ADFS Enterprise Connection
ADFS can issue SAML assertions to AuthAction for domain users.
ACS URL
Section titled “ACS URL”When creating the relying party trust, use this SAML Assertion Consumer Service URL:
https://<tenant-name>.<region>.authaction.com/oauth2/saml/callbackFields to copy into AuthAction
Section titled “Fields to copy into AuthAction”| Field in AuthAction | Typical source |
|---|---|
| IdP SSO URL | https://adfs.<your-domain>/adfs/ls/ (your federation service sign-on endpoint) |
| Entity ID / Issuer | ADFS Management > Service > Edit Federation Service Properties > Federation Service identifier |
Exact URLs depend on your ADFS deployment and DNS.
Step 1: Add a Relying Party Trust in ADFS
Section titled “Step 1: Add a Relying Party Trust in ADFS”- Open ADFS Management on your federation server.
- Go to Relying Party Trusts > Add Relying Party Trust.
- Enter metadata manually or from a file, mapping the Assertion Consumer Service to your AuthAction ACS URL.
- Set the relying party identifier to your AuthAction SP Entity ID (tenant URL).
- Configure Claim Rules to send a stable user identifier (for example E-Mail Address or UPN) as the Name ID.
Step 2: Configure ADFS in AuthAction
Section titled “Step 2: Configure ADFS in AuthAction”- In AuthAction, go to Connections > Enterprise Connections.
- Select ADFS.
- Enter the IdP SSO URL and Entity ID / Issuer from ADFS.
- Import the Token-signing certificate from ADFS if required.
- Save.
Step 3: Enable and test
Section titled “Step 3: Enable and test”Enable the connection for your AuthAction applications and test with an ADFS-authenticated user.