Configuring SAML Single Sign-on
ADFS requires MetaDefender Core to enable HTTPS for connections. Please follow these steps to first enable HTTPS on MetaDefender Core.
Add Relying Party Trust for ADFS
- In the top right corner of
Server Manager
, clickTools
and selectAD FS Management
from the drop-down list.

- In
AD FS
window, right click onRelying Party Trusts
and selectAdd Relying Party Trust
from the drop-down menu.

- In
Add Relying Party Trust Wizard,
selectClaims aware
on theWelcome
page and clickStart
. - On
Select Data Source
page, chooseEnter data about the relying party manually
and clickNext
. - On
Specify Display Name
page, provide a descriptive name for your relying party, e.g. MDCORE_SAML, and clickNext
.

- Click
Next
onConfigure Certificate
page. - On
Configure URL
page, check the box forEnable support for the SAML 2.0 WebSSO protocol
and set a placeholder, using https://myplaceholder as an example, forRelying party SAML 2.0 SSO service URL
.

- On
Configure Identifiers
page, set MDCORE_SAML asRelying party trust identifier
, then clickAdd
andNext
.

- On
Choose Access Control Policy
page, selectPermit everyone
and clickNext
. - Click
Next
onReady to Add Trust
page to save your information. - If everything goes well,
Finish
page will be displayed for you to clickClose
.

Configure claims Issuance Policy for ADFS
- In
Relying Party Trusts
table ofAD FS
window, navigate to the item MDCORE_SAML that was added in the previous step, right-click on it, and selectEdit Claim Issuance Policy...
from the drop-down menu.

- Click
Add Rule
. - Select
Send LDAP Attributes as Claims
forClaim rule template
, and clickNext
.

- Enter a name for
Claim rule name
, for instance, display_name. SelectActive Directory
forAttribute Store
. UnderLDAP Attribute
column, chooseDisplay-Name
from the drop-down list, type given_name for theOutgoing Claim Type
column, and clickFinish
.

- Click
Add Rule
once more. AtChoose Rule Type
option, selectTransform an Incoming Claim
forClaim rule template
and clickNext
.

- Enter name_id for the
Claim rule name
and given_name from step 4 forIncoming claim type
. SelectName ID
forOutgoing claim type
andTransient Identifier
forOutgoing Name ID format
from the respective drop-down lists. Finally, checkPass through all claim values
and clickFinish
.

- Click
Apply
on the next page andOK
to close the wizard.

Create a SAML directory in MetaDefender Core
- Sign in to MetaDefender Core.
- On the dashboard, click
User Management
in the left sidebar. - On
User Management
page, selectDirectories
tab and clickAdd Directory
in the top right corner .

- On
Add Directory
page, choose SAML asDirectory type
. - Enter the name of the new directory, such as ADFS_SAML .
- In
Service Provider
section, checkUse custom entity ID
and type MDCORE_SAML inCustom entity ID
text box.

- In
Service Provider
section, fill inHost or IP
filed with the address where MetaDefender Core is hosted , using https://localhost:8008 as an example. - Copy
Login URL
.

Modify Replying Party Trust on ADFS
- Access
AD FS Management
tool fromServer Manager
, selectRelying Party Trusts
, right click on the item MDCORE_SAML, and chooseProperties
.

- Navigate to
Endpoints
tab, select https://myplaceholder, and clickEdit
.

- Select
POST
from the drop-down list forBinding
. CheckSet the trusted URL as default
, then paste theLogin URL
from MetaDefender Core intoTrusted URL
and clickOK
.

- Click
Apply
andOK
to complete the Relying Party Trust modification.

Complete configuration in MetaDefender Core
- Access
AD FS Management
tool fromServer Manager
, expandAD FS
-->Service
-->Endpoints
. InEndpoints
panel, navigate toMetadata
section and copy the URL path of typeFederation Metadata
.

- Build the complete URL to the metadata endpoint by appending the path from step 1 to the qualified domain name of ADFS.
https://<adfs_fully_qualified_domain_name>/<metadata_endpoint_path>
- For example:
https://win-tst/FederationMetadata/2007-06/FederationMetadata.xml
- Switch back to MetaDefender Core. Under the section
Identity Provider
, clickFetch URL
and paste the link above into the box underFetch URL
, then clickOK
to ensure MetaDefender Core can set ADFS as its IDP. - Under the section
Service Provider
, fill in the user identity underUser identified by
with the configured values ofOutgoing Claim Type
, e.g. ${given_name}. - Select the appropriate role for the user under
User Role
. - Click
Add
to complete the settings.

- On
User Management
screen, toggle the new directoryADFS_SAML
in this example. A dialog box appears to confirm the action. OnceEnable
is clicked, all sessions are immediately expired, and ADFS is used to authenticate the user.

Test the integration
- Click
Login
from the home screen of MetaDefender Core; the user is redirected to ADFS page.

- Sign in with the account created in the system domain.
- If everything goes right, the MetaDefender Core dashboard is displayed with the user identity set in the top right corner.

- Otherwise, access backup login page at
<mdcore-host>#/public/backuplogin
for trouble shooting.
Was this page helpful?