PHP Classes

File: web/SSO/modules/adfs/docs/adfs.txt

Recommend this page to a friend!
  Classes of william amed   Raptor 2   web/SSO/modules/adfs/docs/adfs.txt   Download  
File: web/SSO/modules/adfs/docs/adfs.txt
Role: Documentation
Content type: text/plain
Description: Documentation
Class: Raptor 2
Framework that takes routes from annotations
Author: By
Last change:
Date: 8 years ago
Size: 2,312 bytes
 

Contents

Class file image Download
Enables AD FS IdP Compatible with VS 2012 Identity and Access Basic Setup Companion based on: http://simplesamlphp.org/docs/stable/simplesamlphp-idp 1. Enabling the Identity Provider functionality In config/config.php, the option will be: 'enable.adfs-idp' => true 2. Authentication module Follow as is. 3. Configuring the authentication module In addition to enabling authentication module, enable adfs module by creating a file named 'enable' in modules/adfs In unix from installation directory: touch modules/adfs/enable 4. Configuring the IdP ADFS IdP is configured by metadata stored in /metadata/adfs-idp-hosted.php and metadata/adfs-sp-remote.php If they are not present, copy them from /metadata-templates to the metadata directory. 5. Using the uri NameFormat on attributes WS-FED likes a few parameters to be very specifically named. This is especially true if .net clients will be treating this as a Microsoft ADFS IdP. The recommended settings for /metadata/adfs-idp-hosted.php is: 'authproc' => array( // Convert LDAP names to WS-Fed Claims. 100 => array('class' => 'core:AttributeMap', 'name2claim'), ), 6. Adding SPs to the IdP The minimal configuration for /metadata/adfs-sp-remote.php is: $metadata['urn:federation:localhost'] = array( prp' => 'https://localhost/adfs/ls/', ); 7. Creating a SSL self signed certificate Follow as is. 8. Adding this IdP to other SPs Metadata should be available from /module.php/adfs/idp/metadata.php 9. This module tries its best to emulate a Microsoft ADFS endpoint, and as such, it is simplest to test using a .net client. To build the test client, follow the tutorial at: http://code.msdn.microsoft.com/Claims-Aware-Web-d94a89ca This will build a .net app that uses a dev machine running STS (their name for an IdP). To point to your SimpleSamlPHP ADFS IdP, in VS 2012: a. Right-click the project in Solution Explorer and select the Identity and Access option. b. In the Identity and Access Window, Select Use a business identity provider. c. Under “Enter the path to the STS metadata document” enter the url you have from step 8. Something like https://.../module.php/adfs/idp/metadata.php d. Click Ok For more information in regards to .NET: http://msdn.microsoft.com/en-us/library/hh377151.aspx