School Configuration Guide - Authentication

Overview

Are you sure you want to remove this component?

Schools will need to configure a variety of settings for Authentication within Schoolbox. The information on this page is divided into the three available Authentication methods. If you use a Cloud instance, you have the option of using one of two available methods. If you are an Self-Hosted instance, you have the option of using one of three available methods.

Cloud optionsSelf-Hosted options

SAML

oAuth

LDAP

SAML

oAuth

This page will define each individual setting and how to populate each setting within your school's instance.

SAML

Are you sure you want to remove this component?

Setting up SAML authentication will allow you to achieve single sign on (SSO) for your users across the web. Your identity provider (iDP) will provide the authentication services for Schoolbox. Once your users are authenticated against the identity provider, they may proceed to Schoolbox and any other service providers that are registered.

NOTE: As the setup of SAML and SSO requires configuration to a specific URL, settings cannot be copied between your production and staging instance. It also means that each instance will require individual configuration if you wish to setup or test this method of logging in. SAML settings are not replaced during a Production to Staging sync for this reason.

1. Navigate to Administration > System Settings > SAML.

image.php?hash=1588c50897faaae0657c7d02d79f3986e5a547e8

2. Enter the 'Single Sign-On URL'. 

This is where Schoolbox will send Single Sign-On (SSO) requests. 

For example: 

Azure: login.microsoftonline.com/{set of numbers and letters}/saml2

Google: accounts.google.com/o/saml2/idp?idpid={your IDP ID}

CloudWork: {yourschool}-login.cloudworkengine.net/saml2/idp/SSOService.php

image.php?hash=cf1b5c51470c8087dcf5f766785c5b00730127c0

3. Enter the details for one of the options below.

Option 1

'Single Sign-On Identity Provider Metadata URL'. 

This URL is where the metadata for your Single Sign-On Identity provider is located.

image.php?hash=c112dc2ce5010410139c5ffc7ba90f2165c60b1e

Option 2

1. Enter the 'Single Sign-On IDP Certificate'. 

This is only required if your metadata URL does not inherently provide the certificate information or you require a different certificate than what is provided in the metadata URL. In circumstances where both are populated, the manually entered certificate will override the content of the metadata URL.

image.php?hash=966740f036351e7b19fabb5180da40297f214cfd

2. Enter the 'IDP Entity ID'. 

This is the unique identifier for the Identity Provider.

image.php?hash=2d82352230b1f78f66a3168e38a7832e47061d70

3. Enter the 'Schoolbox Entity ID'. 

This is the unique identifier for Schoolbox to use as its Entity ID.

image.php?hash=5cfe88cb2ebb129acbf2eb593ad754168f3e8d4b

NOTE: If this is not set, the URL for your instance will be used.

4. In Title for Single Sign-On, enter the text you want to display to the users. By default, it displays the text Login with Single Sign-On.   

5. In Icon for Single Sign-On, you can attach an icon to display at the left of the Single Sign-On title. 

6. Next, select the color for the Single Sign-On login button.

7. When done, select Save.

 

Further Configurable Options

If applicable, toggle and enter the relevant selection for kerberos. 

This is only needed if using kerberos authentication with SAML.

image.php?hash=287b327b92953c3f5cff597088137cc79ff03319

'Enable Single Logout' 

If toggled to ON, the logout performed in Schoolbox will be sent to the IDP to log the user out of all other services registered with that IDP.

image.php?hash=934e7cc245e709b40a16989b34d748263fbc85fd

'Single Sign-On Logout URL'

This is the URL that users will be redirected to upon logging out. 

For example: yourschool.schoolbox.com.au

image.php?hash=9d0997bd2a6ba8639effa22f9d28b14e75f3c4b1

'Single Logout URL Endpoint'. 

If your idP metadata is not provided or does not contain an SLO endpoint, configure here where SLO requests should go.

image.php?hash=25b4786ce63e7e3ecd999db65cb444fb3186d83b

NOTE: This is optional for all schools, but should be configured if your IDP metadata is not provided or it does not contain a SLO endpoint.

 

'Login with Single Sign-On only' 

If toggled to ON, users who visit the login screen will be redirected to the IDP for Single Sign-On via SAML.

image.php?hash=11a6d96d5ffe746e552685e9f95b7bdc3306a7e6

Administration > System Settings > Security and 'Allow users to login with email address'

If toggled to ON, users will be able to log in using either their username or email address.

image.php?hash=689d586ea293a09106882821ff083a3ebd6356ae

oAuth

Are you sure you want to remove this component?

1. Navigate to Administration > System Settings > oAuth Provider Configuration.

image.php?hash=26fc201543768159737a3149b130eecc6f5f8df6

2. Enter the 'oAuth Identity Provider URL'. 

This URL is where authentication requests are sent to and is the URL of your identity provider.

For Example:

Cloudwork: "https://yourschool-id.cloudworkengine.net/".

image.php?hash=017567726b65cc0dfb3a6e96e56fa71d89509260

3. Enter the 'oAuth Client ID' and 'oAuth Client Secret'. 

This is the Client ID and Secret required for authentication against the oAuth provider.

image.php?hash=6ac0c717fb360c3ba7edb3fe18270699b170be15

4. Enter the 'oAuth Identifying Claims'. 

This is a comma-separated list of claims within the JWT provided by the identity provider which may identify a user. One of these claim's values must match the username of a Schoolbox user.

image.php?hash=9585907cf52f5b3198fdc8cd8e536d92637aadd0

NOTE: Common values are "preferred_username", "upn" and "unique_name".

5. In Enable Single Sign-On via oAuth Identity Provider, you can toggle to ON to configure via the oAuth Identity Provider.

6. In Title for OpenID Connect, enter the text you want to display to the users. By default, it displays the text Login with OpenID Connect.   

7. In Icon for OpenID Connect, you can attach an icon to display at the left of the OpenID Connect title. 

8. Next, select the color for the OpenID Connect login button.

9. When done, select Save.

 

Further Configurable Options

Administration > System Settings > Security and 'Allow users to login with email address'

If toggled to ON, users will be able to log in using either their username or email address.

image.php?hash=689d586ea293a09106882821ff083a3ebd6356ae

LDAP

Are you sure you want to remove this component?

The LDAP Integration process enables passwords to be stored centrally in an existing user directory. When a user logs on, Schoolbox will first bind and search for the user in the LDAP tree. Upon finding the users CN the system will attempt to rebind to the LDAP server with the users CN and password. Currrently the user must exist in Schoolbox before they can login to the system, just adding the user into LDAP is not enough for the user to login to Schoolbox.

NOTE: The LDAP authentication is completed before the Schoolbox authentication. If a user exists in both LDAP and Schoolbox it will attempt the LDAP password first. If this fails, it will fallback to Schoolbox. If no password is stored in Schoolbox, the login will be denied. For this reason it is strongly recommended that there be at least one superuser that has a password stored locally on Schoolbox.

1. Navigate to Administration > System Settings > LDAP.

image.php?hash=897e3ae19901b8cb957685f67af4c6f92c8b9028

 

2. Toggle Enable LDAP Authentication to 'ON'.

image.php?hash=2992fb02a743900d63a7c6e8cd3fcfa99c8de3b0

3. Enter the 'LDAP Host'. 

This is where Schoolbox will find your AD server, e.g. ‘server.yourschool.vic.edu.au’

image.php?hash=2f629fdbf605237d6f14bbe9dd64fe07a174d6e5

4. Enter 'LDAP Username' and 'LDAP Password'. 

These are the credentials used to authenticate against your LDAP server to authenticate users.

image.php?hash=8382875c83c0eaf68db7392bb92e36b2390f9dd6

5. Enter the 'LDAP Search Base'. 

This will be used to identify where within your LDAP server Schoolbox searches for users. This is the base search path for username lookup.

image.php?hash=95bdcb7866dad284d8ecf523422ace7d59bbdbab

6. Enter 'LDAP Username Search Field'. 

This field is compared against the Schoolbox username for authentication.

image.php?hash=fd02c774053c28a7360e8bfec8d86f64b1f7c011

 

Further Configurable Options

'LDAP Search Filter'

This is a pre-filter to put onto LDAP login searches. For example, objectClass=User.

image.php?hash=b2a1f439ed3355fe0818109d5a12c865aa349bd1

 

'LDAP Alternate Host', 'LDAP Alternate Username' and 'LDAP Alternate Search Base'. 

These will act as the backup LDAP server details incase primary is inaccessible.

image.php?hash=d98bb4ba5b92f6309aaba8cf26c8d71ca6dbe072

 

'LDAP Tertiary Host', 'LDAP Tertiary Username' and 'LDAP Tertiary Search Base'. 

These will act as additional backup LDAP server details incase primary and secondary are both inaccessible.

image.php?hash=1f746daf6140f12ece85e24cb338abfc34c6bd31

 

'LDAP CA Certificate'. 

This is optional for schools if they want to use a specific certificate. Please note, this requires manual upkeep by the school when the certificate expires, or when circumstances within a school's infrastructure change where it would invalidate the certificate.

image.php?hash=7eafc2961e8d763a8dc926f4aed79d63d631b3fe

 

Administration > System Settings > Security and 'Allow users to login with email address'

If toggled to ON, users will be able to log in using either their username or email address.

image.php?hash=689d586ea293a09106882821ff083a3ebd6356ae