File: adfs.md

package info (click to toggle)
simplesamlphp 1.19.7-2
  • links: PTS, VCS
  • area: main
  • in suites: sid
  • size: 42,920 kB
  • sloc: php: 202,044; javascript: 14,867; xml: 2,700; sh: 225; perl: 82; makefile: 70; python: 5
file content (83 lines) | stat: -rw-r--r-- 2,313 bytes parent folder | download | duplicates (4)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
Enables AD FS IdP
Compatible with VS 2012 Identity and Access

Basic Setup Companion based on:
http://simplesamlphp.org/docs/stable/simplesamlphp-idp

1. Enabling the Identity Provider functionality

In config/config.php, the option will be:
'enable.adfs-idp' => true

2. Authentication module

Follow as is.

3. Configuring the authentication module

In addition to enabling authentication module,  enable adfs module by creating a file named 'enable' in modules/adfs

In unix from installation directory:
touch modules/adfs/enable

4. Configuring the IdP

ADFS IdP is configured by metadata stored in /metadata/adfs-idp-hosted.php and metadata/adfs-sp-remote.php

If they are not present, copy them from /metadata-templates to the metadata
directory.

5. Using the uri NameFormat on attributes

WS-FED likes a few parameters to be very specifically named. This is
especially true if .net clients will be treating this as a Microsoft ADFS
IdP.

The recommended settings for /metadata/adfs-idp-hosted.php is:

'authproc' => array(
        // Convert LDAP names to WS-Fed Claims.
        100 => array('class' => 'core:AttributeMap', 'name2claim'),
),

6. Adding SPs to the IdP

The minimal configuration for /metadata/adfs-sp-remote.php is:

$metadata['urn:federation:localhost'] = array(
        'prp' => 'https://localhost/adfs/ls/',
);

7. Creating a SSL self signed certificate

Follow as is.

8. Adding this IdP to other SPs

Metadata should be available from /module.php/adfs/idp/metadata.php

9. This module tries its best to emulate a Microsoft ADFS endpoint, and as
such, it is simplest to test using a .net client.

To build the test client, follow the tutorial at:
http://code.msdn.microsoft.com/Claims-Aware-Web-d94a89ca

This will build a .net app that uses a dev machine running STS (their name for
an IdP).

To point to your SimpleSamlPHP ADFS IdP, in VS 2012:

a. Right-click the project in Solution Explorer and select the Identity and
Access option.

b. In the Identity and Access Window, Select Use a business identity
provider.

c. Under “Enter the path to the STS metadata document” enter the url you have

from step 8. Something like
https://.../module.php/adfs/idp/metadata.php

d. Click Ok

For more information in regards to .NET: http://msdn.microsoft.com/en-us/library/hh377151.aspx