Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

All steps are done using the ADFS configuration manager. Note that the screens for Azure AD are different:

Image Removed

 Image Added

 

Image Removed

Add relying party trust

Click Add relying Party Trust in the Actions panel.

Image Removed Image Added

Select a display name

This display name is just the name under which you will find your configuration on your ADFS. It has no impact on the configuration.

Image RemovedImage Added

Tick AD FS profile option

Image RemovedImage Added

No certificate required here

 

Image RemovedImage Added


Enable support for the SAML 2.0 WebSSO protocol

The Relying Party SAML 2.0 SSO service URL (also called Endpoint URL) is the URL which will forward the users to your authentication portal.
It should have been provided by Wordbee in the "SSO - Configuration Information" document. 

Image RemovedImage Added

Relying Party trust identifier

The Relying party trust identifier (also called Service Principal Name) is the unique ID that will be used between our services. A suggested ID should have been provided by Wordbee in the "SSO - Configuration Information" document.
It can be changed if you prefer but should be the same on Service Provider and on Identification Provider, please let us know if our suggestion doesn't match your preferences.

Image RemovedImage Added

This screen allows you to configure multifactor, which is out of scope of this guide.

Image RemovedImage Added

Permit all users to access this relying party

It is possible to set the default behavior as "deny" and grant only specific users access to your platform, but this configuration is out of scope for this guide.

Image RemovedImage Added

The next steps of the wizard are only to verify and finish your configuration. Uncheck the box "Open the Edit Claim Rules dialog...", we will configure them later.

...

On the "Signature" tab, upload the public certificate provided by Wordbee.

Image Removed 

Image Added

Hash Algorithm

Under "advanced" tab, make sure SHA-256 is selected.

Image RemovedImage Added

Step 2 - Creating claim rules

...

"Add Rule" and "Send LDAP Attributes as Claims"

Image RemovedImage Added

Select the attributes to send

...

"Claim rule name" is just a friendly name and "Attribute store" should be Active Directory.

Image RemovedImage Added

Step 3 - Activation by Wordbee

...

This certificate can be found on your ADFS management console, under Service > Certificates, select the token signing cert and clic "View Certificate"

Image RemovedImage Added

Go to details tab, clic "copy to file"

Image RemovedImage Added

This should open the Certificate export wizard, export it in Base 64 file.

Image RemovedImage Added

This file does not include the private key and can be safely sent via mail.

...

The Identity Provider Name is also called "Federation Service Identifier" and can be found in the Federation Service Properties of your ADFS as shown on the screenshots below.

Image RemovedImage AddedImage Removed

Image Added

Single Sign On service URL

In Service > Endpoints, you can find your SSO Service URL:

Image RemovedImage Added

 

Federation Metadata URL

In the same folder, a bit below, you can find your metadata:

Image Added

 

...