Free Trial

How to configure SAML authentication settings in Central Server for AD FS?

 

Description

This document will walk you through the steps required to configure SAML Authentication settings in Central Serverfor AD FS.

Installation Steps

  • Open AD FS management. Click on Add Relying Party Trust.

ADfs Add Relying Party Trust

  • Click on Start.

 Add Relying Party Trust start button

  • Choose Enter data about the relying party manually. Click on Next.

 Enter data about the relying party manually Next button

  • Enter an appropriate Display name.

Enter an appropriate Display name page

  • Click on Next.

configure certificate next button

  • In Central Server, navigate to Admintab and select SAML Authentication. Choose Certificate against Configuration by downloading. Copy the Assertion Consumer URL.

Central Server Saml page

  • Choose Enable support for the SAML 2.0 WebSSO protocul. Paste theAssertion Consumer URL here. Click on Next.

add assertion url page

  • Again inCentral Server, navigate toAdmintab and selectSAML Authentication. ChooseCertificate against Configurationby downloading. CopyEntity ID.

copy endity id form central server

  • In AD FS management, paste the Entity IDin the Relying party trust identifier. Click on Add.

paste entity id in adfs page

  • Click on Next.

click on next after paste entity id

  • Choose Permit everyone. Click on Next.

permit everyone and next page

  • Click on Next.

ready to add trust click on next

  • Click on Close.

after finish close button

  • Select the added Relying Party Trust (1)(Endpoint_Central_SAML) and Click on Edit Claim Issuance Pulicy(2).

edit clalim inssuance policy

  • Click onAdd Rule.

click on add rule

  • In the drop-down list under Claim rule template, choose Transform an Incoming Claim.Click on Next.

next choose transform and incomain claim

  • Enter appropriate Claim rule name. Choose Windows account name as Incoming claim type. Select Name ID as Outgoing claim type. Choose Transient Identifier as Outgoing name ID format. Select Pass through all claim values. Click on Finish.

claimrule,select name Id, other and finsh

  • Click on Apply and then, click OK.

select apply click ok

  • The next step is to download the Federation Metadata XML file from ADFS. The XML can be downloaded by appending:FederationMetadata/2007-06/FederationMetadata.xmlto the root URL of the ADFS server. For example: If the FQDN of the ADFS server is ec.com, then the complete URL would be https://ec.com/federationmetadata/2007-06/FederationMetadata.xml" target="_blank">https://ec.com/federationmetadata/2007-06/FederationMetadata.xml
  • In theCentral Server console, navigate to Admin->SAML Authentication. Here, select the IdP as ADFS and choose the Name IDasUsername. Beside Configuration by uploading, choose Metadata and upload the Metadata XML file. Click on Save.

Central server Identiy provide details

  • Open Central Server console. Click on Login with ADFS. Enter the credentials.

Central Server Login page

ADFS login page

Was this article helpful?

Thank you for your feedback!

Sorry about that!

By clicking "Submit", you agree to processing of personal data according to thePrivacy Policy.
Back to Top