Step 2: Configuring Identity Provider for single sign-on
As the second step, configure BigFix Inventory server as a relying party to consume claims from the Identity Provider. Perform the configuration based on the spMetadata.xml file that you downloaded from BigFix Inventory.
About this task
Procedure
- Log in to the computer where Active Directory Federation Services are installed.
- Copy the spMetadata.xml file from your computer to a directory on the AD FS server.
- Click the Start rectangle in the lower-left area of the screen in Windows 2012 and then click the AD FS Management tile.
- In the left navigation tree of the AD FS application, expand .
- In the Relying Party Trusts pane on the right, click Add Relying Party Trust. A wizard opens. Click Start.
- Select Import data about the relying party from a file.
- Click Browse, select the spMetadata.xml file and click Open. Click Next.
- On the new pane, provide the Display name for your ADFS service. Click Next.
- Leave the option Permit all users to access the relying party selected, and click Next.
- On the Ready to Add Trust pane, click Next.
- On the Finish pane, click Close. The Edit Claim rules window opens.
- Click the Add Rule button in the lower left corner. The Add Transform Claim Rule wizard opens. Click Next.
- In the Claim Rule template, type Name ID rule.
- From the Attribute store drop-down list, select Active Directory.
- In the Mapping of LDAP Attributes to outgoing claim types section, click the first drop-down list and select User Principal Name. From the second list, select Name ID.
- Repeat the step to achieve the following configuration
and click Finish.
Table 1. Mapping of LDAP Attributes to outgoing claim types LDAP Attribute Outgoing Claim Type User-Principal-Name Name ID E-Mail-Addresses E-Mail Address Token-Groups - Qualified by Long Domain Name Group SAM-Account-Name Windows™ account name - In the Edit Claim rules window, click Apply and OK.