ADFS SSO and SAML
we use third party application using cas sso. want application use adfs sso.
followed tons of articles on internet on setting right because vendor didn't have documentation on how make work adfs. support simple saml authentication , need attribute passed on "nameid". attribute use active directory samaccountname.
so done:
1. created relying party trust endpoint set point vendor's saml link binding set "post". sha-1 used.
2. created issuance transform rule used ldap attribute "sam-account-name" , outgoing claim type "nameid".
doesn't work. vendor says see saml connection our end value being passed null. trace fiddler shows
<samlp:statuscode value="urn:oasis:names:tc:saml:2.0:status:invalidnameidpolicy" />
basically, here need:
pass samaccountname active directory saml service "nameid". can please advise on how can done?
got work...phew!
the first rule correct.
second rule created as
incoming claim type: e-mail address
incoming name id format : unspecified
outgoing claim type: name id
outgoing name id format: email
not sure if vendor did on end. worked.
Windows Server > Directory Services
Comments
Post a Comment