Pricing  Get Quote
 
 

Configuring SAML SSO for Active Directory Federation Services (AD FS)

The following guide elaborates on the steps to configure SSO for AD FS with ADSelfService Plus. This enables users to access all AD FS integrated applications by authenticating with ADSelfService Plus.

On this page:

Prerequisite

  • Fetch the AD FS server federation metadata by pasting the following URL in a browser: https://<adfs_fqdn>/FederationMetadata/2007-06/FederationMetadata.xml

ADSelfService Plus (identity provider) configuration steps

  1. Log in to ADSelfService Plus as an administrator.
  2. Navigate to Configuration > Self-Service > Password Sync/Single Sign On > Add Application > Custom Application.
  3. Enter the Application Name, Description, and Domain Name in the respective fields.
  4. Choose the policy containing the users you wish to provide SSO access to AD FS from the Assign Policies drop-down.
  5. Select the checkbox Enable SSO using SAML.
  6. Set Support SSO flow to SP initiated.
  7. In the Upload Metadata field, upload the file downloaded previously in the prerequisite step.
  8. Under Provider Settings, enter the following information:
    1. Select RSA-SHA256 from the RSA SHA Algorithm drop-down.
    2. Set the SAML Response value to Signed.
    3. Select the option Exclusive Canonicalization with Comments from the Canonicalization Method drop-down.
    4. In the Name ID Format field, choose the format for the user login attribute value specific to the application.
  9. Click Advanced in the top-left corner.

    Create custom Applications

    Fig. 1: Configuring SAML SSO for AD FS with ADSelfService Plus as the IdP.

  10. Under the SAML Assertion Attributes Configuration section, create an attribute and enter the following values:
    1. Enter the attribute name as "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn".
    2. In the Value field, we recommend you choose Mail or userPrincipalName from the drop-down menu.

      Advanced Configuration

      Fig. 2: Setting the assertion attribute value in the Advanced Configuration section.

  11. Click IdP details and select Download IdP Metadata, which will download the metadata file required for later.

    IdP Details

    Fig. 3: Obtaining IdP details from ADSelfService Plus.

AD FS (service provider) configuration steps

Step 1: Adding a new claims provider trust

  1. Open the AD FS Management console. Navigate to AD FS > Claims Provider Trusts.
  2. Click Add Claims Provider Trust in the Actions pane. This will open the Add Claims Provider Trust Wizard. Click Start.

    Add claims ptovider trust wizard

    Fig. 5: Add Claims Provider Trust Wizard

    AD FS Explorer

    Fig. 4: Adding a new claims provider in AD FS.

  3. In the Select Data Source section, choose the option Import data about the claims provider from a file and upload the metadata file downloaded in Step 11 of the ADSelfService Plus configuration steps.

    Add claims ptovider trust wizard

    Fig. 6: Choosing claims provider data source.

  4. In the Specify Display Name section, enter the desired Display name.

    Add claims ptovider trust wizard

    Fig. 7: Setting the display name for the new claims provider trust.

  5. Complete the remaining steps in the wizard by retaining the default values for the rest of the fields.

Step 2: Adding claim rules

  1. Once the claims provider trust configuration is complete, the Claims Rule Editor window opens. Click Add Rule.

    Edit claim rules

    Fig. 8: Creating a new acceptance transform rule.

  2. From the Claim rule template drop-down, select the value Pass Through or Filter an Incoming Claim and click Next.

    Add transform claim rule wizard

    Fig. 9: Selecting a template for the new claim rule.

  3. In the next window, enter a Claim rule name and set any of the supported claim types as the Incoming claim type. For information regarding the supported claim types, click here. Choose the Pass through all claim values radio button. Click Finish to complete adding the claims rule.

    Add transform claim rule wizard

    Fig. 10: Defining claim rule properties.

Step 3: Modify existing relaying party trusts

The existing relaying party trusts need to be modified for the required applications in order to map the incoming claim to an outgoing claim that will be sent to the relaying party.

  1. Click Relaying Party Trusts under AD FS. Right-click the desired SSO applications from the list and select Edit Claim Issuance Policy. Click Add Rule.

    Relying party trusts

    Fig. 11: Modifying existing relaying party trust.

    Edit claim rules for Salesforce RP

    Fig. 12: Add or edit issuance transform rules.

  2. In the Add Transform Claim Rule Wizard, choose the option Transform an Incoming Claim from the Claim rule template drop-down and click Next.

    Add transform claim rule wizard

    Fig. 13: Selecting the claim rule template.

  3. Enter Name ID in the Claim rule name field and set UPN as the Incoming claim type. Set Name ID as the Outgoing claim type and click OK.

    Edit rule wizard

    Fig. 14: Configuring the claim rule properties.

To enable SSO for required AD FS integrated applications, configure claim rules by choosing the appropriate claim rule template.

You have now completed configuring ADSelfService Plus as the identity provider for AD FS.

Troubleshooting steps

If users are unable to log in to AD FS, please review and verify the accuracy of the following configurations:

  • Federation settings: Ensure all configurations, including account mappings, are correct and consistent.
  • Time synchronisation: Verify that the time on the AD FS server is accurate and synchronised with the ADSelfService Plus server.

Request for Support

Need further assistance? Fill this form, and we'll contact you rightaway.

  • Name
  •  
  • Business Email *
  •  
  • Phone *
  •  
  • Problem Description *
  •  
  • Country
  •  
  • By clicking 'Submit' you agree to processing of personal data according to the Privacy Policy.
Highlights

Password self-service

Free Active Directory users from attending lengthy help desk calls by allowing them to self-service their password resets/ account unlock tasks. Hassle-free password change for Active Directory users with ADSelfService Plus ‘Change Password’ console. 

One identity with Single sign-on

Get seamless one-click access to 100+ cloud applications. With enterprise single sign-on, users can access all their cloud applications with their Active Directory credentials. Thanks to ADSelfService Plus! 

Password/Account Expiry Notification

Intimate Active Directory users of their impending password/account expiry by mailing them these password/account expiry notifications.

Password Synchronizer

Synchronize Windows Active Directory user password/account changes across multiple systems, automatically, including Office 365, G Suite, IBM iSeries and more. 

Password Policy Enforcer

Ensure strong user passwords that resist various hacking threats with ADSelfService Plus by enforcing Active Directory users to adhere to compliant passwords via displaying password complexity requirements.

Directory Self-UpdateCorporate Search

Portal that lets Active Directory users update their latest information and a quick search facility to scout for information about peers by using search keys, like contact number, of the personality being searched.

ADSelfService Plus trusted by

Embark on a journey towards identity security and Zero Trust