In this article you will find the necessary steps to configure a connection between Microsoft AD FS and Mosaic's authentication platform to establish a Single-Sign-On experience for your enterprise users using Mosaic.
If at any time there are questions or issues with the connection, please reach out to support@mosaic.pe for assistance.
Microsoft AD FS Configuration
- Open the AD FS 2.0 console
- Go to Trust Relationships > Relying Party Trusts > Add relying party trusts. This will start a wizard.
- Select Enter data about the relying party manually.
- Enter a display name for the relying party configuration, such as Mosaic.
- On the next screen, do not configure a certificate.
- Enable support for the SAML 2.0 single sign-on service URL.
- Add urn:amazon:cognito:sp:us-east-1_snwpaAR4h as the relying party trust identifier.
- Configure the SAML POST binding. The SAML 2.0 post-binding endpoint is https://auth.mosaic.pe/saml2/idpresponse.
- Select Permit all users to access this relying party.
- Choose Finish.
- Navigate to Trust Relationships > Relying Party Trusts. You should see that urn:amazon:cognito:sp:us-east-1_snwpaAR4h is configured as the relying party.
- Select the relying party trust from the Trust Relationships > Relying Party Trusts screen, and then, in the Actions tab on the right side, choose Edit Claim Rules
- On the Configure Claim Rule page, enter the following values for each configuration element, and then choose OK.
-
Claim rule name: Email Address
Incoming claim type: User-Principal-Name
Outgoing claim type: E-mail Address
Outgoing name ID format: Persistent identifier -
Claim rule name: Surname
Attribute Directory: Active Directory
LDAP Attributes: Surname
Outgoing Claim Type: Surname -
Claim rule name: Given Name
Attribute Directory: Active Directory
LDAP Attributes: Given-Name
Outgoing Claim Type: Given Name
-
Claim rule name: Email Address
- Before leaving the AD FS configuration, download the metadata file for the AD FS. The metadata URL for AD FS looks like the following: https://<servername>/FederationMetadata/2007-06/FederationMetadata.xml
- If necessary, restart the AD FS service to apply configuration changes.
Mosaic Configuration
Once you have completed the steps above, please email support@mosaic.pe with the metadata from Step 14, as well as a list of all possible domains that might be authenticating via your AD FS instance. For example: yourdomain.com, yourdomain.net, etc.
Comments
0 comments
Article is closed for comments.