Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

his This guide describes how to add the Dualshield SSO as a SAML WS-Federation Claims Provider in the ADFS server.

Table of Contents

Add Claims Provider

Launch the ADFS Management console

...

Enter the Display Name for your DualShield SSOL server, e.g. "DualShield SSO"

Click Next

In the WS-Federation Passive URL box, enter the URL below:

https://{dualshield-sso-fqdn}:8074/sso/wsfed/login/kvps/DASApplicationName/{application-name}/SPName/{service-provide-name}

...

ItemMeaningExample
{dualshield-sso-fqdn}the FQDN of your DualShield SSO servermfa.fakestop.com
{application-name}the name of the application that you will create in your DualShield for ADFSADFS

{service-provider-name}

the name of the service provider that you will create in your DualShield for ADFSADFS-WSFED

Example:

...

https://mfa.fakestop.com:8074/sso/wsfed/login/kvps/DASApplicationName/ADFS/SPName/ADFS-WSFED

Click Next to continue

Image Added

In the Claims provider trust identifier box, enter the Entity ID of your DualShield SSO server, e.g. urn:deepnet:dual:idp:sso:mfa.fakestop.com

Expand
titleHow to find the IdP Entity ID...

Include Page
Find SSO Entity ID
Find SSO Entity ID

Click Next

Image Added

Click the Add button to import the IdP certificate of your DualShield SSO 

Expand
titleHow to download IdP certificate...

Include Page
Download IdP Certificate
Download IdP Certificate

Image Added

Click Next

Image Added

Click Next

Image Added

Click Close

Configure Claims Provider

After the DualShield claims provider has been added, it needs to be configured

Include Page
Configure the DualShield WSFED Claims Provider
Configure the DualShield WSFED Claims Provider