Skip to main content

Configure AD FS

Prerequisites

To set up Active Directory Federation Services (AD FS) SSO in DronaHQ, you will need:

  1. Access permissions to create a relying party trust in your ADFS settings.
  2. Manage Users access on self-hosted DronaHQ instance or DronaHQ Cloud to configure SSO configurations.

Creating a Relying party Trust in ADFS

Follow the Relying Party Trust wizard in Active Directory with the following settings.

  1. In Select Data Source, select Enter data about the relying party manually.
  2. In Choose Profile, select AD FS profile.
  3. In Configure Certificate, do not upload a certificate.
  4. In Configure URL, select Enable support for SAML 2.0 WebSSO Protocol. Download and Open DronaHQ metadata file. To locate this file, Go to DronaHQ -> Manage Users -> SSO CONFIGURATION -> + Add SSO -> SAML 2.0, Under Entity ID and Metadata URL open this url file. Configure URL is the location where SAML assertion is sent with an HTTP POST, known as SAML Assertion Consumer Service URL. Locate this in the Metadata downloaded and paste it here. Ex - https://studio.dronahq.com/callback/saml.
  5. In Configure Identifiers, add your single-sign on domain without the protocol as a Relying party trust identifier. For example, use dronahq.yourcompany.com instead of https://dronahq.yourcompany.com. Finish the wizard.

Create rule to Send LDAP attributes as claims

Follow the steps to send LDAP attributes as claims.

  1. On the Choose rule type page, select Send LDAP Attributes as Claims.
  2. On the Configure claim rule page, choose Active Directory as the attribute store. Fill in the following settings.
LDAP AttributeOutgoing Claim Type
Email addressesemail
Email addressesAD FS 1.x Email address
Given Namename
  1. Select Transform an Incoming Claim and select the following settings.
SettingValue
Incoming claim typeAD FS 1.x Email Address
Outgoing claim typeName ID
Outgoing claim ID formatEmail
  1. Select Pass through all claim values and save the settings.

Configure in DronaHQ

In order to configure SAML in DronaHQ, we will need metadata file from your IDP. There is usually a button to download this from your IdP dashboard. Additionally, you can often find this by navigating to https://your.identityprovider.com/federationmetadata/2007-06/federationmetadata.xml.

  1. Now that we have metadata file, In DronaHQ, Go to Manage Users -> SSO Configuration -> + ADD SSO -> SAML 2.0

Enter form with below fields -

FieldDescription
NameProvide Friendly Name of this SSO configuration
Entity IDThe entity ID is present in metadata file. Copy the ID and paste it.
Login URL / SSO URLEnter the details of location of singlesignonservice from metadata file for POST method.
X509 public certificateX509Certificate file in .cer format. This file you can create following this step whose content you can locate in the metadata file.
Binding typeEnter HTTP POST.
Restricted DomainEnter domain name for which you want your users to login with for this SSO Configuration. You can add multiple domain names as well. eg - domain1.com , domain2.com. DronaHQ will automatically redirect to SSO url when we encounter any user’s sign in request with an email id belonging to the given restricted domain.
Want Auth request signedLocate this your IDP metadata file. Usually, Keep this default setting as False.
Add Claim ListWe have already assigned Email and Name in ADFS. We will now enter same key name - email and name and map it to DHQ User Name and DHQ User Email respectively.
Enable JIT user provisioningToggle this ON so that you won’t have to manually invite each user to DronaHQ first.
Enable SCIM User ProvisioningEnable this in case you want to create, update and deactivate User accounts at your IDP portal and sync it with DronaHQ user management.
  1. Save the draft. Again navigate back to the SSO configuration option. You can see the newly created SAML.
SAML in Draft state
SAML in Draft state
  1. You can click on Test SSO button and it will open SSO Login url in a popup window.

  2. Once you login successfully and if everything is set up correctly, then finally you will see a success message at the bottom.

SAML Signin Success
SAML Signin Success
  1. Now, that testing is successful, you can click on the more option for above SSO configuration and click on Activate to make it live.
SAML SSO Active
SAML SSO Active

ADFS SAML in Action

Now, since our ADFS SAML SSO is live, we check in either DronaHQ End user portal - Web, Android or iOS and see our configured adfs saml sso in action.

Simply go to DronaHQ End user webapp and enter your email id with domain that matches the configured restricted domain specified in SSO configuration and Click Continue.

SAML in WebApp
SAML in WebApp

Instead of asking for password, it asks for Login via SAML SSO provider. Click on it and open a popup window of your idp and the user can login with your idp login credentials.

Go to Manage User section on DronaHQ and you will see the new user created since JIT was enabled.