Microsoft Active Directory Federation Services - SAML SSO Agent Configuration - RSA Ready SecurID Access Implementation Guide
This section describes how to integrate Microsoft AD FS with RSA Cloud Authentication Service using My Page SSO to authenticate any third-party application.
Architecture Diagram
Pre-requisites
- To configure SSO, you'll need admin access to your third-party application (Salesforce was used for our testing).
- Perform the below steps and export the Active Directory Federation Services (AD FS) token-signing certificate, as it will be required later to configure the third-party application—in this case, the Salesforce SAML settings.
- Open the Microsoft AD FS management console.
-
- Select Certificates and double click the token-signing certificate.
- Click the Details tab.
- Click Copy to File.
- Save the certificate in DER format.
Configure Third-Party Application
Perform these steps to configure a third-party application. In this case, we’ll be setting up Salesforce for testing purposes.
Procedure
- Log in to the Salesforce Administration Console. Navigate to SETTINGS > Identity, and then select Single Sign-On Settings.
- Click the Edit button.
- Under Federated Single Sign-On Using SAML section, enable SAML Enabled checkbox, and click Save.
- In the SAML Single Sign-On Settings section, click New to manually configure the SAML settings.
- Enter the following values in the corresponding fields:
- In the Name field, enter a name.
- In the Issuer field, enter the Active Directory Federation Services name appended by /adfs/services/trust in the following format: http://<Active-Directory-Federation-Service-name>/adfs/services/trust
Note: The above URL includes http not https.
-
- In the Entity ID field, enter an ID that starts with https://.In this example we used our Salesforce custom domain: https://innovation-page-938.lightning.force.com/
- In the Identity Provider Certificate section, click Choose File and select the Microsoft AD FS token-signing certificate referenced in the pre-requisite section.
- In SAML Identity Type, select Assertion contains Federation ID from the User object.
- In SAML Identity Location, select Identity is in the NameIdentifier element of the Subject statement.
- In Service Provider Initiated Request Binding, select HTTP POST.
- In Identity Provider Login URL field, enter the Active Directory Federation Services name appended by /adfs/ls/ in the following format: https://<Active-Directory-Federation-Service-name>/adfs/ls/
Note: This URL is https and you must include the slash at the end of the URL.
-
- Click Save.
- In the SAML Single Sign-On Settings section, click the name of the configuration you just created.
- Select Download Metadata. This will be needed later to configure Microsoft AD FS Relying Party Trust.
- Navigate to ADMINISTRATION > Users > Users.
- Click the New button to add a new user.
- Send an invitation to add users to your team by entering their email and selecting the appropriate profile.
- After sending an invite to a user, click the arrow on the left side next to their name, then select Edit User.
- Fill in all the required fields and enter the user's email address in the Federation ID field, and then click Save.
- Navigate to SETTINGS > Company Settings > My Domain.
- Navigate to My Domain > My Domain Settings > My Domain Details and enter the desired login URL for your Salesforce domain. Click Check Availability, and once confirmed, click Save.
- In My Domain Settings > Policies, make sure Prevent login from https://login.salesforce.com is unchecked.
Note: The above step helps avoid lockouts if SSO is misconfigured.
- In the My Domain Settings > Authentication Configuration, click Edit.
- In Authentication Configuration > Authentication Service, uncheck the Login Form checkbox and select the name of the SSO setting you just created (e.g., Microsoft ADFS in this example), then click Save.
Configure Microsoft AD FS to Send Claims
Perform the following steps to configure a third-party application as a Relying Party Trust in Microsoft AD FS for sending claims.
Procedure
- Open the Microsoft AD FS management console.
- In the Actions pane on the right-hand side, Click Add Relying Party Trust.
- The configuration wizard will launch, check that Claims aware radio option is selected then click Start.
- Select Import data about the relying party from a file.
- Browse the third-party application metadata file—in this case, the Salesforce metadata file you downloaded earlier and click Next.
- Enter a Display name and click Next.
- On the Choose Access Control Policy page, select Permit everyone and click Next.
- Verify that all information is accurate, then click Next, followed by Finish to complete the process.
- Right-click the Relying Party Trust just created, then select Edit Claim Issuance Policy.
- On the Edit Claim Issuance Policy page click Add Rule.
- From the Claim rule template dropdown select Send LDAP Attributes as Claims, then click Next.
- Enter a Claim rule name and from the Attribute store select Active Directory.
- In the Mapping of LDAP attributes to outgoing claim types window use the pull down to select E-Mail-Addresses and for Outgoing Claim Type select Name ID, then click Finish.
- Double-click the Relying Party Trust created for Salesforce (in this case), and navigate to the Advanced tab.
- Select the Secure hash algorithm pulldown option SHA-1, then click Ok.
Note: For SP-initiated login to work, we need to set Active Directory Federation Services Secure Hash Algorithm parameter to SHA-1
Verify that AD FS now protects Salesforce
- Browse to https://<Active-Directory-Federation-Service-name>/adfs/ls/IdpInitiatedSignon.aspx
- Enter the user credentials.
- Verify that the user logins to Salesforce.
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service using My Page SSO.
Procedure
- Sign in to RSA Cloud Administration Console and browse to Applications > Application Catalog, search for Microsoft AD FS and click Add to add the connector.
- Choose Cloud on the Basic Information page.
- Enter the name for the application and click the Next Step button.
- On the Connection Profile page, Navigate to Initiate SAML Workflow section and choose SP-initiated.
- In the Connection URL field, enter the URL to the Active Directory Federation Services login page in the following format: https://<Active-Directory-Federation-Service-name>/adfs/ls/idpinitiatedsignon.aspx
- Scroll down to the Service Provider section and provide the following details:
- Assertion Consumer Service (ACS) URL - enter the Active Directory Federation Services name appended by /adfs/ls/ in the following format: https://<Active-Directory-Federation-Service-name>/adfs/ls/
Note: This URL is https, and you must include the slash at the end of the URL.
-
- Audience (Service Provider Issuer ID) – enter the Active Directory Federation Services name appended by /adfs/services/trust in the following format: http://<Active-Directory-Federation-Service-name>/adfs/services/trust
Note: The above URL includes http not https.
- Identity Provider URL is automatically generated. Be sure to take note of its value, as it will be necessary for the Microsoft AD FS configuration.
- Scroll down to the Message Protection section, Select the checkbox labeled "Override default signing key and certificate."
- You must import a private/public key pair to sign and validate SAML assertions. If you don’t have one readily available, follow the steps to generate a certificate bundle. Otherwise, continue to the next step.
- Click the Generate Certificate Bundle button in the SAML Response Signature section.
- Enter a common name in the Common Name (CN) field.
- Click the Generate and Download button, save the certificate bundle ZIP file to a secure location and extract its contents. The ZIP file will contain a private key, a public certificate and a certificate signing request.
- Verify that Signature Algorithm is set to RSA-SHA256.
- Select Show Connection Profile Advanced Configuration dropdown and under User Identity section select the Identifier Type and Property values.
- Select unspecified from the Identifier Type dropdown list.
- Select mail from the Property dropdown list.
- Click Next Step.
- On the User Access page, choose the access policy you want to use to determine which users can access the application, then click Next Step.
- On the Portal Display page, configure the portal display and other settings. Then click Next Step.
- On the Fulfillment page, configure your preferred settings or leave the Fulfillment toggle button disabled as it is, then click Save and Finish.
- Locate the application just created in My Applications page and click the dropdown arrow next to Edit > Export Metadata.
- Click Publish Changes and wait for the operation to be completed.
- After publishing, your application is now enabled for SSO.
Configure Microsoft AD FS to Add a Claim Provider Trust
Perform the following steps to configure RSA Cloud Authentication Service as a Claims Provider Trust in Microsoft AD FS for use as an Identity Provider.
Procedure
- Open the Microsoft AD FS management console.
- In the Actions pane on the right-hand side, Click Add Claims Provider Trust.
- The Add Claims Provider Trust Wizard will open, then click Start.
- On the Select Data Source page, select Import data about the claims provider from a file, click Browse.
- Select the metadata file that was previously downloaded from the RSA Cloud Administration Service during the configuration of the Microsoft AD FS connector, then click Next.
- On the Specify Display Name page, enter a Display name and click Next.
- Verify that all information is accurate, then click Next, followed by Finish to complete the process.
- Right-click the Claim Provider Trust just created, then select Edit Claim Rules.
- On the Acceptance Transform Rules tab, click Add Rule.
- On the Select Rule Template page, choose "Pass Through or Filter an Incoming Claim" from the Claim rule template dropdown menu.
- On the Configure Claim Rule page, complete the following steps, then click Finish:
- Enter a Claim rule name.
- Select Name ID from the Incoming claim type pulldown.
- Select Unspecified from the Incoming name ID format pulldown.
- Select Pass through all claim values.
- In the left-hand menu, click Relying Party Trusts, then find and select the relying party trust configured earlier for the third-party application — in this case, Salesforce. Right-click on it and select "Edit Claim Issuance Policy.”
- On Issuance Transform Rules, click Add Rule.
- On the Select Rule Template page, choose "Pass Through or Filter an Incoming Claim" from the Claim rule template dropdown menu.
- On the Configure Claim Rule page, complete the following steps, then click Finish:
- Enter a Claim rule name.
- Select Name ID from the Incoming claim type pulldown.
- Select Unspecified from the Incoming name ID format pulldown.
- Select Pass through all claim values.
Verify that Microsoft AD FS now redirects to the RSA portal
- Browse to https://<Active-Directory-Federation-Service-name>/adfs/ls/IdpInitiatedSignon.aspx. From the dropdown menu, select your site—for example, Salesforce.
- Select the identity source to validate against.
- Enter your credentials and get logged to your Salesforce home page.
Configuration is complete.
Related Articles
ADFS stopped working after TLS 1.2 cloud enforcement in SecurId Access 230Number of Views An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x 1.16KNumber of Views RSA Base Open Source Copyright License Information 299Number of Views Authentication context not added / Context validation failed errors authenticating with RSA Authentication MFA Agent for A… 155Number of Views RSA Authentication Agent for Web for IIS protecting Microsoft Outlook Web Access (OWA) with single sign-on (SSO), but gett… 142Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.7 SP2 Setup and Configuration Guide An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x