Integrating ADFS 2.0 and 3.0 IdP with OAM SP
This article describes how to integrate ADFS 2.0/3.0 as an IdP and OAM as an SP. Before proceeding with the article, make sure to read the pre-requisites. The SAML 2.0 integration is be based on:
- Email address that will be used as the NameID format
- The NameID value will contain the user’s email address
- The HTTP POST binding will be used to send the SAML Assertion to the SP
- Users will exist in both systems, with each user having the same email address so that it can be used as the common user attribute.
ADFS 2.0 is available in Windows 2008 R2, while ADFS 3.0 is available in Windows 2012 R2. The articles will showcase screenshots for ADFS 3.0, while the documented steps will apply to both versions.
ADFS Setup
To add OAM as an SP in ADFS IdP, perform execute the following steps:
-
Go to the machine where ADFS 2.0 is deployed.
-
If ADFS 2.0 is used
-
Click Start Menu , Programs , Administrative
-
Tools , AD FS 2.0 Management
-
Expand ADFS 2.0 , Trust Relationships
-
-
If ADFS 3.0 is used
-
In Server Manager, click Tools , AD FS Management
-
Expand AD FS , Trust Relationships
-
Right click on Relying Party Trusts and select Add Relying Party Trust
The Add Relying Party Trust window appears.
-
-
-
Click Start.
-
Select Import data about the relying party from a file.
-
Click browse and select the OAM SP SAML 2.0 Metadata file from the local machine (it is required for the OAM endpoints to be SSL terminated, otherwise ADFS will not import the metadata. See pre-requisites article about SSL).
-
Click Next.
-
Enter a name for the new OAM SAML 2.0 Service Provider.
-
If using ADFS 3.0, execute the following steps:
- Click Next.
-
Select the option depending on your requirements.
-
Click Next.
-
Select Permit all users to access this Relying Party.
-
Click Next.
-
Click Next.
-
Leave Open the Edit Claims box checked.
- Click Close.
-
Click Add Rule: We will configure ADFS to retrieve the user’s email address from LDAP and include it as EmailAddress SAML Attribute.
-
Select Send LDAP Attributes as Claims.
-
Click Next.
-
Enter a name for the Claim Rule.
-
Select Active Directory as the Attribute Store.
-
Since we are using Email Address as the NameID, in the first row, select Email Addresses as the LDAP Attribute, and Email Address as the Outgoing Claim Type.
- Click Finish. A list of rules is displayed.
-
Click Add Rule: We will transform the SAML Attribute EmailAddress to make it the NameID with its format set to email address.
-
Select Transform an Incoming Claim.
-
Click Next.
-
Enter a name for the rule.
-
Select Email Address as the Incoming Claim Type.
-
Select NameID as the Outgoing Claim Type.
-
Select Email as the Outgoing name ID format.
-
Select Pass through all claim values.
-
Click Finish. A list of claim rules is displayed.
-
Click OK.
Description of the illustration Import_File_Option.jpg
Description of the illustration Specify_Display_Name.jpg
The next screen shows an optional multi factor authentication settings section
A summary window is displayed.
Description of the illustration summary_window.jpg
Description of the illustration Edit_Claims_Rules.jpg
The Edit Rule window appears.
Description of the illustration Edit_Rule_Window.jpg
Description of the illustration Select_Rule_Template.jpg
Description of the illustration Configure_Rule.jpg
Description of the illustration list_of_rules.jpg
[Description of the illustration list_of_rules.jpg](files/list_of_rules.txt)
Description of the illustration Transform_Incoming_Claim.jpg
Description of the illustration Add_Transform_Claim.jpg
As mentioned in the pre-requisites article, if you want to configure ADFS to use/accept SHA-1 signatures, perform the following steps
Note: If you do not configure ADFS to use/accept SHA-1 signatures, you will have to configure OAM to use SHA-256 for signatures:
-
Go to the machine where ADFS is deployed
-
If ADFS 2.0 is used:
-
Click Start Menu , Programs, Administrative Tools , AD FS 2.0 Management.
-
Expand ADFS 2.0 , Trust Relationships.
-
-
If ADFS 3.0 is used
-
In Server Manager, click Tools , AD FS Management
-
Expand AD FS , Trust Relationships
-
-
Right click on the newly created Relying Party and select Properties.
-
Select the Advanced Tab.
-
Select SHA-1.
-
Click OK.
Description of the illustration Secure_Hash_Algorithm.jpg
As also mentioned in the pre-requisites article, if you decided to disabled decryption on the ADFS IdP, execute the following steps:
-
Go to the machine where ADFS is deployed.
-
If ADFS 2.0 is used.
- Click Start Menu ,Programs , Administrative Tools , Windows PowerShell Modules
-
If ADFS 3.0 is used
- Click Start Menu , Administrative Tools , Active Directory Module for Windows PowerShell
-
Execute the following command (replace RP_NAME with the SP name used to create the partner in ADFS): set-ADFSRelyingPartyTrust –TargetName “RP_NAME” –EncryptClaims $False
For example: set-ADFSRelyingPartyTrust –TargetName “ACME SP” –EncryptClaims $False
OAM Setup
To add ADFS as an IdP partner in OAM, execute the following steps:
-
Go to the OAM Administration Console: http(s)://oam-admin-host:oam-adminport/oamconsole.
-
Navigate to Identity Federation , Service Provider Administration.
-
Click on the Create Identity Provider Partner button.
-
In the Create screen:
-
Enter a name for the partner.
-
Check whether or not this partner should be used as the IdP by default when starting a Federation SSO operation, if no IdP partner is specified. (in this example we will set it as the default IdP).
-
Select SAML 2.0 as the Protocol.
-
-
Click Load Metadata and upload the SAML 2.0 Metadata file for the IdP Assertion Mapping section:
-
Optionally set the OAM Identity Store that should be used (Note: In the example, we left the field blank to use the default OAM Identity Store).
-
Optionally set the user search base DN (Note: In the example, we left the field blank to use the user search base DN configured in the Identity Store).
-
Select how the mapping occurs (Note: In the example, we are mapping the Assertion via the NameID to the LDAP mail attribute).
-
-
Select the Attribute Profile that will be used to map the names of the attributes in the incoming SAML Assertion to local names. See article on IdP Attribute Profile for more information. In this example, use the default IdP Attribute Profile.
-
Click Save.
Description of the illustration OIF_Setup.jpg
As mentioned in the pre-requisites article, if you want to configure OAM to use SHA-256 for signatures, perform the following steps (Note: if you don’t configure OAM to use SHA-256 for signatures, you will have to configure ADFS to use/accept SHA-1 signatures):
-
Enter the WLST environment by executing:
$IAM_ORACLE_HOME/common/bin/wlst.sh
. -
Connect to the WLS Admin server:
connect()
. -
Navigate to the Domain Runtime branch:
domainRuntime()
. -
Execute the
configureFedDigitalSignature()
command:configureFedDigitalSignature(partner="PARTNER_NAME", partnerType="idp/sp", algorithm="SHA-256/SHA-1")
.-
Replace
PARTNER_NAME
with the name of the partner added. -
Set the
partnerType
toidp
orsp
. -
Set the algorithm to SHA-256 or SHA-1 An example will be:
configureFedDigitalSignature(partner="ADFSIdP", partnerType="idp", algorithm="SHA-256")
.
-
-
Exit the WLST environment:
exit()
.
As also mentioned in the pre-requisites article, if you decided not to disable strong encryption on the ADFS IdP, be sure that the JCE Unlimited Strength Jurisdiction policy \les were installed in the OAM environment.
Test
To test the integration:
-
Either protect a resource with WebGate and a FederationScheme with ADFS IdP being the Default SSO Identity Provider for OAM
-
Or use the OAM Test SP application and select ADFS as the IdP
More Learning Resources
Explore other labs on docs.oracle.com/learn or access more free learning content on the Oracle Learning YouTube channel. Additionally, visit education.oracle.com/learning-explorer to become an Oracle Learning Explorer.
For product documentation, visit Oracle Help Center.
Integrating ADFS 2.0 and 3.0 IdP with OAM SP
F60450-01
September 2022
Copyright © 2022, Oracle and/or its affiliates.