Active Directory Federation Service (AD-FS)

In this document you are going to set up AD-FS as an external IdP to the IDmelon.

Initialize IDmelon Configuration as SP

Log in to the IDmelon panel, navigate to the Authentication section, and click Integrate with a New Identity Provider:

AD-FS IDmelon 1

Then select ADFS as identity provider:

AD-FS IDmelon 2

You will need the values provided in the newly opened window to set up ADFS as an external IDP:

AD-FS IDmelon 3

Configuring AD-FS as external IDP

Navigate to Server Manager > Tools > AD FS Management > right click on Relying Party Trust > Add Relying Party Trust

AD-FS Window 1

  • Select the Claims Aware option

  • Click on start.

AD-FS SetUp Window 1

  • Select the Enter data about the relying party manually option

  • Click on Next.

AD-FS SetUp Window 2

  • Select the Enter data about the relying party manually option

  • Click on Next.

AD-FS SetUp Window 3

  • Provide a Display name

  • Add a Description

  • Click on Next.

AD-FS SetUp Window 4

  • Click on next (No Changes).

AD-FS SetUp Window 5

  • Select the Enable support for the SAML 2.0 WebSSO protocol option

  • Provide Relying party service URL from IDmelon panel

  • Click on Next.

AD-FS SetUp Window 6

  • Provide Relying party trust identifier from IDmelon panel

  • Click on Add.

  • Click on Next.

AD-FS SetUp Window 7

  • Select Permit everyone option

  • Click on Next.

AD-FS SetUp Window 8

  • Click on Next (No Changes).

AD-FS SetUp Window 9

  • Click on Close (No Changes).

Configuring Claims (Attribute Mappings)

AD-FS Window 2

  • Select your newly created federation configuration, then choose Edit Claim Issuance Policy from the right-hand menu.

AD-FS Claims Window 1

  • Click on Add Rule.

AD-FS Claims Window 2

  • Select Send LDAP Attributes as Claims option

  • Click on Next

AD-FS Claims Window 3

  • Provide a name

  • Select Active directory option

  • Select Claims options as follows:

    • User Principle Name => Name ID
    • E-MailAddress => email
    • Given Name => firstName
    • Surname => lastName
    • User Principle Name => username
  • Click on Finish

Finishing IDmelon Configuration as SP

On the AD FS server, open PowerShell and run the following command to retrieve the server name:
(Get-AdfsProperties).Hostname

Return to the IDmelon Authentication Panel and complete the required fields as shown in the images.

  1. AD-FS certificate
  2. https://<ADFS_SERVER_NAME>/adfs/ls/
  3. http://<ADFS_SERVER_NAME>/adfs/services/trust

AD-FS IDmelon 4