Configure allowed referers

For the steps to configure allowed referers, see Configure allowed referers.

Assign roles to users and groups

Click to know the steps to assign roles to users and groups.

Enable SSO using SPNEGO

You can use Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO) to enable single sign-on (SSO) when using Active Directory as your LDAP server in a Windows environment. When SSO is enabled, the AEM forms user login pages are not required and do not appear.

You can also enable SSO by using HTTP headers. (See Enable SSO using HTTP headers.)

NOTE
AEM Forms on JEE does not support configuring SSO using Kerberos/SPNEGO in a multiple child domain environments.
  1. Decide which domain to use to enable SSO. The AEM Forms Server and the users must be part of the same Windows domain or trusted domain.

  2. In Active Directory, create a user who represents the AEM Forms Server. (See Create a user account.) If you are configuring more than one domain to use SPNEGO, ensure that the passwords for each of these users is different. If the passwords are not different, SPNEGO SSO does not work.

  3. Map the service principal name. (See Map a Service Principal Name (SPN).)

  4. Configure the domain controller. (See Prevent Kerberos integrity-check failures.)

  5. Add or edit an enterprise domain as described in Adding domains or Editing and converting existing domains. When you create or edit the enterprise domain, perform these tasks:

    • Add or edit a directory that contains your Active Directory information.

    • Add LDAP as an authentication provider.

    • Add Kerberos as an authentication provider. Provide the following information on the New or Edit Authentication page for Kerberos:

      • Authentication Provider: Kerberos
      • DNS IP: The DNS IP address of the server where AEM forms is running. You can determine this IP address by running ipconfig/all on the command line.
      • KDC Host: Fully qualified host name or IP address of the Active Directory server used for authentication
      • Service User: The service principal name (SPN) passed to the KtPass tool. In the example used earlier, the service user is HTTP/lcserver.um.lc.com.
      • Service Realm: Domain name for Active Directory. In the example used earlier, the Domain name is UM.LC.COM.
      • Service Password: Service user’s password. In the example used earlier, the service password is password.
      • Enable SPNEGO: Enables the use of SPNEGO for single sign-on (SSO). Select this option.
  6. Configure SPNEGO client browser settings. (See Configuring SPNEGO client browser settings.)