ADFS via SAML
Prerequisites
You must have an Aerofiler subscription that supports ADFS via SAML integration and Aerofiler Support must have enabled the integration for your Account.
You have provided Aerofiler with the URL to download the federation metadata.
Aerofiler has provided you with an xml file which is used in the steps below to configure you Relying Party Trust.
Details
Open “AD FS Management”
Add a new Relying Party Trust:
Click “Add Relying Party Trust” in the Relying Party Trusts section, and configure with the following:
“Claims aware”, then Next
“Import data about the relying party from a file”, and load the file received from Aerofiler, then Next
Enter a suitable Display Name and Notes if necessary, then Next
Choose a relevant Access Control Policy for your organisation’s requirements, then Next
In the “Ready to Add Trust” screen, go to Advanced and ensure SHA-256 is selected as the hash algorithm, then Next
Ensure “Configure claims issuance policy for this application” is selected, then “Close”
Configure Claim Issuance Policy
The “Edit Claim Issuance Policy” window should automatically open, otherwise, in the Relying Party Trusts list, right-click the relying party object that you created, click Edit Claims Rules
Add Name ID rule:
In the Claim rule template list, select the “Transform an Incoming Claim” template, and then click Next.
Name the rule
Incoming Claim Type: UPN
Outgoing Claim Type: Name ID
Outgoing Name ID Format: Email
Pass through all claim values (the default)
Click Finish
Click OK to finish creating the rule.
Notify Aerofiler that the setup within your server is complete.
Aerofiler will then enable ADFS via SAML login within your environment.
Appendix - UPN Does Not Match Aerofiler Email Address
If in your Active Directory the UPNs for users do not match the email addresses used as logins within Aerofiler and you wish to use the “E-mail” attribute of a user instead, configure the following rule in additional to the above rule:
Email Rule:
In the Claim rule template list, select the “Send LDAP Attributes as Claims” template, and then click Next.
Name the rule
For Attribute Store, select your Active Directory store
Add the following mapping:
LDAP Attribute: E-Mail-Addresses
Outgoing Claim Type: E-Mail Address
Click Finish
Last updated