SAML Integration with ADFS

SAML Integration with ADFS

Active Directory Federation Services( ADFS ) is a Single Sign On solution created by Microsoft. ADFS manages authentication through a proxy service hosted between Active Directory (AD) and the target application.
You must obtain the login URL, logout URL and the certificate from ADFS.

  1. Log in to the ADFS 3.0 server and open the management console.
  2. Right-click Service in the left-pane menu and choose Edit Federation Service Properties.
  3. Under General, make sure that your DNS entries and certificate names are correct.
  4. Using your Federation Service name, use a browser and go to https://federationservicename.com/federationMetaData/2007-06/FederationMetaData.xml
    Example:
    https://yourdomain.samlportal.com/federationMetaData/2007-06/FederationMetaData.xml
    The login URL and logout URL are present in the XML file as SingleSignOnService and SingleLogoutService tags
  5. Export the Token-Signing certificate:
    • 5(a)

      5(b)

      5(f)

      5(g)

      5(h)

      • Right-click Certificate in the left-pane menu and click View Certificate.
      • Select the Details tab.
      • Click Copy to File. The Certificate Export Wizard will open.
      • Click Next.
      • Make sure the No, do not export the private key option is selected, and then click Next.
      • Select Base-64 encoded X.509 (.cer), then click Next.
      • Choose where to save the file and name it. Click Next.
      • Select Finish. The instance requires that this certificate be in .cer or .pem format.
  6. Configure Single Sign-On URL and Entity ID URLs at Zoho.

Submit metadata at ADFS

Add a Relying Party Trust

  1. a

    b

    c

    d

    e

    f

    g

    h

    i

    j

    k

    • Under Trust Relationships in the left-pane menu, right-click Relying Party Trusts and select Add Relying Party Trust. This will open the Add Relying Party Trust Wizard.
    • On the Select Data Source screen, select Enter data about the relying party manually.
    • On the Specify Display Name screen, enter zoho.com as the display name.
    • On the Choose Profile screen, select AD FS profile.
    • Click Next.
    • On the Configure URL screen, check the Enable Support for the SAML 2.0 WebSSO protocol.
    • Enter the ACS URL present in the metadata you downloaded from zoho in the service URL text box.
    • On the Configure Identifiers screen, choose zoho.com as the Relying Party Trust Identifier.
    • On the Configure Multi-factor Authentication Now screen, choose I do not want to configure multi-factor authentication settings for this relying party trust at this time.
    • On the Choose Issuance Authorization Rules screen, select the Permit all users to access this relying party radio button.
    • The wizard will display an overview of your settings on the next two screens. On the final screen use the Close button to exit and open the Claim Rules editor.

Creating Claim rules

You can create claim rules once the relying party trust is created. By default, the claim rule editor opens once you create a trust.

  1. 1

    2

    3

    4

    5

  1. Click Add Rule to create a new rule. This will launch the Add Transform Claim Rule Wizard.
  2. On the Choose Rule Type screen, select Send LDAP Attributes as Claims in the drop-down menu. Click Next.
  3. On the Configure Claim Rule screen:
    • Enter a Claim rule name.
    • Choose Active directory from the dropdown menu for the Attribute Store.
    • On the LDAP Attribute column, choose E-Mail Addresses from the drop-down menu.
    • On the Outgoing Claim Type column, select E-Mail Address from the dropdown menu.
  4. Click Finish to save the rule.
  5. Create another claim rule and select the Transform an Incoming Claim template.
  6. On the Configure Claim Rule screen:
    • Enter a Claim rule name
    • Choose E-Mail Address as the Incoming claim type from the drop-down menu.
    • Select Name ID as the Outgoing claim type from the drop-down menu.
    • Select Email as the Outgoing name ID format.
  7. Select the Pass through all claim values radio button
  8. Click Finish to create the claim rule.
  9. If you have selected Do you need Logout Response? at Zoho:
    • Download the logout certificate at Zoho Accounts in the SAML Authentication page.
    • Go to Relying Party Trust under Trust Relationships and select zoho.com.
    • Go to Endpoints on the top navigation bar and click Add.
    • Select the Endpoint type as SAML Logout.
    • Enter the logout URL generated from the metadata file you downloaded from your Zoho account.
    • Go to Signature on the top navigation bar and click Add.
    • Upload the logout certificate.
    • Go to Advanced on the top navigation bar.
    • Select the Secure hash algorithm as SHA-256.

Share this post : FacebookTwitter

Still can't find what you're looking for?

Write to us: support@zohoaccounts.com