OpenID Connect (OIDC) for ADFS

Integrating with OpenID Connect (OIDC) for ADFS

From AD FS Management, click on "Application Groups" and then click on "Add Application Group…​"

adfs

Enter a name, select "Server application accessing a web API" and then click Next

adfs

Enter Redirect URI from SUSE® Security Settings > OpenID Connect Setting page and then click Next

adfs

Enable "Generate a shared secret" checkbox and then click Next

adfs

Enter the Identifier created in previous step and then click Next

adfs

adfs

Enable allatclaims, email, openid and profile scopes and then click Next

adfs

adfs

adfs

Double click on an application group you just created previously

adfs

Double click on Web API and then click Issuance Transform Rules tab

adfs

Click Add Rule…​ and select "Send LDAP Attributes as Claims" and then click Next

adfs

Enter a Claim rule name, choose Active Directory as the Attribute store and provide the mapping of LDAP attributes to outgoing claim types as below

  • Token-Groups — Unqualified Names → groups

  • User-Principal-Name → preferred_username

  • E-Mail-Address → email

adfs

adfs

SUSE® Security Setup

  • Identity Provider Issuer: "https://<adfs-fqdn>/adfs"

  • Client ID: It is a "Client Identifier" showing in "Server application" dialog in "Add Application Group Wizard"

  • Client Secret: It is a Secret showing in "Configure Application Credentials" dialog in "Add Application Group Wizard"

  • Group Claim: groups

adfs

adfs

adfs