Setting up authentication with ADFS
The following guide will assist you in configuring your application to use Active Directory Federation Services (ADFS) for authentication.
Part 1: Configure a new replying party trust in ADFS
Open the ADFS console, expand
Trust Relationships, right-clickRelying Part Trustsand selectAdd relying-party trustClick
Nextand selectEnter data about the relying party manuallySpecify
Lithnet Access Manageras the display nameSelect
AD FS profileSkip the encryption certificate step
Check the box to
Enable support for the WS-Federation Passive protocol. Specify the base URL where your Lithnet Access Manager is hosted (eghttps://accessmanager.lithnet.local/)Skip the page prompting you to add additional relying party trust identifiers
Optionally, configure multi-factor authentication for the trust, and follow the remaining pages through to completion
Edit the claim rules for the application. Add a new issuance transform rule to
Send LDAP attributes as claimsSet 'Issue UPN' as the claim rule name. Select
Active Directoryas the attribute store,User-Principal-Nameas theLDAP AttributeandUPNas the outgoing claim type
Part 2: Configure Lithnet Access Manager

In the
metadatafield, provide the metadata URL for your ADFS server (usually something likehttps://adfs.lithnet.local/FederationMetadata/2007-06/FederationMetadata.xml)Enter the base URL of your application in the
Realmfield.
Last updated
Was this helpful?