Refer, to configure NetScaler SAML with AD FS Before this make sure, Virtual Desktop works with NetScaler without SSON or FAS configuration. Configure NetScaler SAML to work with AD FS.Go to properties of user for whom you want to enable Single sign on and then add the google domain email address of that user in Email field. Provide a Name to the rule, select E-Mail Address as the Incoming Claim Type, set the Outgoing claim type to Name ID and the Outgoing name ID format to Email: Click on the Signature tab and Click Add:Īdd the Token Signing Certificate â it must the AD FS Token Signing Certificate you uploaded to the Google Admin Console AD FS.Ĭlick Edit Claim Rules and click Add Rule:įrom the Claim rule drop-down, select Transform an Incoming Claim. Select Enable support for the SAML 2.0 WebSSO protocol and enter /acs"> in the Relying party SAML 2.0 SSO service URL textbox.Ä®nter /a/ Provide a name for the trust (so that you can easily identify it) Open the AD FS 2.0 Management Console and navigate to Relying Parties section.Ĭhoose Enter data about the relying party manually.However, it does not affect your login to the Admin Console â that is always accessed by manual login, so that you can get and disable Single Sign-on again.Ĭonfigure SAML Single Sign-on policies on Google Admin Console, refer for more details. Note that the settings take effect immediately. Single sign-on is configured and enabled. Click Upload.Ä®nter network addresses in the Network masks textbox. Verification certificate: Upload the AD FS Token Signing cert (.cer file) which can be obtained from the AD FS 2.0 Management Console (under Service > Certificates). Sign-out page URL: /adfs/ls/Ĭhange password URL: /startersts/users/password.aspx This will take you through to a configuration screen. Click Security->Set up Single Sign-on (SSO) Ensure that, AD FS and AD are not on the same machine.Ĭonfigure AD FS URL in Google Admin console for Single Sign-on as follows:Ä®nable Single Sign-on in Google Apps. Install and configure Active Directory Federation Service (AD FS) from server manager roles on any Windows 2K8 R2 or Windows 2K12 R2 server. Configuring Active Directory Federation Services (AD FS) and Google Admin Console Install Virual Desktop and configure Federated Authentication Service. Refer Citrix Documentation - Federated Authentication Service for more details.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |