ADFS Saml Configuration

JoeS-0122 41 Reputation points
2020-11-02T22:51:44.833+00:00

Hello,

I have questions regarding ADFS SAML configuration.

I have been charged with setting up ADFS SAML and connecting our system with clarity safetyzone.

I am using Using windows serv 2019 platform for the servers. I have created a test environment that has a domain controller, server with ADCS, and another server with ADFS. I have a certificate created within the ADCS server and I installed ADFS on the respective server. I verified after installation of the role and configuring an adfs administrator that the adfs administrator can sign into the https://sts.contoso.com/adfs/ls/idpinitiatedsignon.aspx, I created a windows test account and logged into the adfs server for testing purposes and when navigating to the https://sts.contoso.com/adfs/ls/ and attempting to sign in with that user, I get an error:
An error occurred
An error occurred. Contact your administrator for more information.
Error details
Activity ID: f68cc99a-b6e5-40dc-1a00-0080000000e5Error details: MSIS7065: There are no registered protocol handlers on path /adfs/ls/ to process the incoming request.Node name: 85253664-435b-4d04-8775-d4b96854cb12Error time: Mon, 02 Nov 2020 20:11:16 GMTCookie: enabledUser agent string: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.111 Safari/537.36

I have everyone permitted for intranet access in the Access Control Policies.
Am i missing something? Once i can verify that a standard user can login, then i can move on to the step of setting up the appropriate claims/trusts.

Does anyone have experience with this and maybe even experience with the Clarity Safety Zone platform?

Active Directory Federation Services
Active Directory Federation Services
An Active Directory technology that provides single-sign-on functionality by securely sharing digital identity and entitlement rights across security and enterprise boundaries.
1,261 questions
0 comments No comments
{count} votes

Accepted answer
  1. Pierre Audonnet - MSFT 10,191 Reputation points Microsoft Employee
    2020-11-03T01:18:11.897+00:00

    This page cannot be called just as-is by typing the URL in the browser. You either need a query string telling you which WS-Federation enabled relying party trust you are trying to use, or a SamlRequest if you are trying to use a SAML enabled relying party trust.
    If you want to do some testing, I suggest you create the test relying party trust as described here: https://adfshelp.microsoft.com/ClaimsXray/TokenRequest
    Give it a try and let us know!


3 additional answers

Sort by: Most helpful
  1. JoeS-0122 41 Reputation points
    2020-11-04T02:39:37.317+00:00

    37325-103.jpg37248-104.jpg

    Heres what i got


  2. JoeS-0122 41 Reputation points
    2020-11-04T18:54:23.747+00:00

    Hey thank you very much for the help yesterday. They came back to me saying there are no longer any errors however, they wondered if there was a way to pass just the username and not the domain\user. Can this be done?

    0 comments No comments

  3. Pierre Audonnet - MSFT 10,191 Reputation points Microsoft Employee
    2020-11-05T01:23:23.053+00:00

    Yep. Many ways to do it. But the easiest way in our context (with having issues with the default rules) would be to adapt our custom rules such as:

    c:[Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname"]
      => issue(Type = "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier", Issuer = c.Issuer, OriginalIssuer = c.OriginalIssuer, Value = regexreplace(c.Value, "(?<domain>[^\\]+)\\(?<user>.+)", "${user}"), ValueType = c.ValueType, Properties["http://schemas.xmlsoap.org/ws/2005/05/identity/claimproperties/format"] = "urn:oasis:names:tc:SAML:2.0:nameid-format:persistent");
    

    Make sure you mark the post as answered in case someone experience the same challenges that they can easily find a solution.


Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.