Step 3: Finalizing BigFix Inventory configuration in Identity Provider
To finalize the configuration, follow one of the below steps based on Identity Provider you have configured in Step 1: Configuring BigFix Inventory in Identity Provider for single sign-on. There are two sets of steps: one for Entra ID and another for AD FS.
Configuring Microsoft Entra ID
Click here to refer to the steps for configuring Microsoft Entra ID. You do not have to re-do the steps if you have already configured the Entra ID in step 1.
Configuring Microsoft Active Directory Federation Service
This is an example configuration of BigFix Inventory single sign-on (SSO) through Active Directory Federation Services (AD FS).
Procedure
- Log in to the computer where Active Directory Federation Services are installed.
- Copy the spMetadata.xml file from your computer to a directory on the AD FS server.
-
Click the Start rectangle in the lower-left area of the screen
in Windows 2012 and then click the AD FS Management tile.
The Microsoft Entra setup has been already done in Step 1: Configuring BigFix Inventory in Identity Provider for single sign-on.
Note: Step 3 is optional, and in some scenarios, it is not mandatory to follow the steps, for example, when using Microsoft Entra. - In the left navigation tree of the AD FS application, expand .
- In the Relying Party Trusts pane on the right, click Add Relying Party Trust. A wizard opens. Click Start.
- Select Import data about the relying party from a file.
- Click Browse, select the spMetadata.xml file, and click Open. Click Next.
- On the new pane, provide the Display name for your ADFS service. Click Next.
- Leave the option Permit all users to access the relying party selected, and click Next.
- On the Ready to Add Trust pane, click Next.
- On the Finish pane, click Close. The Edit Claim rules window opens.
- Click the Add Rule button in the lower left corner. The Add Transform Claim Rule wizard opens. Click Next.
- In the Claim Rule template, type Name ID rule.
- From the Attribute store drop-down list, select Active Directory.
- In the Mapping of LDAP Attributes to outgoing claim types section, click the first drop-down list and select User Principal Name. From the second list, select Name ID.
-
Repeat the step to achieve the following configuration and click
Finish.
Table 1. Mapping of LDAP Attributes to outgoing claim types LDAP Attribute Outgoing Claim Type User-Principal-Name Name ID E-Mail-Addresses E-Mail Address Token-Groups - Qualified by Long Domain Name Group SAM-Account-Name Windows™ account name - In the Edit Claim rules window, click Apply and OK.