The following guide will assist you in configuring your application to use Active Directory Federation Services (ADFS) for authentication.
- Open the ADFS console, expand
Trust Relationships, right-clickRelying Part Trustsand selectAdd relying-party trust - Click
Nextand selectEnter data about the relying party manually - Specify
Lithnet Access Manageras the display name - Select
AD FS profile - Skip the encryption certificate step
- Check the box to
Enable support for the WS-Federation Passive protocol. Specify the base URL where your Lithnet Access Manager is hosted (eghttps://accessmanager.lithnet.local/) - Skip the page prompting you to add additional relying party trust identifiers
- Optionally, configure multi-factor authentication for the trust, and follow the remaining pages through to completion
- Edit the claim rules for the application. Add a new issuance transform rule to
Send LDAP attributes as claims - Set 'Issue UPN' as the claim rule name. Select
Active Directoryas the attribute store,User-Principal-Nameas theLDAP AttributeandUPNas the outgoing claim type
- In the
metadatafield, provide the metadata URL for your ADFS server (usually something likehttps://adfs.lithnet.local/FederationMetadata/2007-06/FederationMetadata.xml) - Enter the base URL of your application in the
Realmfield.
