Skip to main content


MyWorkDrive application setup

This article demonstrates how to set up HelloID and MyWorkDrive for single sign-on using the SAML protocol. The configuration takes place in HelloID and MyWorkDrive.

  • HelloID environment

  • MyWorkDrive environment

Create or import a certificate

If there is no certificate yet, a certificate must be imported or created. For this tutorial, we will use a self-signed certificate. Create one before proceeding and name it MyWorkDriveSelfSigned.

Application setup
Add the MyWorkDrive application

Go to Applications > Applications and select the Open application catalog button. Find the template for MyWorkDrive and select its Add button. Learn more about managing applications here.

General tab

On the General tab, the default settings can be accepted.


Select the Next button.

Single Sign-on tab

On the Single Sign-On tab, select your previously-created MyWorkDriveSelfSigned certificate for the X509 Certificate drop down. All other settings can be left as default.


Select the Next button.

Self service tab

On the Self Service tab, choose whether to automatically create a Self Service product, which makes the application requestable. Select a group which will have access to the product. This is optional.


Select the Next button.

Finish tab

On the Finish tab, select the Save button to add the MyWorkDrive application to HelloID.

Configure the mapping set

By default, the user's HelloID {{user.contactEmail}} attribute is sent as the SAML NameID. If you wish to use another attribute, see Mapping - Overview.

Supplier-side configuration

The HelloID side of the configuration is now finished. You must now enter the dynamic metadata URL on the MyWorkDrive side.

  1. Go to Applications > Applications and select the Edit link for the newly-added MyWorkDrive app.

  2. Right-click the Download metadata button and select Copy link address. It will resemble something like

  3. Go to the MyWorkDrive Enterprise settings page.

  4. Turn on the SAML/ADFS SSO toggle.

  5. Select Manual SAML from the drop down.

  6. Paste the dynamic metadata URL into the Identity Provider Metadata URL field.

  7. Enter MyWorkDrive in the Service provider name field, if it is not already entered.

  8. Select the Download Public Certificate link and save the file to your hard drive.

  9. Select the Save button. Setup is now complete, and your saml.config file has been updated. It will now look like this:

<?xml version="1.0" encoding="utf-8"?>
<SAMLConfiguration xmlns="urn:componentspace:SAML:2.0:configuration">
<PartnerServiceProvider Name="MyWorkDrive" Description="MWD Service Provider" LocalCertificateFile="C:\Wanpath\WanPath.Data\Settings\Certificates\mwd.pfx" LocalCertificatePassword="xxxxxxxxxxxxxxxxxx" AssertionConsumerServiceUrl="~/SAML/AssertionConsumerService.aspx"/>
<ServiceProvider Name="MyWorkDrive" Description="MWD Service Provider" LocalCertificateFile="C:\Wanpath\WanPath.Data\Settings\Certificates\mwd.pfx" LocalCertificatePassword="xxxxxxxxxxxxxxxxxxxxxxxxx" AssertionConsumerServiceUrl="~/SAML/AssertionConsumerService.aspx"/>
<PartnerIdentityProvider Name="" Description="Manual" PartnerCertificateFile="C:\Wanpath\WanPath.Data\Settings\Certificates\manual.cer" SingleSignOnServiceUrl="" SignAuthnRequest="true"/>
Import the MyWorkDrive SAML SSL certificate into HelloID
  1. Import the certificate you downloaded from MyWorkDrive. Name it MyWorkDrive.

  2. Go to Applications > Applications and select the Edit link for the MyWorkDrive app.

  3. Select the Configuration tab.

  4. Select the MyWorkDrive certificate in the X509 Encryption Certificate drop down.

  5. Select the Save button.

Finish up

The MyWorkDrive application has been added to HelloID, and a trust has been configured between MyWorkDrive and HelloID. You are now free to assign the application to users within your organization and begin testing it and using it. See Applications - Overview and its related articles for more information.