2.3 KiB
		
	
	
	
	
	
	
	
			
		
		
	
	
			2.3 KiB
		
	
	
	
	
	
	
	
title
| title | 
|---|
| Zammad | 
Support level: Community
What is Zammad
Zammad is a web-based, open source user support/ticketing solution. Download and install it on your own servers. For free.
Preparation
The following placeholders will be used:
zammad.companyis the FQDN of the zammad install.authentik.companyis the FQDN of the authentik install.
authentik Configuration
Step 1 - Property Mappings
Create two Mappings (under Customisation/Property Mappings) with these settings:
name mapping
- Name: Zammad SAML Mapping: name
 - SAML Attribute Name: name
 - Friendly Name: none
 - Expression: 
return request.user.name 
email mapping
- Name: Zammad SAML Mapping: email
 - SAML Attribute Name: email
 - Friendly Name: none
 - Expression: 
return request.user.email 
Step 2 - SAML Provider
In authentik, create a SAML Provider (under Applications/Providers) with these settings :
- Name : zammad
 - ACS URL: 
https://zammad.company/auth/saml/callback - Issuer: 
https://zammad.company/auth/saml/metadata - Service Provider Binding: Post
 - Audience: 
https://zammad.company/auth/saml/metadata - Property mappings: Zammad SAML Mapping: name & Zammad SAML Mapping: email
 - NameID Property Mapping: Zammad SAML Mapping: name
 
Step 3 - Application
In authentik, create an application (under Resources/Applications) with these settings :
- Name: Zammad
 - Slug: zammad
 - Provider: zammad
 
zammad Setup
Configure Zammad SAML settings by going to settings (the gear icon), and selecting Security -> Third-party Applications and activate Authentication via SAML and change the following fields:
- Display name: authentik
 - IDP SSO target URL: https://authentik.company/application/saml/zammad/sso/binding/init/
 - IDP single logout target URL: https://zammad.company/auth/saml/slo
 - IDP certificate: ----BEGIN CERTIFICATE---- …
 - IDP certificate fingerprint: empty
 - Name Identifier Format: empty