Configure Relaying Party Trust in AD FS
In AD FS, you have to configure the GroupID client with which you want to set up AD FS. You also have to specify the claim rules for authentication.
Configure Relaying Party Trust in AD FS
- Launch the AD FS console. In the left pane, select AD FS > Trust Relationships. Right-click
Relying Party Trusts and click Add Relying Party Trust on the shortcut menu.
The Add Relying Party Trust wizard opens to the Welcome page. - Read the welcome message and click Start.
- Use the options on the Select Data Source page to either import relying party trust data from
a file, such as a metadata file, or enter the information manually.
To enter information manually, select the Enter data about the relying party manually option and click Next. - On the Specify Display Name page, specify a friendly display name for this configuration in the Display name box. Then enter any additional notes in the Notes box and click Next.
- To use the SAML 2.0 protocol as profile, select the AD FS profile option button on the Choose Profile page and click Next.
- On the Configure Certificate page, click Next.
- On the Configure URL page, select the Enable support for the SAML 2.0 Web SSO protocol
option button. Then in the Relying party SAML 2.0 SSL service URL box, provide the consumer
URL you generated for the GroupID client. See the
Generate the Consumer URL for a GroupID Client
topic.
The consumer URL is the relying party trust URL, used by AD FS to authenticate.
Click Next. - On the Configure Identifiers page, use the Relying party trust identifier box to provide
the audience URL you generated for the GroupID client. Click Add next to this box and then
click Next.
See the Generate Entity ID/Audience URL topic. - Use the Configure Multi-factor Authentication Now? page to configure multi-factor authentication. At present, we will not configure it, so select the I do not want to configure multi-factor authentications settings for this relying party trust at this time option button and click Next.
- Use the Choose Issuance Authorization Rules page to permit all users to get authenticated on
the relying party trust using AD FS. User credentials will be parsed with Active Directory.
Select the Permit all users to access this relying party option button and click Next. - Use the tabs on the Ready to Add Trust page to review some preconfigured settings; then click Next.
- Click Close on the Finish page to complete the wizard. The wizard closes and the Edit Claim Rules dialog box is displayed, where you have to specify claim rules for authentication.
Specify claim rules for authentication:
- On the Edit Claim Rules dialog box, the Issuance Transform Rules option correlates to the option of authenticating using an Active Directory attribute. Click Add Rule.
- To add a rule, select Transform an Incoming Claim from the Claim rule template drop-down list on the Select Rule Template page and click Next.
- On the Configure Rule page, specify a rule name in the Claim rule name box.
- In the Incoming claim type and Outgoing claim type boxes, select an Active Directory attribute for authentication, such as the UPN attribute. The incoming and outgoing claim types should be the same as we will not specify a different text or different data for the logon process. It will be the exact user principal name for authentication.
- Make sure that the Pass through all claim values option is selected; then click Finish. The new rule is configured and displayed on the Issuance Transform Rules tab.
- Click the Issuance Authorization Rules tab and notice that the issuance authorization rule is already completed.
- Click the Delegation Authorization Rules tab. We do not need to delegate, so click Apply
and then OK. The AD FS console is displayed with the new relying party trust added.
The next step is to configure the AD FS provider in GroupID. See the Configure the AD FS Provider In GroupID topic.