Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.


Add Relying Party Trust

  1. In Server Manager, click Tools, and then select AD FS Management.


Image RemovedImage Added
















2. In the folder tree on the left, under AD FS, right click Relying Party Trusts and select add Relying Party Trusts.


Image RemovedImage Added


3. select Claim Aware and click next/start

4. choose "import data about relying part from a file". use file at https://www.dropbox.com/s/0ft3kku6hpsh21k/metadata.xml?dl=0 (please download).click next.

Image RemovedImage Added


5.  Add "EdSmart_RelyingParty" as display name. 

Image RemovedImage Added

6. Give permissions to the Group.click next.

Image RemovedImage Added

7. Finish

Image RemovedImage Added


Add Rules

  1. In Server Manager, click Tools, and then select AD FS Management.
  2. Click on Edit claim issuance policy...

 Image RemovedImage Added

3. In the opened window, click add

 Image RemovedImage Added




4. Select Send Group Membership as a claim


Image RemovedImage Added




5. Fill in values and finish

  • Claim Rule Name: MembershipRule
  • user`s group: browse Browse that group you want to allow from ssoto login using SSO.
  • Outgoing claim type: Select Role
  • Outgoing claim value: staff


Image RemovedImage Added



6. Rule is added. Now double click it. 


Image RemovedImage Added


7. Click on View Rule Language

Image RemovedImage Added


8. Copy the claim rule language text. and save it in notepad. we need it in next stuff.

click ok. and comeback to Edit claim issuance policy window.


Image RemovedImage Added


9. Add another Rule. 

...

10. Select Send Claims Using a Custom Rule


Image RemovedImage Added


11.

  • Claim rule name: CustomMembershipRule
  • Custom rule: paste the text that we copied from previous step.

     now we need to replace the highlighted URL to simply role(see next screenshot)


12. "URL" replaced with "role". Click finish.


Image RemovedImage Added


13. you can remove the previously created MembershipRule

...

14. We need to add another rule. Select Send Claims Using a Custom Rule


Image RemovedImage Added

15.  Fill details and click finish.

...

Wiki Markup
c:[Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname", Issuer == "AD AUTHORITY"]
 => issue(store = "Active Directory", types = ("UserID", "mail", "givenName", "sn", "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier"), query = ";mail,mail,givenName,sn,mail;{0}", param = c.Value);



16 you are done it.

Federation service name and identifier.

  1. In Server Manager, click Tools, and then select AD FS Management.
  2. right click on AD FS, click Edit Federation Service Properties...

Image Removed

3. fill in details.

adfs-sandbox-04 is the public name against the ip address of VM where adfs is installed.

Image Removed

Subdomain related stuff(cloud flare and Azure

  1. IP address of VM to map to a domain for the federation xml data access via cloud flare

Image Removed

2. A suitable school name that will be added as subdomain under EdSmart for SSO.

Image Removed

3. On https://portal.azure.com go to App Services->pp-front-production-au -> Custom domains.

  • Click Add hostname
  • put subdomain.edsmart.com as Hostname
  • select CNAME from Hostname record type
  • Select pp-front-release-au.azurewebsite.net  from CNAME dropdown
  • click add/finish

Image Removed

4. On https://portal.azure.com go to App Services->pp-front-production-au -> SSL Settings.

  • Add SSL Binding
  • Select Hostname that you just added in previous step as custom domain
  • Select EdSmart Certificate
  • Select SSL Type as SNI SSL
  • Click Add Binding

Image Removed

5. Done with subdomain.

Configuration in IIS 

  • right click on default site and add/edit binding.
  • add https binding and select *.edsmart certificate while doing so.

Image Removed

How to add self signed certificate 

go to server certificates.

Image Removed

select Create self signed cert from options from the right. give a name in the wizard and there you go.

Image Removed

Adding User

  1. In Server Manager, click Tools, and then select Active directory user and computers.

Image Removed

2. Then select right click User and select new→user.

  • fill details, click next and give it a password.
  • Save the password for later use.
  • click finish

Image Removed

3. also add email id to the user. for that

...


Info

Filter by label (Content by label)
showLabelsfalse
max5
spacescom.atlassian.confluence.content.render.xhtml.model.resource.identifiers.SpaceResourceIdentifier@2703c3
showSpacefalse
sortmodified
reversetrue
typepage
cqllabel in ( "saml2" , "sso" , "adfs" ) and type = "page" and space = "SUP1"
labelssso adfs saml2

...