Skip to main content

Access Identity Federation single Sign-On

Configure AD FS or Azure AD for single sign-on

Jon Lee avatar
Written by Jon Lee
Updated over 2 months ago

To use Federation in Access Identity, certain prerequisites must be completed before configuration can begin.


Enable Federation feature

Follow the steps below to ensure your setup is ready and correctly implemented:

  1. The Federation feature must be enabled in your agreement with Access.

  2. For further information, please contact your Account Manager.

  3. Your chosen OpenID Connect Identity Provider must be installed, configured, and publicly accessible via HTTPS.

  4. The installation, configuration, and testing of your Identity Provider is outside the scope of this guide.

  5. This guide outlines configuration steps for AD FS 2016 and Azure AD.

  6. For other Identity Providers, please reach out to us for further instructions.


Configure Federation

To configure Access Identity federation with AD FS 2016, follow these steps:

  1. Open the AD FS Management tool.

  2. Select Application Groups and click on Add Application Group.

  3. Enter Access Identity as the name.

  4. Select Web browser accessing a web application as the template.

  5. Click Next.

  6. Copy the generated Client Identifier (you’ll need this later).

  7. Select Add and click Next.

  8. Select Permit everyone as your access control policy.

  9. Click Next, then click Next again.

  10. Click Close.

  11. Select the Application Group you just created, then select Properties.

  12. Select Access Identity – Web application.

  13. Click Edit, then click Issuance Transform Rules.

  14. Select Add Rule.

  15. Verify the claim rule template is set to Send LDAP Attributes as Claims.

  16. Click Next, then set the claim rule name to Email.

  17. Change the Attribute store to Active Directory.

  18. Change the LDAP Attribute to E-Mail-Addresses.

  19. Change the Outgoing Claim Type to E-Mail Address.

  20. Click Finish.

  21. Select the Client Permissions tab, then click email as a permitted scope.

  22. Click OK, then click OK again.


Configure Access Identity

You can now configure Access Identity to use this OpenID Connect Identity Provider.

To configure Access Identity as an Application in Azure AD, follow these steps:

  1. Open the Azure Portal.

  2. Select Azure Active Directory, then click App registrations.

  3. Select New registration.

  4. Enter a name for the application, e.g. Access Identity.

  5. Click Register.

  6. Note the Application (client) ID and Directory (tenant) ID (you’ll need these later).

  7. Select Authentication.

  8. In the Redirect URIs section, add a new redirect URI:

  9. In the Advanced settings section, select ID tokens.

  10. Click Save.

🤓 Tip: You have now successfully added Access Identity as an application to your Azure AD.

Did this answer your question?