click Finish. Oracle Identity Cloud Service displays a confirmation message.

  8. Click Activate, and then click Activate Application. Oracle Identity Cloud Service displays a confirmation message.

Assigning Users to the kiteworks App

  1. On the kiteworks app page in Oracle Identity Cloud Service, select Users, and then click Assign. The Assign Users window appears.

  2. Select users that you want to assign to kiteworks, and then click OK. Oracle Identity Cloud Service displays a confirmation message stating that the kiteworks app is assigned to the users that you selected.

    Note: Ensure that you assign only the federated users (not service provider Admin users) in Oracle Identity Cloud Service to avoid locking the kiteworks account.

Configuring SSO for kiteworks

  1. Access kiteworks as an administrator using the URL: https://<Domain_Name>.kiteworks.com.

  2. In the header menu of the kiteworks home page, click the Application icon, expand Authentication and Authorization, and then select SSO Setup. The SSO Setup page appears.

    Image img7.png displays the header menu of the kiteworks home page with application icon highlighted.

  3. Select the Setup SSO with SAML 2.0 option, use the following table to update the federated authentication attributes in the SAML Settings tab, and then click Save.

    This table lists the mandatory federated authentication attributes that you must set to complete the SSO configuration.
    Attribute Value
    Initiate AuthnRequest Select the check box.
    IDP Entity ID Enter the Entity ID/Issuer URL. Use the metadata file that you downloaded earlier to obtain the Entity ID/Issuer URL. The Entity ID/Issuer URL information is located in the first line of the metadata. See the "Registering and Activating the kiteworks App" section.
    Service Provider Entity ID Enter https://kiteworks.com.
    Single Sign-On Service URL Enter the Sign-in URL/SSO Endpoint: https://<IDCS-Service-Instance>.identity.oraclecloud.com/fed/v1/idp/sso.
    Sign AuthNRequest Select the check box.
    RSA Public Key Certificate Paste the certificate that you downloaded while registering kiteworks in Oracle Identity Cloud Service. See the "Registering and Activating the kiteworks App" section.

    Note: The kiteworks app can be accessed by a user who is assigned to the kiteworks app in Oracle Identity Cloud Service, even if the user does not have a kiteworks account.

Verifying the Integration

Use this section to verify that SSO works when initiated from Oracle Identity Cloud Service (IdP initiated SSO) and kiteworks (SP initiated SSO).

Verifying Identity Provider Initiated SSO from Oracle Identity Cloud Service

  1. Access the Oracle Identity Cloud Service My Profile console using the URL: https://<IDCS-Service-Instance>.identity.oraclecloud.com/ui/v1/myconsole.

  2. Log in using credentials for a user that is assigned to the kiteworks app. Oracle Identity Cloud Service displays a shortcut to kiteworks under My Apps.

  3. Click kiteworks. The kiteworks home page appears.

  4. In the upper-right corner of the header, confirm that the user that is logged in is the same for both kiteworks and Oracle Identity Cloud Service.

    This confirms that SSO that is initiated from Oracle Identity Cloud Service works.

Verifying Service Provider Initiated SSO from kiteworks

  1. Access kiteworks using the URL: https://<Domain_Name>.kiteworks.com, and then click Login via the external SSO provider. You are redirected to the Oracle Identity Cloud Service login page.

  2. Log in using credentials for a user that is assigned to the kiteworks app. The kiteworks home page appears.

  3. In the upper-right corner of the header, confirm that the user that is logged in is the same for both kiteworks and Oracle Identity Cloud Service.

    This confirms that SSO that is initiated from kiteworks works.

Troubleshooting

Use this section to locate solutions to common integration issues.

Known Issues

Oracle Identity Cloud Service displays the message, "You are not authorized to access the app. Contact your system administrator."

Cause 1: The SAML 2.0 integration between the Oracle Identity Cloud Service kiteworks app and kiteworks is deactivated.

Solution 1:

  • Access the Oracle Identity Cloud Service administration console, select Applications, and then select kiteworks.
  • In the App Details section, click Activate, and then click Activate Application. Oracle Identity Cloud Service displays a confirmation message.

Cause 2: The administrator revokes access for the user at the same time that the user tries to access the kiteworks app using Oracle Identity Cloud Service.

Solution 2:

  • Access the Oracle Identity Cloud Service administration console, select Applications, and then select kiteworks.
  • In the App Details section, select Users, and then click Assign to re-assign the user.

Unknown Issues

For unknown issues, contact Oracle Support:

  1. Go to https://support.oracle.com.

  2. Select Cloud Support, and then sign in with your support credentials.

  3. In the Cloud Dashboard, confirm that there are no planned outages in Oracle Identity Cloud Service, and then click Create Service Request.

  4. Select Oracle Identity Cloud Service as the service type.

  5. Complete your service request.