ADFS SSO and SAML


we use third party application using cas sso. want application use adfs sso.

followed tons of articles on internet on setting right because vendor didn't have documentation on how make work adfs. support simple saml authentication , need attribute passed on "nameid". attribute use active directory samaccountname.

so done:

1. created relying party trust endpoint set point vendor's saml link binding set "post". sha-1 used.

2. created issuance transform rule used ldap attribute "sam-account-name" , outgoing claim type "nameid".

doesn't work. vendor says see saml connection our end value being passed null. trace fiddler shows
<samlp:statuscode value="urn:oasis:names:tc:saml:2.0:status:invalidnameidpolicy" />

basically, here need:

pass samaccountname active directory saml service "nameid". can please advise on how can done?

got work...phew!

the first rule correct.
second rule created as

incoming claim type: e-mail address

incoming name id format : unspecified

outgoing claim type: name id

outgoing name id format: email

not sure if vendor did on end. worked.



Windows Server  >  Directory Services



Comments

Popular posts from this blog

Motherboard replacement

Cannot create Full Text Search catalog after upgrading to V12 - Database is not fully started up or it is not in an ONLINE state

Remote Desktop App - Error 0x207 or 0x607