Active Directory Federation Service (ADFS) enables Federated Identity and Access Management by securely sharing digital identity and entitlement rights across security and enterprise boundaries. ADFS extends the ability to use single sign-on functionality available within a single security or enterprise boundary to Internet-facing applications to enable customers, partners, and suppliers a streamlined user experience while accessing the web-based applications of an organization.
This document contains a list of all the documentation overviews for ADFS for Windows Server.
Prerequisites
- Active Directory Federation Services (ADFS) is set up.
- Access to the Windows server with administrative privileges.
Configuring DSFS in Windows
This document provides a step-by-step guide for configuring Directory Service and Federation Service (DSFS) in a Windows environment.
Once the ADFS setup is done, start configuring the Directory Service and Federation Service on the Windows server.
Configuring Directory Service (DS) in Windows
Create Domain Users
- On the Windows server, open Active Directory Users and Computers.
- Navigate to your domain.
- Click User as shown below.
- Enter the required user details.
- Add an email address for the domain user.
- Click Apply, then OK.
- Organize users into groups as needed.
Configuring Federation Service (FS)
Access ADFS Management
- Open Administrative Tools from the Start menu.
- Click ADFS Management.
Download Federation Metadata
- Go to Service > Endpoints.
- Locate the metadata endpoint.
- Append the path with HTTPS and the ADFS server's hostname/IP.
Example URL: https://<ADFS-server-hostname>/FederationMetadata/2007-06/FederationMetadata.xml - Download the FederationMetadata.xml file.
Import Signing Certificate
- Obtain the signing certificate file (ADFScert.cer).
- Run the following command to import the certificate into the Tomcat SAML keystore:
keytool -importcert -trustcacerts -alias "adfs" -keystore "C:\path\to\cacerts" -file <path to file path\adfs_onprem.cer
Configure Oasis Properties
- Open the oasis.properties file located in:
/home/<client>/path/to/extprop/oasis.properties - Set the value for samlHTTPMetadataProvider.
- Specify the entityBaseURL as the application deployment path.
- Save the file.
Setting Security Type (Windows & Linux)
Windows Configuration
- Open tomcat9w.exe.
- Go to Java Options.
- Add the following parameter:
-DOVALEDGE_SECURITY_TYPE=saml
Linux Configuration
- Edit the setenv.sh file is located at:
/home/<username>/tomcat_homepath/bin/setenv.sh - Add the following line:
export CATALINA_OPTS="-DOVALEDGE_SECURITY_TYPE=saml" - Save and grant execute permission.
- Restart Tomcat.
Configuring Relying Party Trust (ADFS)
Add SAML Metadata
- Go to Relying Party Trust in ADFS.
- Click Start.
- Add the SAML Metadata for the OvalEdge.
SAML Metadata URL can be downloaded through the application URL, followed by /saml/metadata path.
https:///saml/metadata - Import this into the Relying Party Trust, and click on Next.
- Specify Display Name, and click Next.
- Choose the Access Control Policy, and click Next.
- Click Next and finish the wizard.
- Double-click on the added Relying Party Trust.
- Select the Advanced tab, change the Secure Hash Algorithm to SHA1 from SHA256, and click Apply and OK.
- Select the Configured Party Trust, and Click on Edit Claim Issuance Policy.
- Add the Rule.
- Let the Claim Rule Template be sent to the LDAP Attribute as Claims, and click on Next.
- Specify the Claim Rule Name, and select Active Directory as the Attribute Store.
Add the Attributes as given in the image below and click on Finish. - Alternate way, if the SAML-Account-Name is not available.
- Click on Apply and OK.
Initial Login and Setup Instructions
- Now, we are all set to use the application configured with ADFS. Go to the Browser and Hit the Application Web URL.
- At least one user needs to be OE_ADMIN (Admin role)., It must be updated through the Database. The OvalEdge team will take care of it.
- Log in with Domain Admin User Credentials.
Note:
If you encounter an error stating "no assertions found in the response," you can resolve it using the following steps:
- Open PowerShell on the ADFS server.
- Run the following command:
Set-ADFSRelyingPartyTrust -TargetName <targetName> -SamlResponseSignature "MessageAndAssertion" - <targetName> refers to the Display Name of the Relying Party Trust in ADFS.
- For example, if the Relying Party Trust name is "ovaledge," use that as the target name.
After resolving this issue, log in to the application.