Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Azure ADFS Auth Client Setup

Roost 0Auth2 Setup - Windows Server 2016/2019 - ADFS 4.0

  1. Open the Server Manager from Start Menu, Select Tools > AD FS Management

  2. From the AD FS Management screen, go to AD FS ➜ Application Groups

  3. Click Add Application Group on right panel

  1. Fill in a name (Roost) for the application group

  2. Select Server Application Web browser accessing a web API and click Next

  3. Make note of the Client Identifier value. This will be the value for the AZURE_ADFS_CLIENT_ID variable

  4. Fill the Redirect URI (https://zbio.roost.io/login ) and click Add, then Next

  5. Check the Genrate a shared secret box

  6. Use the Copy to clipboard button to retrieve the secret. This will be the value for the AZURE_ADFS_CLIENT_SECRET variable. Click Next

  7. Enter the Web API identifier (Same as RedirectUri - https://zbio.roost.io/login ) and click Add, then Next

  8. On the Access Control Policy screen, select a policy, usually Permit everyone and click Next

  9. On the Configure Application Permissions screen, select the scope openid and click Next

  10. Review the settings and click Next

  11. Close the wizard by clicking Close. Our application is now registered in ADFS.

  1. Now, we need to Configure the Claims for Application

  1. Open the Properties for the application group we just created.

  2. Select the Web application entry (Roost - Web API) and click Edit

  3. On the Issuance Transform Rules tab, click the Add Rule button

  4. Select Send LDAP Attributes as Claims and click Next

  5. Give the rule a name (Roost Claims) and select Active Directory as the attribute store.

  6. Now configure the below claims (LDAP Attribute => Outgoing Claim Type):

  1. E-Mail-Addresses => E-Mail Address

  2. Given-Name => Given Name

  3. Surname => Surname

  4. SAM-Account-Name => Windows Account Name

  5. User-Principal-Name => UPN

  1. Click Finish to save the claims

  2. You should now see the rule added. Click OK a couple of times to save the settings.

  1. Now the setup is complete. We set these 3 values as environment variables:

  1. AZURE_ADFS_CLIENT_ISSUER  - Domain of ADFS Server (https://adfs.contoso.com)

  2. AZURE_ADFS_CLIENT_ID  - Client Identifier of server application

  3. AZURE_ADFS_CLIENT_SECRET  - Client Secret we copied to clipboard

If don’t want to use Client Secret, then Add an Native Application and pass AZURE_ADFS_CLIENT_SECRET variable as empty

<< Pre-requisites DB Setup >>

...