Skip to main content

Example: Integrate with Active Directory Federation Services IdP

In this example, we use two endpoints for the federation integration:

  • The SP, Bravura Security Fabric : https://app.demo.local/instance/

  • The IdP, Active Directory Federation Services: https://adfs.demo.local/adfs/ls/

The domains and instance name have to be changed to fit the instances being integrated. The rest of the paths are fixed.

Configure Relying Party Trust in Active Directory Federation Services (AD FS)
  1. Open the AD FS Management Tool in Server Manager.

    adfs-AddRelyingPartyTrust
  2. Click on Add Relying Party Trust in Actions.

    adfs-AddRelyingPartyTrust2
  3. Keep the default "Claims aware" option and click Start.

    adfs-AddRelyingPartyTrust3
  4. Choose the "Enter data about the relying party manually" option, and click Next .

  5. Type the name by which the instance of our product being added as Service Provider is known in the customer's infrastructure, for example “Bravura Security Fabric” in the Display name field and click Next .

  6. Click Next on the Configure Certificate page to accept defaults.

    adfs-AddRelyingPartyTrust-url
  7. Select "Enable support for the WS-Federation and SAML" in the Configure URL field, type https://app.demo.local/instance/ then click Next .

    adfs-AddRelyingPartyTrust-identifiers
  8. If there is no entry in the Relying party trust identifiers list on the Configure Identifiers page, type https://app.demo.local/instance/ in the identifiers field and click Add, then Next.

  9. Click Next in the Choose Access Control Policy page to accept defaults.

  10. Click Next in the Ready to Add Trust page to accept defaults.

  11. Click Close.

  12. In the AD FS Management tool navigate to Relying Party Trust and select "Bravura Security".

  13. Click on the Edit Claim Insurance Policy.

  14. Click Add Rule.

  15. Keep default "Send LDAP Attributes as Claims" in the Select Rule Template page, then click Next .

  16. Type send LDAP attributes in the Claim rule name field, select "Active Directory" in Attribute Store, select "SAM-Account-Name" in LDAP Attribute and "Name ID" in the Outgoing Claim Type, then click OK.

Export signing certificate from AD FS
  1. Open the AD FS Management Tool in Server Manager.

  2. Navigate to Services > Certificates.

  3. Select Token Signing certificate and then select View Certificate from the Actions menu (or right click > View).

  4. Click the Details tab.

  5. Click Copy to File and click Next .

  6. Select "Base64 encoded X.509" in the Export File Format page.

  7. Add a descriptive Name (for example "adfs-domain-name-environment.cer" - with the actual domain name being integrated and environment type [dev, uat, prod]), then save the exported file into the Temp folder and click Next .

  8. Click Finish to complete the export process.

  9. Copy the exported certificate into the plugin\ folder of the Bravura Security Fabric instance.

Configure SAML Authentication in Bravura Security Fabric

See generic instructions in Set up Bravura Security Fabric to authenticate with an IdP .

The instance profiles must be created from the Active Directory domain being integrated, or at least a profile attribute has to be populated with that Active Directory's UPN.

When editing the fedidp_samlauth module options ( Step 3-Step 5 ), enter details of the AD FS server in the Authentication chain information page:

  • Single sign-on URL: https://adfs.demo.local/adfs/ls / (this is the AD FS endpoint)

  • Issuer to send to identity provider: https://app.demo.local/instance/ (this is the Relying party identified configured in AD FS)

  • Single sign-on binding: HTTP POST

  • Identity provider issuer: http://adfs.demo.local/adfs/services/trust

  • Identity provider public certificate file (.cer): adfs-domain-environment.cer (the one saved from AD FS)

  • Identity provider subject type: Profile ID (if the profile name matches the AD UPN, otherwise choose "Profile attribute").

  • Subject profile attribute: Leave blank if ProfileID above, otherwise the name of the profile attribute containing the AD UPN - usually EMAIL.