SecurEnds ADFS Architecture Diagram:
SAML Web SSO Authentication:
Configurations on SecurEnds:
Configurations on ADFS:
3. On the left hand tree view, select “Relying Party Trusts”.
4. Right click and select “Add Relying Party Trust…”
5. Select the Relying Party Trusts folder from AD FS Management, and add a new Add Relying Trust from the Actions sidebar on the right.
6. On the Select Data Source screen:
7. On the next screen, enter a Display name that you will recognize in the future.
8. On the next screen, leave the defaults.
9. On the next screen, select: Permit all users to access this relying party.
10. On the next screens, the wizard will display an overview of your settings.
11. On the final screen use the “Close” button to exit and open the Claim Rules editor
Once the “Relying party Trust” exists, you can create the claim rules and update the “Relying Party Trust” with minor changes that are not set by the wizard.
2. Select: Send LDAP Attributes as Claims rule.
3. On the next screen, using Active Directory as your attribute store, do the following:
4.Click on Finish or OK to save the new rule.
5. Create another new rule by clicking Add Rule.
6. On the next screen:
7. Finally, click OK to create the claim rule, and then OK again to finish creating rules.
Some settings on your Relying Party Trust will need to be adjusted. To access these settings, select Properties from the Actions sidebar on the right while you have the Relying Party Trust selected.
Note 1: Please find the SecurEnds Application sample metadata config file.
Note 2: We need Identity Provider Metadata URL and Identity postLogoutURL from BrightView.
Powered by BetterDocs
Other product and company names mentioned herein are the property of their respective owners.
It’s official, SecurEnds raises $21M Series A! For more details, check out our Press Release and a message from our CEO.