ADFS 3.0 Configuration for SSO

This document assumes that the ADFS 3.0 software component is properly configured in the Active Directory domain.

Exchange XML Metadata Files

  1. Locate your ADFS XML metadata. This information can be found at this address: https://[SERVER_FQDN]/FederationMetadata/2007-06/FederationMetadata.xml
  2. Download the XML file, or copy and paste the text into a text document, and send this to MIE.
  3. MIE will send back an XML metadata file. Save this file on the ADFS server and be sure the file extension is XML.

Add Relying Party Trust

  1. On the ADFS server, open the Server Manager.

  2. Click Tools, and select AD FS Management

    Cdb5b54598e2be5180502bcdf0f15591

  3. In the AD FS Management MMC, expand AD FS and Trust Relationships.

  4. Click on Add Relying Party Trust in the right pane (or from the context [right-click] menu on the folder tree).

    5e5e130f7024996d675d7f21ce2cd008

  5. Click Start.

    C5975d39aba92d59c638b4f70939c156

  6. Select Import data about the relying party from a file.

  7. Browse to and select the XML document that was provided by MIE.

  8. Click Next.

    4fcf78b0e164376d55864fa47ab23810

  9. Give the Relying Party a proper name and description, and then click Next.

  10. Leave this set to I do not want to configure multi-factor authentication settings…

  11. Click Next.

    72352bf53e77e9ab0a757228b733e543

  12. Leave this set to Permit all users to access this relying party, and then click Next.

    F40433ef31122ccfb448911a77df5617

  13. Click Next - Do not change any settings on this page.

    62ee7e6bab7edeece7b3e67c3a1fb555

Edit Claim Rules

  1. In the AD FS MMC, expand the Trust Relationships and click on Relying Parties Trusts.

  2. Right-click the new Relying Party that was just created, and select Edit Claim Rules…

    0ee71feaaef75146c99951f6ecd85be8

  3. Click Add Rule…

  4. Select Send LDAP Attributes as Claims from the dropdown list.

  5. Click Next.

    0ef30a26b1b79bf619e10db16e767142

  6. In the Claim rule name field enter Get LDAP Attributes.

  7. For the Attribute store field, select Active Directory from the drop down list.

  8. In the mapping table, select E-Mail-Addresses from the dropdown list under LDAP Attribute (Select type…).

  9. Select E-Mail Address from the dropdown list under the Outgoing Claim Type…

  10. Click Finish.

    D619bb330d23d53aa494a17bec8ec44b

  11. Click Add Rule…, again.

  12. Select Transform an Incoming Claim from the Claim rule template dropdown list.

  13. Click Next.

    5fe74a646c8c0c1ed43bc1c8740f7549

  14. Name the Claim rule Email to Name ID.

  15. Select E-Mail Address from the Incoming claim type dropdown list.

  16. Select Name ID from the Outgoing claim type dropdown list.

  17. Select Email from the Outgoing name ID format dropdown list.

  18. Click Finish.

    2034faad7b3eeff8e17ec3180795e3e7

  19. Click OK.

    Fd2dc373726b5ae61f94fc73b9e4adaa

Set Relying Partying SAML Logout Endpoint & Secure Hash Algorithm

  1. In the AD FS MMC, expand the Trust Relationships and click on Relying Parties Trusts.

  2. Double-click the new Relying Party Trust (or right-click and select Properties).

  3. Click the Endpoints tab.

  4. Click Add SAML…

  5. Select SAML Logout from the Endpoint type dropdown menu.

  6. Make sure that POST is selected from the Binding drop down menu.

  7. Enter the ADFS server sign-out URL in the Trusted URL field. The default URL is: https://[SERVER_FQDN]/adfs/ls/?wa=wsignout1.0

  8. Click OK to close the Add an Endpoint window.

    0d5e33ed652fa3902e869e757265f316

Configure AD Access Groups (Optional)

  1. In the AD FS MMC, expand the Trust Relationships and click on Relying Parties Trusts.

  2. Right-click the new Relying Party just created, and select Edit Claim Rules…

  3. Click the Issuance Authorization Rule tab.

  4. Click Add Rule…

    82ca00be6ff65ed92063ac0bddad78bd

  5. Select Permit or Deny Users Based on Incoming Claim from the dropdown list.

    6c54c406098dfea845b6951927821c60

  6. Enter a claim rule name.

  7. Select the appropriate criteria from the Incoming claim type drop down list. In this example, we are basing it on AD group.

    7096c8e36e295e6505387671615c8ff4

Restart the ADFS Service

  1. On your ADFS server, open the Server Manager.

  2. Click Tools, and select Services.

    7f6f89c901e09de6ab25572598e1de1f

  3. Right-click the Active Directory Federation Services service.

  4. Click Restart.

    Be0bc532c5901e9c27c8d0c60b22e0b8

Customize ADFS User Sign-in Page (Optional)

Options for changing the way your user sign-in page looks and behaves can be found here:

https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/operations/ad-fs-user-sign-in-customization

Was this page helpful?

Let us know how we can improve this documentation.

Published: February 27, 2020