You must configure IDP on Active Directory using the Active Directory Federation System (AD FS) Management Console.
Ensure that the /adfs/Is endpoint exists for SAML v2.0.
Note: To add adfs/ls endpoint, refer to the AD FS documentation.
Ensure that the token encrypting certificates exist.
Note: The strings and the URLs in AD FS are case-sensitive.
To configure IDP on Active Directory, you must perform the following tasks:
Access Control Panel, then select System and Security, and then select Administrative Tools.
Select AD FS Management.
The AD FS window appears.
In the Actions section, select Add Relying Party Trust.
The Add Relying Party Trust Wizard appears.
Select Start.
The Select Data Source page appears.
Select Enter data about relying party manually, and then select Next.
The Specify Display Name page appears.
In the Display name box, enter urn:componentspace:Meridium, and then select Next.
The Choose Profile page appears.
Select the AD FS profile option, and then select Next.
The Configure Certificate page appears.
Select Next.
The Configure URL page appears.
Select the Enable Support for the SAML 2.0 WebSSO protocol check box.
In the Relying Party SAML 2.0 SSO service URL box, enter https://<name of the GE Digital APM server>/Meridium/api/core/security/ssologinauth, and then select Next.
Note: The word Meridium is case-sensitive. Therefore, ensure that the first letter of the word is capitalized. Also, the URL must be same as the URL in the saml.config file.
The Configure Identifiers page appears.
In the Relying party trust identifier box, enter urn:componentspace:Meridium, then select Add, and then select Next.
The Configure Multi-factor Authentication Now page appears.
Select I do not want to configure multi-factor authentication settings for this relying party trust at this time, and then select Next.
The Choose Issuance Authorization Rules page appears.
Select Permit all users to access this relying party, and then select Next.
The Ready to Add Trust page appears.
Select Next.
The Finish page appears.
Clear the Open the Edit Claim Rules dialog for this relying party trust when the wizard closes check box, and then select Close.
In the AD FS window, expand the Trust Relationships folder, and then select Relying Party Trusts.
The Relying Party Trusts page appears.
Select urn:componentspace:Meridium, and then, in the Actions section, select Edit Claim Rules.
The Edit Claim Rules for urn:componentspace:Meridium window appears.
Select the Issuance Transform Rules tab, and then select Add Rules.
The Add Issuance Authorization Claim Rule Wizard appears.
In the Claim Rule Template drop-down list box, select Send LDAP Attributes as Claims, and then select Next.
The Configure Rule page appears.
The Edit Claim Rules for urn:componentspace:Meridium window appears.
The public key certificate file is used to verify the signature of authentication request sent from GE Digital APM to AD FS and vice-versa.
To add certificates, you must perform the following tasks on the Application Server:
Install the token signing idp.cer certificate
Install the public key certificate file (sp.pfx)
Navigate to C:\Program Files\Meridium\ApplicationServer\api, where the public key certificate file (sp.pfx) is located.
Note: GE Digital provides the public key certificate file (sp.pfx). pfx is personal information exchange.
Right-click sp, and then select Install PFX.
The Certificate Import Wizard appears.
Select Local Machine, and then select Next.
The User Account Control window appears.
The Certificate Import Wizard appears, and the File Name box displays the file path where the certificate is located.
Select Next.
Enter a password, and then select Next.
Select Automatically select the certificate store based on the type of certificate.
The Completing the Certificate Import Wizard appears.
Select Finish.
In the main navigation bar, select File, then select Add/Remove Snap-in, and then select Certificates.
The Add or Remove Snap-ins window appears.
Select Add.
The Certificates snap-in window appears.
Select the Computer account option, and then select Next.
The Select Computer window appears.
Select the Local computer option, and then select Finish.
In the Add or Remove Snap-ins window, select OK.
The certificate appears in the Personal > Certificates folder of the Certificates (Local Computer) folder.
Select Certificates (Local Computer), then select Personal, and then select Certificates.
Right-click the certificate that you have installed, select All Tasks, and then select Export.
The Certificate Export Wizard appears.
Select Next.
Select the No, do not export the private key option, and then select Next.
Select DER encoded binary X.509 (.CER), and then select Next.
Select Next, and then select Finish.
Copy the certificate to Active Directory:
Select AD FS Management.
The AD FS window appears.
Select urn:componentspace:Meridium, and then, in the Actions section, select Properties.
The urn:componentspace:Meridium Properties window appears.
In the Secure hash algorithm drop-down list box, based on the policy of your organization, select SHA-1 or SHA-256.
Select Apply, and then select OK.
Install the token signing idp.cer certificate on the Application Server:
Right-click the file, and then select Install Certificate.
The Certificate Import wizard appears.
Select Local Machine, and then select Next.
What's Next?
Copyright © 2018 General Electric Company. All rights reserved.