1. Open the ADFS 2.0 (or 3.0) Management console and select Relying Party Trusts.
2. Select add Relaying party Trust… from the top right corner of the window. -> The add wizard appears
3. Click 'Start'.
4. Select "Import data about the relying part published online or on a network".
5. Fill in the '' - E.g. https://schoolbox.mydomain.edu.au/saml/metadata.php
6. Click 'Next'.
7. Give it a display name such as 'Schoolbox' and enter any notes you want.
8. Click 'Next'.
9. Permit all users to access this relying party
10. Click 'Next'.
11. Click 'Next'.
12. Click OK -> the Edit Claims Rules window appears.
13. Click 'Add Rule'.
14. Set 'Claim rule template' to 'Send LDAP Attributes as Claims'.
15. Click 'Next'.
16. Set a claim rule name - E.g: "Idap-claims".
17 . Set attribute store to 'Active Directory'.
18. Add the following 2 attributes mappings
- SAM-Account-Name -> Name ID
- SAM-Account-Name -> Windows account name
19. Click 'Finish'.
20. Click 'Ok'.
Web Form based Authentication with ADFS 3.0
ADFS 3.0 disables by default Forms based authentication for Intranet users. This can cause Schoolbox errors mentioning "Multiple Assertions are not supported".
This can be enabled in ADFS 3.0 by following the instructions below, mostly sourced from https://blogs.msdn.microsoft.com/josrod/2014/10/15/enabled-forms-based-authentication-in-adfs-3-0/.
- Open the ADFS 3.0 Management console (snap-in)
- Click Authentication Policies from the left hand tree navigation
- In the Authentication Policies section on the right panel, choose Edit Global Primary Authentication
- Under the Intranet section, check the Forms Authentication option.
- Click OK to save the changes
Chrome with ADFS 3.0 and Windows Authentication
To support Chrome with kerberos/WIA (auto sign on from a domain machine) you will need to add a Chrome user agent to ADFS 3.0's list of supported user agents for WIA (if you've not already done this).
You can check your current list of user agents in powershell with:
Get-AdfsProperties | select -ExpandProperty WIASupportedUserAgents
Defaults in ADFS 3.0:
- MSAuthHost/1.0/In-Domain
- MSIE 6.0
- MSIE 7.0
- MSIE 8.0
- MSIE 9.0
- MSIE 10.0
- Trident/7.0
- MSIPC
- Windows Rights Management Client
To add WIA support for Chrome, Safari and Firefox you can add the agent "Mozilla/5.0".
You can set the list like below (which adds "Mozilla/5.0" to the list):
Set-ADFSProperties -WIASupportedUserAgents @("MSAuthHost/1.0/In-Domain", “MSIE 6.0", “MSIE 7.0", “MSIE 8.0", “MSIE 9.0", “MSIE 10.0", “Trident/7.0", “MSIPC”, “Windows Rights Management Client”, “Mozilla/5.0")
You will also need to disable ExtendedProtectionToken checking to make Chrome work with WIA. Here is the powershell command to disable it:
Set-ADFSProperties –ExtendedProtectionTokenCheck None
Timing Issues
If NTP is already set up for time sync and you are still getting timing errors with SAML, we suggest adding extra skew times for the SAML requests for Schoolbox.
This can be set in ADFS using the following command:
Add-PSSnapin microsoft.adfs.powershell
Set-ADFSRelyingPartyTrust -TargetName "MyRelyingParty" -NotBeforeSkew 2
The "MyRelyingParty" is the name of the setup for your production or staging Schoolbox in ADFS.
The "2" is the number of minutes of skew you wish to allow.
Cannot connect to metadata URL (Relaying party trust)
Since the upgrade to Ubuntu 18.04 we have deprecated the use of TLS1.1. ADFS servers that have TLS1.2 disabled will not be able to connect to our server to get the metadata when attempting to setup the trust. To enable TLS1.2 on your ADFS server please review the guides available from Microsoft.
Federation medata address test failure
The test ADFS conducts is conducted by .Net Earlier versions of .Net are not compatible with newer versions of TLS. Please ensure .Net on your server is updated to the current available version as per guides from Microsoft