Skip to main content

Configure AD FS for Single Sign-On

Stax integrates with your corporate identity using SAML. This allows you to bring your own identities and identity management controls to the Stax platform. Active Directory Federation Services (AD FS) is Microsoft's SAML identity provider (IdP) that is available with Windows Server from Windows Server 2003 onwards.

Before You Begin

  • Estimated time to complete: 1 hour
  • Ensure you are a member of the Admin role in Stax
  • Ensure you have permission to administer the AD FS environment
  • While Stax should work with AD FS all the way back to Windows Server 2003, only AD FS on Windows Server 2016 and newer are supported

Create the Relying Party Trust in AD FS

Determine your SAML Service URIs (Entity ID and SAML 2.0 Service URL) using the guidance in Configure Single Sign-On.

Prepare the Active Directory Domain Services (AD) Groups

Stax has five roles; admin, operations, Cost & Compliance admin, user, and readonly. You can use AD FS to specify these roles at login time. For this purpose, you'll need to create and populate five AD groups.

In the examples below, we'll use the following four group names:

  • Stax Admins
  • Stax Operations
  • Stax Cost & Compliance Admins
  • Stax Users
  • Stax Read Only Users

See Permissions in Stax for more information on Stax roles.

Configure AD FS

Once you've prepared the URIs and AD Groups, you can configure AD FS.

  1. Connect to the Windows Server computer holding the AD FS "Primary computer" role. If you're unsure which computer this is, run Windows PowerShell on an AD FS server as an administrator and issue the following command:

    Get-AdfsFarmInformation |
    Select-Object -ExpandProperty FarmNodes |
    Where-Object { $_.NodeType -eq "PrimaryComputer" } |
    Select-Object FQDN
  2. From the Start menu, open Windows Administrative Tools, then double-click on AD FS Management to open the AD FS console

  3. Within the AD FS console's navigation pane, navigate to AD FS then Relying Party Trusts. In the Actions pane, choose Add Relying Party Trust... to open the Add Relying Party Trust Wizard link_your_identity_provider_adfs_0_marked.png

  4. Depending on your version of AD FS, you may be prompted to choose whether the application is Claims aware or Non claims aware. Ensure Claims aware is selected and choose Start link_your_identity_provider_adfs_1.png

  5. On the Select Data source page, choose Enter data about the relying party manually and choose Next link_your_identity_provider_adfs_2.png

  6. On the Specify Display Name page, enter a Display Name for the application that fits your corporate convention. Each Display Name must be unique within your AD FS farm. Enter a description if appropriate and choose Next link_your_identity_provider_adfs_3.png

  7. On the Configure Certificate page, leave the token encryption certificate blank and choose Next link_your_identity_provider_adfs_4.png

  8. On the Configure URL page, check the Enable support for the SAML 2.0 WebSSO protocol box and enter the SAML 2.0 Service URL you determined earlier in the URL text box. Click Next link_your_identity_provider_adfs_5.png

  9. On the Configure Identifiers page, add the Entity ID you determined earlier. Enter this value into the Relying party trust identifier field. Choose Add and then Next link_your_identity_provider_adfs_6.png

  10. On the Choose Access Control Policy page, choose the appropriate access control policy and any relevant parameters. In the example below, access is restricted so that only members of the Stax Admins, Stax Operations, Stax Read Only Users*, and Stax Users Active Directory groups can log into Stax. Choose Next link_your_identity_provider_adfs_7.png

  11. On the Ready to Add Trust page, review your settings then choose Next. Leave Configure claims issuance policy for this application selected on the Finish page, and choose Close. This will add the Relying Party Trust and open the Edit Claim Issuance Policy dialog link_your_identity_provider_adfs_8.png

  12. On the Edit Claim Issuance Policy dialog, click Add Rule... and add the following claim rules:

    ParameterValue
    1.Send AD properties as claims
    Claim rule templateSend LDAP Attributes as Claims
    Claim rule nameSend AD Attributes as Claims
    Attribute StoreActive Directory
    Attribute Mapping:
    LDAP AttributeOutgoing Claim Type
    - E-Mail-Addressesemail
    - Given-NamefirstName
    - SurnamelastName
    - E-Mail-AddressespersistentId
    2.Send Stax Admins group membership as a claim
    Claim rule templateSend Group Membership as a Claim
    Claim rule nameSend Stax Role - Admin as Claim
    User's groupCORP\Stax Admins (Your Stax Admins AD group)
    Outgoing claim typeRole
    Outgoing claim valuecustomer_admin
    2.Send Stax Operations group membership as a claim
    Claim rule templateSend Group Membership as a Claim
    Claim rule nameSend Stax Role - Operations as Claim
    User's groupCORP\Stax Operations (Your Stax Operations AD group)
    Outgoing claim typeRole
    Outgoing claim valuecustomer_operations
    4.Send Stax Cost & Compliance Admins group membership as a claim
    Claim rule templateSend Group Membership as a Claim
    Claim rule nameSend Stax Role - Cost Admin as Claim
    User's groupCORP\Stax Cost & Compliance Admins (Your Stax Cost & Compliance AdminsAD group
    Outgoing claim typeRole
    Outgoing claim valuecustomer_costadmin
    5.Send Stax Users group membership as a claim
    Claim rule templatesSend Group Membership as a Claim
    Claim rule nameSend Stax Role - User as Claim
    User's groupCORP\Stax Users (Your Stax Users AD group*)*
    Outgoing claim typeRole
    Outgoing claim valuecustomer_user
    6.Send Stax Read Only Users group membership as a claim
    Claim rule templateSend Group Membership as a Claim
    Claim rule nameSend Stax Role - Read Only as Claim
    User's groupCORP\Stax Read Only Users (Your Stax Read Only Users AD group)
    Outgoing claim typeRole
    Outgoing claim valuecustomer_readonly
    7.Send Persistent Name Identifier as a Claim
    Claim rule templateTransform an Incoming Claim
    Claim rule nameSend Persistent Name Identifier
    Incoming claim typepersistentId
    Outgoing claim typeName ID
    Outgoing name ID formatPersistent Identifier

Configure Stax to allow AD FS Sign-In

When you're ready to have Stax configured, you will need to raise a support case with your AD FS metadata and SAML 2.0 Service URL.

If you're not sure where to find your metadata file, open Windows PowerShell as an administrator on your primary AD FS computer and run the following command:

Get-AdfsEndpoint |
Where-Object { $_.Protocol -eq "Federation Metadata " } |
Select-Object FullUrl

Once SAML is configured on your Stax tenancy, the support team will be in touch to let you know that it's ready to be tested.

How do you know this worked?

note

At this time, Stax does not support IdP-initiated sign-ins. You must use SP-initiated sign-in to access Stax.

Next time you navigate to your Stax Console login page, on the top, you'll see a new Continue with Corporate ID button. Clicking this button will take you to your SAML sign-in page. Log in to the IdP and you'll be signed into your Stax tenancy.

Screen Shot 2023-08-25 at 1.40.06 pm.png