Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 2 Next »

The following steps are are for Windows Server 2019. The required steps may be different in other Windows Server versions.

Step 1 - Log in to the ADFS server, and open the AD FS Management console.

Step 2 - In the right panel, right-click on the Relying Party Trusts and select Add New Relying Party Trust.

Step 3 - On the first page, select Claims aware, then click Start.

Step 4 - On the next page, select “Enter data about the relying party manually”, then click Next.

Step 5 - Enter a Display Name for the relying party, then click Next. This can be anything.

Step 6 - On the Configure Certificate page, just click Next.

Step 7 - On the Configure URL page, tick the checkbox at the “Enable Support for the WS-Federation Passive protocol“ and provide the URL of the VFC server in the following format: https://server-fqdn/verba/saml

Then click Next.

Step 8 - On the Configure Identifiers page, just click Next.

Step 9 - On the Choose Access Control page, just click Next.

Step 11 - On the next page click Next then Close.

Step 12 - Right-click on the newly created Relying Party Trust, then select Edit Claim Issuance policy.

Step 12 - Click Add Rule.

Step 13 - Select “Send LDAP Attributes as Claims” then click Next.

Step 14 - Provide a Claim rule name, then under the Attribute Store select Active Directory.

Step 15 - In the table, under the LDAP Attribute select SAM-Account-Name, and under the Outgoing Claim Type select Name ID. Click Finish

Step 16 - Click Apply then OK.

Step 17 - In the right panel, expand the Service \ Certificates node.

Step 18 - Under the Token Signing certificates, select the primary one.

Step 19 - Go to the Details tab, then click Copy to File.

Step 20 - Select Base-64 encoded X.509.

Step 21 - Provide a file name, then save the certificate.

  • No labels