ADFS
This article outlines the configuration and setup process for Active Directory Federation Services (ADFS) in a Windows environment. ADFS enables secure federated identity and access management by sharing digital identities and entitlement rights across security and enterprise boundaries. It extends single sign-on capabilities to Internet-facing applications, ensuring a seamless and secure authentication experience.
This document includes prerequisites, configuration procedures for ADFS, Directory Services, Federation Services, and Relying Party Trusts, as well as initial login instructions and troubleshooting guidance for common deployment issues.
Purpose of the document
The purpose of this document is to provide clear, detailed, and professional guidance for configuring ADFS and DSFS to enable secure federated identity management and single sign-on (SSO) functionality for web-based applications.
Prerequisites
ADFS Setup
Active Directory Federation Services must be installed and operational.
Windows Server Access
Administrative privileges are required
Directory Service Configuration
Create Domain Users
Open Active Directory Users and Computers on the Windows server.

Navigate to the domain and click User.

Enter the required user details.



Add an email address for the domain user.

Click Apply, then OK.
Organize users into groups as needed.
Ensure usernames and email addresses follow the organization's naming conventions to avoid authentication issues.
Federation Service Configuration
Access ADFS Management
Open Administrative Tools from the Start menu.

Click ADFS Management.

Download Federation Metadata
Go to Service > Endpoints.

Locate the metadata endpoint.
Append the path with HTTPS and the ADFS server hostname or IP.
Example:
https://<ADFS-server-hostname>/FederationMetadata/2007-06/FederationMetadata.xmlDownload the FederationMetadata.xml file.

Import Signing Certificate
Obtain the signing certificate file ADFScert.cer.
Import it into the Tomcat SAML keystore using:
keytool -importcert -trustcacerts -alias "adfs" -keystore "C:\path\to\cacerts" -file <path-to-adfs_onprem.cer>Back up the keystore before making changes to prevent loss of critical certificates.
Configure Oasis Properties
samlHTTPMetadataProvider
Specify the appropriate URL or metadata source
entityBaseURL
Application deployment path
File Location:
/home/<client>/path/to/extprop/oasis.propertiesAfter updating, save the file.

Security Type Configuration
Windows Configuration
Open tomcat9w.exe.
Go to Java Options.
Add the following parameter:
-DOVALEDGE_SECURITY_TYPE=saml

Linux Configuration
Edit the setenv.sh file located at:
/home/<username>/tomcat_homepath/bin/setenv.shAdd:
export CATALINA_OPTS="-DOVALEDGE_SECURITY_TYPE=saml"Save the file and grant execute permission.
Restart Tomcat.
Relying Party Trust (ADFS) Configuration
Add SAML Metadata
Navigate to Relying Party Trust in ADFS.

Click Start and add the SAML Metadata for the application.

The metadata URL can be accessed as:
/home/<username>/tomcat_homepath/bin/setenv.shImport the metadata and click Next.

Specify the Display Name, and click Next.

Select the Access Control Policy, and click Next.

Click Next and finish the wizard.


Ensure the application URL is accessible before importing metadata.
Configure Advanced Settings
Double-click on the added Relying Party Trust.

Open the added Relying Party Trust.
Select the Advanced tab.
Change Secure Hash Algorithm to SHA1 from SHA256.
Click Apply, then OK.

Edit Claim Issuance Policy
Select the configured Relying Party Trust and click Edit Claim Issuance Policy.

Add a new rule using Send LDAP Attributes as Claims.

Let the Claim Rule Template be sent to the LDAP Attribute as Claims, and click on Next.

Specify the Claim Rule Name, and select Active Directory as the Attribute Store. Add the Attributes as given in the image below and click on Finish.

An alternative approach is to use the SAML Account Name if it is not available.

Click on Apply and OK.

Configure attributes as per application requirements.
Example Attribute Mapping:
SAM-Account-Name
Name ID
E-Mail-Addresses
E-Mail Address
Initial Login and Setup
Access the application web URL through a browser.

Log in using domain admin credentials.


At least one user must have the OE_ADMIN role. This must be updated in the database before the initial login.
Troubleshooting
Issue 1: No assertions found in the response
Solution:
Open PowerShell on the ADFS server.
Run:
Set-ADFSRelyingPartyTrust -TargetName <targetName> -SamlResponseSignature "MessageAndAssertion"Last updated
Was this helpful?

