Microsoft Active Directory Federation Services - SAML My Page SSO Configuration - RSA Ready Implementation Guide
10 months ago
Originally Published: 2021-10-07

Microsoft Active Directory Federation Services - SAML SSO Agent Configuration - RSA Ready SecurID Access Implementation Guide

This section describes how to integrate Microsoft AD FS with RSA Cloud Authentication Service using My Page SSO to authenticate any third-party application.

Architecture Diagram

Admin_Dharani_0-1633645966751.png

 

 

Pre-requisites

  • To configure SSO, you'll need admin access to your third-party application (Salesforce was used for our testing).
  • Perform the below steps and export the Active Directory Federation Services (AD FS) token-signing certificate, as it will be required later to configure the third-party application—in this case, the Salesforce SAML settings.
    1. Open the Microsoft AD FS management console.

 

    1. Select Certificates and double click the token-signing certificate.
    2. Click the Details tab.
    3. Click Copy to File.
    4. Save the certificate in DER format.

Configure Third-Party Application

Perform these steps to configure a third-party application. In this case, we’ll be setting up Salesforce for testing purposes.

Procedure

  1. Log in to the Salesforce Administration Console. Navigate to SETTINGS > Identity, and then select Single Sign-On Settings.
 

A screenshot of a computerAI-generated content may be incorrect.

  1. Click the Edit button.
  2. Under Federated Single Sign-On Using SAML section, enable SAML Enabled checkbox, and click Save.

A screenshot of a computerAI-generated content may be incorrect.

  1. In the SAML Single Sign-On Settings section, click New to manually configure the SAML settings.
  2. Enter the following values in the corresponding fields:
    1. In the Name field, enter a name.
    2. In the Issuer field, enter the Active Directory Federation Services name appended by /adfs/services/trust in the following format: http://<Active-Directory-Federation-Service-name>/adfs/services/trust

Note: The above URL includes http not https.

    1. In the Entity ID field, enter an ID that starts with https://.In this example we used our Salesforce custom domain: https://innovation-page-938.lightning.force.com/
    2. In the Identity Provider Certificate section, click Choose File and select the Microsoft AD FS token-signing certificate referenced in the pre-requisite section.
    3. In SAML Identity Type, select Assertion contains Federation ID from the User object.
    4. In SAML Identity Location, select Identity is in the NameIdentifier element of the Subject statement.
    5. In Service Provider Initiated Request Binding, select HTTP POST.
    6. In Identity Provider Login URL field, enter the Active Directory Federation Services name appended by /adfs/ls/ in the following format: https://<Active-Directory-Federation-Service-name>/adfs/ls/

Note: This URL is https and you must include the slash at the end of the URL.

    1. Click Save.

A screenshot of a computerAI-generated content may be incorrect.

  1. In the SAML Single Sign-On Settings section, click the name of the configuration you just created.
  2. Select Download Metadata. This will be needed later to configure Microsoft AD FS Relying Party Trust.

A screenshot of a computerAI-generated content may be incorrect.

  1. Navigate to ADMINISTRATION > Users > Users.

A screenshot of a computerAI-generated content may be incorrect.

  1. Click the New button to add a new user.
  2. Send an invitation to add users to your team by entering their email and selecting the appropriate profile.

A screenshot of a login formAI-generated content may be incorrect.

  1. After sending an invite to a user, click the arrow on the left side next to their name, then select Edit User.

  1. Fill in all the required fields and enter the user's email address in the Federation ID field, and then click Save.

A screenshot of a computerAI-generated content may be incorrect.

  1. Navigate to SETTINGS > Company Settings > My Domain.

A screenshot of a phoneAI-generated content may be incorrect.

  1. Navigate to My Domain > My Domain Settings > My Domain Details and enter the desired login URL for your Salesforce domain. Click Check Availability, and once confirmed, click Save.

A screenshot of a computerAI-generated content may be incorrect.

  1. In My Domain Settings > Policies, make sure Prevent login from https://login.salesforce.com is unchecked.

Note: The above step helps avoid lockouts if SSO is misconfigured.

  1. In the My Domain Settings > Authentication Configuration, click Edit.
  2. In Authentication Configuration > Authentication Service, uncheck the Login Form checkbox and select the name of the SSO setting you just created (e.g., Microsoft ADFS in this example), then click Save.

Configure Microsoft AD FS to Send Claims

Perform the following steps to configure a third-party application as a Relying Party Trust in Microsoft AD FS for sending claims.

Procedure

  1. Open the Microsoft AD FS management console.

A screenshot of a computerAI-generated content may be incorrect.

  1. In the Actions pane on the right-hand side, Click Add Relying Party Trust.

A screenshot of a computer menuAI-generated content may be incorrect.

  1. The configuration wizard will launch, check that Claims aware radio option is selected then click Start.

A screenshot of a computerAI-generated content may be incorrect.

  1. Select Import data about the relying party from a file.
  2. Browse the third-party application metadata file—in this case, the Salesforce metadata file you downloaded earlier and click Next.

A screenshot of a computerAI-generated content may be incorrect.

  1. Enter a Display name and click Next.
  2. On the Choose Access Control Policy page, select Permit everyone and click Next.
  3. Verify that all information is accurate, then click Next, followed by Finish to complete the process.
  4. Right-click the Relying Party Trust just created, then select Edit Claim Issuance Policy.
  5. On the Edit Claim Issuance Policy page click Add Rule.
  6. From the Claim rule template dropdown select Send LDAP Attributes as Claims, then click Next.
  7. Enter a Claim rule name and from the Attribute store select Active Directory.
  8. In the Mapping of LDAP attributes to outgoing claim types window use the pull down to select E-Mail-Addresses and for Outgoing Claim Type select Name ID, then click Finish.

A screenshot of a computerAI-generated content may be incorrect.

  1. Double-click the Relying Party Trust created for Salesforce (in this case), and navigate to the Advanced tab.
  2. Select the Secure hash algorithm pulldown option SHA-1, then click Ok.

Note: For SP-initiated login to work, we need to set Active Directory Federation Services Secure Hash Algorithm parameter to SHA-1

A screenshot of a computerAI-generated content may be incorrect.

Verify that AD FS now protects Salesforce

  1. Browse to https://<Active-Directory-Federation-Service-name>/adfs/ls/IdpInitiatedSignon.aspx
  2. Enter the user credentials.

A screenshot of a computerAI-generated content may be incorrect.

  1. Verify that the user logins to Salesforce.

A screenshot of a computerAI-generated content may be incorrect.

Configure RSA Cloud Authentication Service

Perform these steps to configure RSA Cloud Authentication Service using My Page SSO.

Procedure

  1. Sign in to RSA Cloud Administration Console and browse to Applications > Application Catalog, search for Microsoft AD FS and click Add to add the connector.

A screenshot of a computerAI-generated content may be incorrect.

  1. Choose Cloud on the Basic Information page.
  2. Enter the name for the application and click the Next Step button.

A screenshot of a computerAI-generated content may be incorrect.

  1. On the Connection Profile page, Navigate to Initiate SAML Workflow section and choose SP-initiated.
  2. In the Connection URL field, enter the URL to the Active Directory Federation Services login page in the following format: https://<Active-Directory-Federation-Service-name>/adfs/ls/idpinitiatedsignon.aspx

A screenshot of a computerAI-generated content may be incorrect.

  1. Scroll down to the Service Provider section and provide the following details:
    1. Assertion Consumer Service (ACS) URL - enter the Active Directory Federation Services name appended by /adfs/ls/ in the following format: https://<Active-Directory-Federation-Service-name>/adfs/ls/

Note: This URL is https, and you must include the slash at the end of the URL.

    1. Audience (Service Provider Issuer ID) – enter the Active Directory Federation Services name appended by /adfs/services/trust in the following format: http://<Active-Directory-Federation-Service-name>/adfs/services/trust

Note: The above URL includes http not https.

  1. Identity Provider URL is automatically generated. Be sure to take note of its value, as it will be necessary for the Microsoft AD FS configuration.
  2. Scroll down to the Message Protection section, Select the checkbox labeled "Override default signing key and certificate."
  3. You must import a private/public key pair to sign and validate SAML assertions. If you don’t have one readily available, follow the steps to generate a certificate bundle. Otherwise, continue to the next step.
    1. Click the Generate Certificate Bundle button in the SAML Response Signature section.
    2. Enter a common name in the Common Name (CN) field.
    3. Click the Generate and Download button, save the certificate bundle ZIP file to a secure location and extract its contents. The ZIP file will contain a private key, a public certificate and a certificate signing request.
    4. Verify that Signature Algorithm is set to RSA-SHA256.

A screenshot of a computerAI-generated content may be incorrect.

  1. Select Show Connection Profile Advanced Configuration dropdown and under User Identity section select the Identifier Type and Property values.
    1. Select unspecified from the Identifier Type dropdown list.
    2. Select mail from the Property dropdown list.
  2. Click Next Step.
  3. On the User Access page, choose the access policy you want to use to determine which users can access the application, then click Next Step.

A screenshot of a computer errorAI-generated content may be incorrect.

  1. On the Portal Display page, configure the portal display and other settings. Then click Next Step.
  2. On the Fulfillment page, configure your preferred settings or leave the Fulfillment toggle button disabled as it is, then click Save and Finish.
  3. Locate the application just created in My Applications page and click the dropdown arrow next to Edit > Export Metadata.
  4. Click Publish Changes and wait for the operation to be completed.

A picture containing text, font, screenshot, logoDescription automatically generated

  1. After publishing, your application is now enabled for SSO. 

Configure Microsoft AD FS to Add a Claim Provider Trust

Perform the following steps to configure RSA Cloud Authentication Service as a Claims Provider Trust in Microsoft AD FS for use as an Identity Provider.

Procedure

  1. Open the Microsoft AD FS management console.

A screenshot of a computerAI-generated content may be incorrect.

  1. In the Actions pane on the right-hand side, Click Add Claims Provider Trust.

A screenshot of a computer menuAI-generated content may be incorrect.

  1. The Add Claims Provider Trust Wizard will open, then click Start.
  2. On the Select Data Source page, select Import data about the claims provider from a file, click Browse.
  3. Select the metadata file that was previously downloaded from the RSA Cloud Administration Service during the configuration of the Microsoft AD FS connector, then click Next.

A screenshot of a computerAI-generated content may be incorrect.

  1. On the Specify Display Name page, enter a Display name and click Next.
  2. Verify that all information is accurate, then click Next, followed by Finish to complete the process.
  3. Right-click the Claim Provider Trust just created, then select Edit Claim Rules.
  4. On the Acceptance Transform Rules tab, click Add Rule.
  5. On the Select Rule Template page, choose "Pass Through or Filter an Incoming Claim" from the Claim rule template dropdown menu.

A screenshot of a computer screenAI-generated content may be incorrect.

  1. On the Configure Claim Rule page, complete the following steps, then click Finish:
    1. Enter a Claim rule name.
    2. Select Name ID from the Incoming claim type pulldown.
    3. Select Unspecified from the Incoming name ID format pulldown.
    4. Select Pass through all claim values.

A screenshot of a computerAI-generated content may be incorrect.

  1. In the left-hand menu, click Relying Party Trusts, then find and select the relying party trust configured earlier for the third-party application — in this case, Salesforce. Right-click on it and select "Edit Claim Issuance Policy.”
  2. On Issuance Transform Rules, click Add Rule.
  3. On the Select Rule Template page, choose "Pass Through or Filter an Incoming Claim" from the Claim rule template dropdown menu.
  4. On the Configure Claim Rule page, complete the following steps, then click Finish:
    1. Enter a Claim rule name.
    2. Select Name ID from the Incoming claim type pulldown.
    3. Select Unspecified from the Incoming name ID format pulldown.
    4. Select Pass through all claim values.

Verify that Microsoft AD FS now redirects to the RSA portal

  1. Browse to https://<Active-Directory-Federation-Service-name>/adfs/ls/IdpInitiatedSignon.aspx. From the dropdown menu, select your site—for example, Salesforce.

A screenshot of a computerAI-generated content may be incorrect.

  1. Select the identity source to validate against.

A screenshot of a computerAI-generated content may be incorrect.

  1. Enter your credentials and get logged to your Salesforce home page.

A screenshot of a login pageAI-generated content may be incorrect.

A screenshot of a computerAI-generated content may be incorrect.

Configuration is complete.