Submit a ticketCall us

Webinar: Web Help Desk for HR, Facilities and Accounting Departments
This webinar will focus on use cases for HR, Facilities and Accounting.

Having a unified ticketing and asset management system for all the departments in your company can provide end-users with a seamless experience and make things easier for your IT team. Yet, with different business tasks and objectives, many departments don’t fully understand the capabilities of Web Help Desk and how the software can be customized for effective use in their departments.
Register Now.

Home > Success Center > Web Help Desk (WHD) > Web Help Desk and Active Directory Federation Services settings

Web Help Desk and Active Directory Federation Services settings

Created by Interspire Import, last modified by MindTouch on Jun 23, 2016

Views: 473 Votes: 0 Revisions: 9

Overview

This article provides steps to configure Web Help Desk and Active Directory Federation Services settings. 

Environment

All WHD versions

Steps 

WHD and AD FS Settings

  1. Open AD FS 2.0.
    1. Expand the Trust Relationships folder.
    2. Right-click on the Replying Party Trusts folder and click Add Replying Party Trust.
  2. Click Start.
  3. Select Enter data about the replying party manually and click Next.
  4. Enter the Display name. The Display name does not affect the set up.
  5. Select AD FS 2.0 profile and click Next.
    1. Skip the Configure Certificate section and click Next.
  6. Check the option Enable support for the SAML 2.0 Web SSO protocol.
  7. Open a browser and navigate to the WHD web console.
    1. Navigate to Setup > General > Authentication.
    2. Select SAML 2.0 as the Authentication Method.
    3. Enter the Sign-in page URL.
    4. Copy the Metadata URL.
  8. Using Firefox, paste the Metadata URL into the browser URL and press Enter.
    1. Copy the entityID that is shown at the top of the page.
  9. Paste the copied entityID in the following:
    1. Relying party SAML 2.0 SSO Service URL in the Configure URL section of the wizard for the AD setup. Click Next.
    2. Relying party trust identifier in the Configure Identifiers section. Click Add and then Next.
  10. In the Choose Issuance Authorization Rules section, make sure that the Permit all users to access this relying party radio button is selected. Click Next.
  11. Skip the Ready to Add Trust section and click Close.
  12. In the Edit Claims Rules under the Issuance Transform Rules tab that will pop up, click Add Rule.
  13. For Claim rule template, select Send LDAP Attributes as Claims. Click Next.
  14. Enter the Claim rule name. The Claim rule name does not affect the set up.
    1. For Attribute store, select Active Directory.
    2.  For LDAP Attribute, select SAM-Account-Name.
    3.   For Outgoing Claim Type, select Name ID.
    4.  Click Finish.
  15. Click OK in the next dialog box that appears.
  16. In the AD FS 2.0 dialog box, right-click on the new Relying Party Trust that was created and click Properties.
    1. Go to the Signature tab and click Add.
    2.  Find the lowest certificate in the chain (not the root or intermediate) and click Open.
    3.  Click OK.
Last modified
05:02, 23 Jun 2016

Tags

Classifications

Public