DocumentationRelease Notes
Log In
Documentation

Configure ADFS with Password Safe Using SAML

Active Directory Federation Services (AD FS) is Microsoft’s claim based single sign-on (SSO) solution. It allows users access to integrated applications and systems using their Active Directory (AD) credentials. AD FS uses trust relationships to allow AD to issue authentication claims for transferring user identities to the requesting application.

See the below instructions for detailed steps on how to:

  • Configure the trust relationship in the AD FS management console
  • Configure the SAML identity provider and service provider in BeyondInsight

Configure AD FS on the identity provider server

Configuring AD FS on the identity provider (IdP) server involves creating a relying party trust in AD FS for the BeyondInsight SAML service URL, creating a rule to send the AD group membership as a claim to the relying party, and creating a rule that selects attributes from an LDAP attribute store, such as Active Directory, to send as claims to the relying party. The sections below provide detailed steps to configure each of these in AD FS.

Add a relying party trust in AD FS management

To add a relying party trust manually in AD FS on your identity provider server, follow the below steps:

  1. Log in to the identify provider server as an administrator and open Server Manager.
  2. In Server Manager, click Tools, and then select AD FS Management.
  3. From the Actions pane, click Add Relying Party Trust.
  4. On the Welcome screen, select Claims aware, and then click Start.
  5. On the Select Data Source screen, select Enter data about the relying party manually, and then click Next.
  6. On the Specify Display Name screen, enter a name in the Display name field. Below that, under Notes, provide a description for this relying party trust, and then click Next.
  7. On the Configure Certificate screen, click Browse to locate and import the service provider public certificate file, and then click Next.
  8. On the Configure URL screen, check Enable support for the SAML 2.0 WebSSO protocol, enter the Relying party SAML 2.0 SSO service URL, and then click Next.
  9. On the Configure Identifiers screen, enter the Relying party trust identifier, click Add, and then click Next.
  10. On the Choose Access Control Policy screen, select a policy, and then click Next.
  11. On the Ready to Add Trust screen, review the settings, and then click Next to save your relying party trust information.
  12. On the Finish screen, click Close. The Edit Claim Rules dialog box displays.

Send LDAP attributes as claims

Using the Send Claims as a Custom Rule template in AD FS, you can create a rule to add the SID attribute to claims. Using the Send LDAP Attributes as Claims template allows you to select attributes from an LDAP attribute store, such as Active Directory, to send as claims to the relying party. Configuring these rules allows you to send all of the SIDs for groups as part of the claim, as well as other attributes, such as User-Principle Name. The steps for configuring each of these rule types is outlined in the sections below.

Create rule to add SID attribute

To create a custom rule to add the SID attribute to claims, follow these steps:

  1. In Server Manager, click Tools, and then select AD FS Management.

  2. In the AD FS navigation tree on the left, click Relying Party Trusts.

  3. Right-click the selected trust, and then click Edit Claim Issuance Policy.

  4. In the Edit Claim Issuance Policy dialog box, under Issuance Transform Rules click Add Rule to start the Add Transform Claim Rule wizard.

  5. On the Select Rule Template screen, select Send Claims as a Custom Rule from the Claim rule template list, and then click Next.

  6. On the Configure Rule screen, type the display name for this rule and type the following for the Custom rule:

    c:[Type=="http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname", Issuer == "AD AUTHORITY"]=> issue(store = "Active Directory", types = ("SecurityIdentifier"), query = ";objectSid;{0}",
    param = c.Value);

  7. Click Finish.

  8. Click OK in the Edit Claim Issuance Policy dialog to close it and save the rule.

Create rule to send LDAP attributes claims

To create a rule to send attributes from Active Directory as claims, follow these steps:

  1. In Server Manager, click Tools, and then select AD FS Management.
  2. In the AD FS navigation tree on the left, click Relying Party Trusts.
  3. Right-click the selected trust, and then click Edit Claim Issuance Policy.
  4. In the Edit Claim Issuance Policy dialog box, under Issuance Transform Rules click Add Rule to start the Add Transform Claim Rule wizard.
  5. On the Select Rule Template screen, select Send LDAP Attributes as Claims from the Claim rule template list, and then click Next.
  6. On the Configure Rule screen:
    • In the Claim rule name box, type the display name for this rule
    • For Attribute Store, select Active Directory from the list.
    • Select User-Principal-Name for the LDAP Attribute and Name as the Outgoing Claim Type.
    • Select User-Principal-Name for the LDAP Attribute and Name ID as the Outgoing Claim Type.
    • Select Token-Groups as SIDs for the LDAP Attribute and Group as the Outgoing Claim Type
    • Click Finish.
  7. Click OK in the Edit Claim Issuance Policy dialog to close it and save the rule.
  8. On the Relying Party Trusts page, right-click the relying party trust you had added for BeyondInsight, and then select Properties.
  9. Click the Signature tab.
  10. Click Add, and then enter the service provider public certificate.

Configure SAML on the U-Series Appliance

As an administrator, log in to BeyondInsight on the U-Series Appliance and follow the below instructions to configure SAML:

  1. From the left sidebar, click Configuration
  2. Under Authentication Management, click SAML Configuration.
  3. From the SAML Identity Providers pane, click Create New SAML Identity Provider.
  4. Provide a name for the new SAML identity provider (IdP).
  5. Complete the Identity Provider Settings as follows:
    • Check the Default Identity Provider option if you have more than one IdP for the same service provider (SP), and would like this IdP to be used as default for SP initiated logins.
      • This is useful in the case where a user accesses the SAML site access URL without providing an IdP.
      • Also, when a user clicks the Use SAML Authentication link from the BeyondInsight login page, they are redirected to the default IdP's site for authentication.
    • Check Force Reauthentication to require users to authenticate with the identity provider for each BeyondInsight session. Once enabled, if BeyondInsight is logged out but the IdP still has an active session, when the user attempts to access Password Safe from a service provider initiated login, the IdP prompts the user to log in again.
    • Identifier: Enter the name of the identity provider entry, normally supplied by the provider.
    • Single Sign-on Service URL: Provide the SSO URL, from the provider.
    • SSO URL Protocol Binding: Select either HTTP Redirect or HTTP Post as the type.
    • Single Logout Service URL: Enter the SLO URL, from the provider.
    • SLO URL Protocol Binding: Select either HTTP Redirect or HTTP Post as the type.
    • Encryption and Signing Configuration:
      •  Depending on IdP configuration, check any of the first three settings:
        • Sign Authentication Request
        • Sign Logout Request
        • Sign Logout Response
      • Check the appropriate service provider signing settings:
        • Want SAML Response Signed
        • Want Assertion Signed
        • Want Assertion Encrypted
        • Want Logout Response Signed
        • Want Logout Request Signed
      • Check any of the remaining miscellaneous settings as required.
    • Signature Method: Select the method, as is required by your IdP, from the dropdown.
    • Current Identity Provider Certificate: Upload the identity provider certificate.
    • User Mapping: Select Active Directory from the dropdown. This indicates how user claims from the SAML provider are mapped in the BeyondInsight User database.
  6. The following Service Provider Settings are auto-generated by BeyondInsight:
    • Entity ID: This is the fully qualified domain name, followed by the file name: https:///eEye.RetinaCSSAML/. This is used for audience restriction.
    • Assertion Consumer Service URL: The HTTPS endpoint on the service provider where the identity provider redirects to with its authentication response. .
  7. Click Create SAML Identity Provider.

Once the SAML configuration is saved, a public service provider certificate is available to download. It can be uploaded to the IdP, if required.


©2003-2025 BeyondTrust Corporation. All Rights Reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.