SECURING
Set up a Relying Part Trust in Active Directory Federated Services (ADFS) for the Domino ID vault server. These procedures describe steps for ADFS 3.0 and ADFS 4.0.
About this task
This procedure applies to Active Directory Federation Services (ADFS).
Procedure
1. From ADFS, select Start -> Administrative Tools -> AD FS Management.
2. Navigate to the Relying Party Trusts folder.
3. Select Action -> Add Relying Party Trust.
4. Click Start to run the Add Relying Party Trustwizard.
5. In the Select Data Source window select Import data about the relying party from a file, select the ServiceProvider.xml file that you exported from the corresponding ID vault server IdP configuration document. Then, click Next.
7. In the Choose Profile window, select AD FS profile and clickNext.
8. In the Configure Certificate window, click Next.
9. In the Configure URL window, select Enable support for the SAML 2.0 WebSSO protocol. For Relying party SAML 2.0 SSO service URL, enter the following URL:
where <host> is either a Web server or the ID vault server, depending on whether you use Web federated login:
Table 1. Specifying the Relying party SAML 2.0 SSO service URL host name in the ID vault server Relying Party Trust
The following example shows a host name specified for a Web server when you use Web federated login:
Note: This URL is used only as an identifier and not for HTTP connections.
12. In the Choose Issuance Authorization Rules window, select Permit all users to access this relying party and click Next.
13. In the Ready to Add Trust window, click Next.
14. In the Finish window, select Open the Edit Claim Rules dialog for this replying party trust when the wizard closes and click Close.
15. If the Edit Claim Rules dialog does not open when the wizard closes, right-click the name of the Relying Party Trust that you created, and select Edit Claim Rules...
16. In the Edit Claim Rules dialog, click Add Rule.
17. In the Select Rule Template dialog, for Choose Rule Type, select Send LDAP Attributes as Claims, and click Next.
18. Complete the Configure Rule dialog box:
b. For Attribute store, select Active Directory.
c. For LDAP Attribute, selectE-Mail-Addresses.
d. For Outgoing Claim Type, select Name ID.
e. Click Finish.
20. In the AD FS Trust Relationships -> Relying Party Trusts folder:
b. Click the Endpoints tab.
c. For SAML Assertion Consumer Endpoints, verify that there is a REDIRECT binding URL for Domino. In addition, if there is an Artifact binding URL, remove it.