Below are detailed technical instructions for configuration of a customers' ADFS server (Active Directory Federation Services) for SAML based SSO (Single Sign On) with the Nepton platform. These instructions are intended for individuals with experience in the area of ADFS server.
Please see other articles under the Configuring SSO section for more information on the topic of SSO configuration.
Nepton SP (Service Provider) metadata can be found here:
Configure the Relying Party Trust (Service Provider)
choose one of the two options below:
Import data online or on a local network
- Login to the ADFS server and open the management console.
- Right-click on "Relying Party Trusts" under "Trust Relationships" > Add Relying Party Trust... > Start
- Select "Import data about the relying party published online or on a local network"
- Enter:
- Next
- Enter a Display Name, eg: "go.nepton.com" > Next
- Click Next to skip the Multi-factor Authentication
- Select "Permit all users to access this relying party" (you can change this later) > Next
- Click Next to continue
- Uncheck "Open the claim rules dialog..." > Close
- Right-click the new trust you just created > Properties
- Advanced tab > Choose the desired algorithm, which will be set up also in Nepton
- Click OK
Enter data manually
- Login to the ADFS server and open the management console.
- Right-click on "Relying Party Trusts" under "Trust Relationships" > Add Relying Party Trust... > Start
- Select "Enter data about the relying party manually" > Next
- Enter a Display Name, eg: "go.nepton.com" > Next
- Click "AD FS 2 (or 3)" profile > Next
- Click Next to skip the Token encryption certificate
- Click Next to skip the Configure URL section
- Enter following as the "Relying party trust identifier"
- https://go.nepton.com/ExternalLogin/Saml
- Add > Next
- Click Next to skip the Multi-factor Authentication
- Select "Permit all users to access this relying party" (you can change this later) > Next
- Click Next to skip
- Uncheck "Open the claim rules dialog..." > Close
- Right-click the new trust you just created > Properties
- Monitoring tab
- Enter following as Relying party's metadata URL
- Check "Monitor Relying Party"
- Check "Automatically update relying party"
- Advanced tab > Choose the correct algorithm and send the hash algorithm to Nepton
- Enter following on Endpoints tab > SAML Assertion Consumer, with POST binding
- https://go.nepton.com/ExternalLogin/Saml2Consumer.aspx
- Click OK
- Monitoring tab
Ensure required certificates are set up
- Login to the ADFS server and open the management console.
- Ensure you have the VRK Gov. Root CA - G2 and VRK CA for Service Providers - G4 Certificates installed in the Trusted Intermediate & Trusted Root stores. These certificates are available from https://dvv.fi/en/ca-certificates
- Import the go.nepton.com certificate
- Right-click the Relying Party > Update from Federation Metadata
- If this doesn't work, please check if you can from ADFS server access the metadata URL. If this is blocked, you might need to open the firewall accordingly.
- Verify the certificate's path is valid in the "Certificate Path" tab under the certificate's properties.
- Right-click the Relying Party > Update from Federation Metadata
- Configuring the Claim Rules
- Right-click the new trust you just created > Edit Claim Rules...
- Add Rule > Send LDAP Attributes as Claims> Next
- Claim rule name > enter "Get LDAP Attributes"
- Attribute store > select Active Directory
- LDAP Attribute > Email Addresses
- Outgoing Claim Type > Email Address
- Finish
- Add Rule > Transform an incoming claim> Next
- Claim rule name > enter "Convert Email to Name Id"
- Incoming claim type > Email Address
- Outgoing claim type > Name ID
- Outgoing Name ID format > Transient Identifier
- Finish
- Apply > OK
Collect the Token-Signing Certificate
- Login to the ADFS server and open the management console
- Browse to Service > Certificates > Right-click the Token-Signing Certificate > View Certificate > Details Tab > Copy to File > Next
- Click "No, do not export the private key" > Next
- Select "Base-64 encoded X.509" > Next
- Pick a location to save the file > Next > Finish
- You will need the certificate file on next step
Creating the settings in Nepton
- Add the SSO settings and certificate to Nepton. Guidance can be seen here.