openstack-ansible/doc/source/install-guide/configure-federation-idp-adfs.rst
Alexandra 71554ca7cf DOCS: Configuration section - cleanup
As per discussion in the OSA docs summit session, clean up
of installation guide. This fixes typos, minor RST mark up
changes, and passive voice.

This patch also merges a some of the sections into the larger
chapter. This is in an effort to remove multiple smaller
files.

This patch is the first of many to avoid major conflicts.

Change-Id: I38daa515ba47fde7719cd0bd3e0e40c2cd0f39f1
2016-05-12 13:13:44 +00:00

1.9 KiB

Home OpenStack-Ansible Installation Guide

Configuring Active Directory Federation Services (ADFS) 3.0 as an identity provider

To install ADFS:

Configuring ADFS

  1. Ensure the ADFS Server trusts the service provider's (SP) keystone certificate. We recommend to have the ADFS CA (or a public CA) sign a certificate request for the keystone service.

  2. In the ADFS Management Console, choose Add Relying Party Trust.

  3. Select Import data about the relying party published online or on a local network and enter the URL for the SP Metadata ( for example, https://<SP_IP_ADDRESS or DNS_NAME>:5000/Shibboleth.sso/Metadata)

    Note

    ADFS may give a warning message. The message states that ADFS skipped some of the content gathered from metadata because it is not supported by ADFS

  4. Continuing the wizard, select Permit all users to access this relying party.

  5. In the Add Transform Claim Rule Wizard, select Pass Through or Filter an Incoming Claim.

  6. Name the rule (for example, Pass Through UPN) and select the UPN Incoming claim type.

  7. Click OK to apply the rule and finalize the setup.

References

  • http://blogs.technet.com/b/rmilne/archive/2014/04/28/how-to-install-adfs-2012-r2-for-office-365.aspx
  • http://blog.kloud.com.au/2013/08/14/powershell-deployment-of-web-application-proxy-and-adfs-in-under-10-minutes/
  • https://ethernuno.wordpress.com/2014/04/20/install-adds-on-windows-server-2012-r2-with-powershell/