ADFS via SAML
Prerequisites
You must have an Aerofiler subscription that supports ADFS via SAML integration and Aerofiler Support must have enabled the integration for your Account.
You have provided Aerofiler with the URL to download the federation metadata.
Aerofiler has provided you with an xml file which is used in the steps below to configure you Relying Party Trust.
Details
Open âAD FS Managementâ
Add a new Relying Party Trust:
Click âAdd Relying Party Trustâ in the Relying Party Trusts section, and configure with the following:
âClaims awareâ, then Next
âImport data about the relying party from a fileâ, and load the file received from Aerofiler, then Next
Enter a suitable Display Name and Notes if necessary, then Next
Choose a relevant Access Control Policy for your organisationâs requirements, then Next
In the âReady to Add Trustâ screen, go to Advanced and ensure SHA-256 is selected as the hash algorithm, then Next
Ensure âConfigure claims issuance policy for this applicationâ is selected, then âCloseâ
Configure Claim Issuance Policy
The âEdit Claim Issuance Policyâ window should automatically open, otherwise, in the Relying Party Trusts list, right-click the relying party object that you created, click Edit Claims Rules
Add Name ID rule:
In the Claim rule template list, select the âTransform an Incoming Claimâ template, and then click Next.
Name the rule
Incoming Claim Type: UPN
Outgoing Claim Type: Name ID
Outgoing Name ID Format: Email
Pass through all claim values (the default)
Click Finish
Click OK to finish creating the rule.
Notify Aerofiler that the setup within your server is complete.
Aerofiler will then enable ADFS via SAML login within your environment.
Appendix - UPN Does Not Match Aerofiler Email Address
If in your Active Directory the UPNs for users do not match the email addresses used as logins within Aerofiler and you wish to use the âE-mailâ attribute of a user instead, configure the following rule in additional to the above rule:
Email Rule:
In the Claim rule template list, select the âSend LDAP Attributes as Claimsâ template, and then click Next.
Name the rule
For Attribute Store, select your Active Directory store
Add the following mapping:
LDAP Attribute: E-Mail-Addresses
Outgoing Claim Type: E-Mail Address
Click Finish
Last updated