This guide is to provide a clear and concise step-by-step approach to facilitate effective user navigation within the ADFS (Active Directory Federation Services) platform.
I. Create an enterprise application in ADFS
Log in/Access to ADFS Management Window
From the Side Menu bar, select ‘Replying Party Tasks’
After opening the ADFS Management Window, select click on ‘Add Replying Party Task Wizard’
Select ‘Claims aware’ from the Reply Party Wizard >> Click on ‘Start’ button
II. Select data source
In the Select Data Source Window, choose ‘Enter the data about the Replying Party Manually’
Click ‘Next’ to continue
In the Specify Display Name Window >> Display Name>> Give the Application Name
Click ‘Next’ to continue
Skip the ‘Configure URL’ section / (Window)
Click ‘Next’ to continue
III. Configure URL
In the Configure URL window, choose ‘Enable Support for the SAML 2.0 Web SSO Protocol’
Paste the URL against ‘Reply Party SAML 2.0 SSO Service URL’ for Server URL from Beagle by navigating back to Beagle SSO Settings page
Navigate back to Beagle Security page
IV. Beagle SSO settings
From the Beagle SSO settings page, Choose ADFS >> Start Integration
Copy the ‘Reply URL’ from here and paste against the ‘Reply URL’ in ADFS
Click ‘Next’ to continue
V. Configure identifier
Copy ‘SSO Service URL’ and paste it against SSO Service URL in ADFS
2. Copy the Relying Party trust Identifier and paste it against ‘Relying Party Trust Identifier’
3. Click ‘Next’ to continue
VI. Choose access control policy
In ‘Choose Issuance Authorization Rules’ >> Click on ‘Permit Everyone’
Click ‘Next’ to continue
Skip the ‘Reply URL’ section
Click ‘Next’ to continue
An application with the ‘given name’ is created
Click the ‘application’ and edit the claim issuer
VII. Edit SAML attribute claim rules for your ADFS App
In the Edit Claim Rules for the given application name window, >> click on ‘Add Rule’ under the ‘Issuance Rules Tab’
The ‘Add Transform claim Rule Wizard window’ opens
Select ‘Send LDAP Attributes as Claims’ as the ‘Claim Rules’
Click ‘Next’ to continue
Enter the Claim Rule name as ‘Email’
Set ‘Attribute Store’ to ‘Active Directory’
Select LDAP Attribute as Email and Outgoing Claim Type as ‘Email’
Click on ‘Finish’ to finish the first claim
Similarly, add the subsequent claims- (make sure you select the accurate options because the integrations may not work if the variants chosen does not match)
Select Pass through all claim values and click Finish.
VIII. Federation meta URL
Navigate back to Beagle Security SSO settings Page
Click on ‘Add Identity Provider’
Get the ADFS Federation Metadata by using this URL https://< ADFS_Server_Name >/federationmetadata/2007-06/federationmetadata.xml.
(Note: Update your ADFS server name and paste the Federation Metadata URL from the Beagle Security Page)
Paste the created URL in Beagle
Click on ‘TURN ON’ to activate the integration