Configuring Active Directory Federation Services as a SAML identity provider
After you configure Remedy SSO as a service provider and Active Data Federation Services (AD FS) as the remote identity provider (IdP) in Remedy SSO Admin Console, configure SAML for AD FS.
Before you begin
- If your IdP requires a service provider signed certificate, you must have a certificate generated as described in Creating and updating the SP signing certificate for SAML authentication and signed by the Remedy SSO server as described in Planning advanced functions for SAML authentication.
- Configure a realm for SAML 2.0 authentication. For information about how to configure SAML authentication, see Configuring SAML 2.0 authentication.
Task 1: To import service provider certificates to the AD FS identity provider
To export the SSL certificate of the Tomcat on which Remedy SSO is deployed, perform the following steps:
Open Remedy SSO URL, and click the padlock symbol in the address line of the browser.
In the Certificate window, click the Details tab.
Click Copy to File.
In the Certificate Export Wizard, click Next.
Select "DER encoded binary X.509 (.CER)", and click Next.
Provide a name for the file and include the path in the file name.
The Common Name (CN) attribute of this certificate must be the same as the FQDN of Remedy SSO server.
To import certificates to the AD FS server, perform the following steps:
- From the Run dialog box, type mmc to open Microsoft Management Console (mmc).
- Open the File menu and click Add/Remove Snap-in.
- From the list of available snap-ins, select Certificates, and click Add.
The Certificates snap-in dialog box is displayed.
- Select My User Account, and click Finish and OK.
- From the explorer panel, select Personal > Certificates.
- On the Action menu, point to All Tasks, and then click Import to start the Certificate Import Wizard.
- Follow the wizard steps and import the following certificates:
- SSL certificate of the Tomcat on which Remedy SSO is deployed
- (Optional) If required, the service provider certificate signed by Remedy SSO.
Task 2: To configure a relying party trust
Remedy SSO is the relying party which depends on the IdP to check the claims of the user. In this case, AD FS is the IdP.
- On the AD FS server, open the AD FS 2.0 Management application.
On the Trust Relationships tab, select Relying Party Trusts and right-click it.
- Select Add Relying Party Trust Wizard.
- Click Start.
Select Import data about the relying party published online or on a local network radio button.
If AD FS and Remedy SSO servers cannot connect via SSL because of some specific network settings, you might see a warning. This error message might be normal and you can ignore it. In this case, you can import the service provider metadata XML to the AD FS in the offline mode.
If you are unable to proceed with the configuration, the certificates were not exchanged correctly. Contact the Remedy SSO administrator for more information.
In the Federation metadata address field, enter the link copied from the Remedy SSO Admin Console (click View Metadata and copy the URL).
- Click Next.
In the Display Name field, type any value, for example rsso-sp, and then click Next.
- On the Choose Issuance Authorization Rules step, click Permit all users to access this relying party, and click Next.
- Do not change the default selections, and click Next.
- Clear the Open the Claims when this finishes check box.
- Click Close.
After you close the Add Relying Party Trust Wizard window, rsso-sp appears in the Relying Party Trusts list.
Task 3: To modify the secure hash algorithm
- Right-click on the relying third party trust that you have just created.
- Click the Advanced tab.
In the Secure hash algorithm box list, select SHA-1 and click OK.
Task 4: To configure the claim rules for the relying party
- From AD FS 2.0, select rsso-sp, and click Edit Claim Rules from the Actions menu.
- To add a claim rule, click Add Rule.
- Select the Send Claims Using Custom Rule claim-rule template.
Enter the Send Claims Using UPN claim-rule name. In this case, use the following script:
c:[Type == "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn"] => issue( Type = "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier", Issuer = c.Issuer, OriginalIssuer = c.OriginalIssuer, Value = c.Value, ValueType = c.ValueType, Properties["http://schemas.xmlsoap.org/ws/2005/05/identity/claimproperties/format"] = "urn:oasis:names:tc:SAML:2.0:nameid-format:transient", Properties["http://schemas.xmlsoap.org/ws/2005/05/identity/claimproperties/namequalifier"] = "<idp-entity-id>", Properties["http://schemas.xmlsoap.org/ws/2005/05/identity/claimproperties/spnamequalifier"] = "<sp-entity-id>/<realm-id>" );
- Service provider name qualifier is required only when you want to implement service provider initiated single log out.
- The properties "http://schemas.xmlsoap.org/ws/2005/05/identity/claimproperties/format" must be the same as the NameID format value in the Authentication tab of Remedy SSO. For example, a Transient Identifier such as urn:oasis:tc:SAM:2.0:nameid-format:transient.
- The Fully Qualified Domain Name (FQDN) specified for the properties " http://schemas.xmlsoap.org/ws/2005/05/identity/claimproperties/namequalifier" must be the FQDN of the AD FS server.
- The properties "http://schemas.xmlsoap.org/ws/2005/05/identity/claimproperties/spnamequalifier" must be the same as the service provider Entity ID value specified in the Remedy SSO Admin Console (General > Advanced > SAML Service Provider > SP Entity ID) and the realm ID value specified in the Remedy SSO Admin Console (Realm > Realm ID).
Task 5: To import AD FS certificates to Remedy SSO
- To export the AD FS certificates as files, perform the following steps:
- Open the AD FS 2.0 Management console.
- From the explorer panel, navigate to Service > Certificates.
- Double-click the certificate name.
- Double-click the Details tab.
- Click Copy to File and then click Next.
- Select Do not export the private key and then click Next.
- Select DER and then select the file to save it.
- Click Finish.
- Perform steps c-h for all the other certificates.
- To import the AD FS certificates into Remedy SSO *.jks file with the third-party tool KeyStore Explorer (https://keystore-explorer.org/), perform the following steps:
- Open the truststore file by using the KeyStore Explorer.
- Select Tools and click Import Trusted Certificate.
- Select the file and import it.
Restart the Remedy SSO server.
Watch these videos to understand how to configure AD FS as a SAML IdP provider.
Log in or register to comment.