Microsoft ADFS

In the AD FS dialog, head into the Relying Party Trusts section on the left panel to add a new party trust. This opens up a wizard to configure a new party trust.

  1. Click on Claims aware on the welcome window, and click Start
  2. Under “Select Data Source”, choose the last option to enter data about the relying party manually, and click “Next”.
  3. Enter the following information under each step of the wizard by (Click Next to move forward):
    1. Step: Specify Display Name
      1. Display name: Alloy SSO
      2. Click Next
    2. Step: Configure Certificate and click Next
    3. Step: Configure URL
      1. Choose the second option to “Enable support for the SAML 2.0 WebSSO protocol.
      2. Relying party SAML 2.0 SSO service URL: https://app.alloy.co/sso/saml/?acs.
      3. Click Next
    4. Step: Configure Identifiers
      1. Relying party trust identifier: AlloyIAV
      2. Click Add and the option will now show up as a valid identifier in the list view.
      3. Click Next
    5. Step: Choose Access Control Policy
      1. Choose an access control policy: Permit everyone
      2. Click Next
    6. Step: Ready to Add Trust and click Next to Finish
  4. Right-click on the newly added Relying Party Trust and choose “Edit Claim Issuance Policy
811
1. Click on “Add a new rule“
2. Step: Choose Rule Type and click Next
3. Step: Configure Claim Rule
    1. Claim rule name: Make Email Adress Available for NameID
    2. Attribute Store: Active Directory
    3. Under Mapping of LDAP attributes to outgoing claim types, add the following items, and choose Finish.
        1. E-Mail-Addresses -> E-Mail Address
            
622
4. This takes you back to the Claim Issuance Policy window.
5. Select the new rule and choose “Add rule”
6. Step: Choose Rule Type: Transform an incoming claim
    1. Click Next
7. Step: Configure Claim Rule
    1. Claim rule name: Transform Email to NameID
    2. Under Rule template: Transform an Incoming Claim, choose the following options:
        1. Incoming rule type: **E-Mail Address**
        2. Outgoing claim type: **Name ID**
        3. Outgoing name ID format: **Email**
    3. Click Finish
8. This takes you back to the Claim Issuance Policy window.
9. Select the new rule and choose “Add rule”
10. Step: Choose Rule Type: Send LDAP Attributes as Claims
    1. Click Next
11. Step: Configure Claim Rule
    1. Claim rule name: Alloy required Attribute
    2. Attribute store: Active Directory
    3. Under Mapping of LDAP attributes to outgoing claim types, add the following items, and choose Finish.
        1. E-Mail-Addresses -> **Email**
        2. Given-Name -> **firstName**
        3. Surname -> **lastName**
        4. Telephone-Number -> **phone**
577
12. Click Apply and exit out of the dialog by clicking OK
  1. Go to your browser to log into Alloy using ADFS using your Single Sign-On page, and sign in with the Active Directory user account credentials
403

FAQ

Unable to open the Idp initiated Single Sign-On page

If you are unable to open the IdpInitiatedSignon page (ex. https://<your hostname>/adfs/ls/IdpInitiatedSignon), you may need to check if you have enabled it by going to PowerShell and checking if is True,

(Get-AdfsProperties).enableidpinitiatedsignonpage

if it's False. turn it on by running

Set-AdfsProperties -EnableIdPInitiatedSignonPage $true

💡 If you would prefer to access a unique link to log in to Alloy SSO, suffix ?LoginToRp=AlloyIAV:

Eg: https://<your hostname>/adfs/ls/IdpInitiatedSignon?LoginToRp=AlloyIAV

Obtaining the FederationMetadata XML file

You will be able to find the SAML FederationMetadata XML from the server that has the following URL format:

https:///FederationMetadata/2007-06/FederationMetadata.xml