How to enroll Access Appliance primary server as a service provider to ADFS

How to enroll Access Appliance primary server as a service provider to ADFS

Article: 100061982
Last Published: 2024-02-20
Ratings: 0 0
Product(s): Access

Description

To enroll Access Appliance primary server as a service provider to ADFS

  1. Download the Federation Metadata XML by using the following link.
    https://<adfs_server_name>/FederationMetadata/2007-06/FederationMetadata.xml

  2. Open Access Appliance UI, Go to Setting > Directory Services management > Configure AD. Assign Administrator role to any AD user.

  3. Enable SSO. Navigate to Setting > Security management >  Single sign-on(SSO) > Add > Upload Federation XML. Enter all the values and click Save.

  4. Download Service provider XML from Access Appliance.

  5. To upload the XML to the ADFS server, open the ADFS management console. Navigate to Start > Server Manager > ADFS > Tools.
     

  6. Select Relying Party Trusts optionClick Add Relying Party Trust to open the Add Relying Party Trust Wizard to configure Access Appliance as a service provider.
  7. On the Welcome screen, select the Claims aware option. Click Start. This enables the ADFS application to consume security tokens to make authentication and authorization decisions.
     
  8. Use the Import data about the relying party from a file option to import the SP metadata XML file previously downloaded from the Access Appliance primary server. Enter the Federation Metadata file location using the Browse option.
  9. Ignore the warning message and provide the name of your configuration in the Display name field. For example: the name of your primary server: trans-com-win. Click Next.
     
  10. Give a display name for your relying party trust and click Next.
     
  11. Select the Access Control Policy based on the requirements of your organization. If you have configured MFA (multifactor authentication), then select an appropriate option. Else, select for Permit everyone and click Next.
     
  12. Complete the configuration by clicking next and then click Close.
     
  13. For your relying party, click Edit claim issuance policy.
     
  14. Add a rule to enable ADFS to access attribute values of authenticated users from the Active Directory. In the Edit Claim Issuance Policy window, click Add Rule to enable ADFS to access attribute values of authenticated users from the Active Directory. The Add Transform Claim Rule Wizard opens.
     
  15. Ensure that you select the Send LDAP Attributes as Claims template in the Choose Rule Type screen. Click Next.
     
  16. In the Configure Claim Rule screen, provide any name to identify the claim rule. Ensure that you select the Attribute store as Active Directory. 
     
  17. Click Finish to apply the rule on the Edit claim issuance policy screen.
     
  18. Disable the CRL check on your configuration from PowerShell.
    Run the following command from  the ADFS server: 
  • Get-AdfsRelyingPartyTrust "<trust name>" | Set-AdfsRelyingPartyTrust -SigningCertificateRevocationCheck none
  • Get-AdfsRelyingPartyTrust "<trust name>" | Set-AdfsRelyingPartyTrust -SamlResponseSignature MessageAndAssertion

In some cases, you have to set NotbeforeSkew to 2 (By default, its value is 0). You can get the NotbeforeSkew values by using the following command:
Get-AdfsRelyingPartyTrust "<trust name>"
Now set NotbeforeSkew to 2 by using the following command:  
Set-ADFSRelyingPartyTrust -Targetname "<trust name>" -NotBeforeSkew 2

19. Navigate to the Access Appliance UI. Login with SSO.

How to enroll Access Appliance primary server as a service provider in Azure active directory Identity provider

How to enroll Access Appliance primary server as a service provider to Okta

How to enroll Access Appliance primary server as a service provider to PingFederate

Was this content helpful?