Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

You need to To add your ADFS server as a SAML Service Provider in your DualShield server, follow steps below.

In the DualShield Admin Console, select "SSO | Service Providers", then click "Create" on the toolbar.

...

OptionValue
SSO Serverselect the SSO server to which the ADFS will be connected, e.g."Single Sign-On Server"
Applicationselect the application that you created for ADFS integration in the previous step, e.g. "ADFS"
Nameenter a descriptive text as the name of the service provider to be created, e.g. "ADFS"
Typeselect "SAML 2.0"
NameID Format


Sign on SAML Assertion

Image Modified

Add "InResponseTo"

Image Modified

Image RemovedImage Added

Click the "Create Metadata" button

...

<EntityDescriptor entityID="httpshttp://your-adfs-address/adfs/services/trust" xmlns="urn:oasis:names:tc:SAML:2.0:metadata" xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion" xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
<SPSSODescriptor
AuthnRequestsSigned="false"
WantAssertionsSigned="true"
protocolSupportEnumeration="urn:oasis:names:tc:SAML:2.0:protocol">

<SingleLogoutService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST" Location="https://your-adfs-address/adfs/ls/"/>
<NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress</NameIDFormat>
<NameIDFormat>urn:oasis:names:tc:SAML:2.0:nameid-format:persistent</NameIDFormat>
<NameIDFormat>urn:oasis:names:tc:SAML:2.0:nameid-format:transient</NameIDFormat>
<AssertionConsumerService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST" Location="https://your-adfs-address/adfs/ls/" index="0" isDefault="true"/>
</SPSSODescriptor>
</EntityDescriptor>

...