ADFS
To connect your ADFS provider to Senseye, you will need to provide us with either your ADFS URL or a Federation Metadata File for your ADFS.
From your ADFS server you will then need to do the following;
- Open the Microsoft Management Console (mmc.exe).
- Add the AD FS Management Snap-in (from the File > Add/Remove Snap-in menu).
- In the navigation tree select Console Root > AD FS > Relying Party Trusts.
- Select Add Relying Party Trust... from the Actions panel.
- Select Claims Aware and click Start.
- Select Enter data about the relying party manually and click Next.
- Enter a suitable display name for the relying party such as Senseye and click Next.
- Leave the encryption certificate details as default and click Next
- Tick the Enable support for the WS-Federation Passive protocol checkbox and enter
https://senseye.eu.auth0.com/login/callback
for the Relying party WS-Federation Passive protocol URL and click Next. - Add
urn:auth0:senseye
as an additional relying party trust identifier. - Specify an access control policy which applies to your organization. This will control which users from your directory are able to use this relying party trust to log in to Senseye.
- Confirm the details and click Finish to add the relying party trust.
- Highlight the newly created relying party trust and select Edit Claim Issuance Policy from the Actions panel.
- Click Add Rule...
- Select Send Claims Using a Custom Rule from the claim rule template dropdown and click Next.
- Give the rule a suitable name such as Senseye Claims and add the following rule
c:[Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname", Issuer ==
"AD AUTHORITY"]
=> issue(store = "Active Directory", types =
("http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress",
"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name",
"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier",
"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname",
"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname"), query =
";mail,displayName,objectGUID,givenName,sn;{0}", param = c.Value);
Note: This will map mail
, displayName
, objectGUID
, givenName
and sn
claims from ADFS to the claims that Auth0 expects.
This rule can be altered according to your directory setup, however, as a bare minimum we require;
- The
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier
claim which should be a unique key for each user and should not contain sensitive information such as an email address. - The
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress
claim in order for Senseye notifications to work for users. - The
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
claim.