Configuring SAML Authentication with ADFS
SAML authentication is responsible for exchanging authentication and authorization data between an identity provider and a service provider. In this way, the senior X Platform acts as a service provider that takes advantage of users already existing in the identity provider, for example ADFS (Active Directory Federation Services).
Regardless of the authentication method chosen, do not use spaces in the user name to access the platform.
Important
LDAP and SAML authentication settings may vary depending on the software used. Therefore, contact the IT Services - Consulting area to carry out the necessary configurations.
To configure ADFS for the platform, it is necessary to use a specific digital certificate for the tenant, which is provided by Senior when creating the tenant.
- Connect to the Active Directory server and run the ADFS Management application;
- On the menu, in the Trust Relationships folder, right-click the Relying Party Trusts folder, and then clickAdd Relying Party Trust…;
- In the Add Relying Party Trust Wizard clickStart;
- In the Select Data Source step, select the optionEnter data about the relying party manually and clickNext;
- In the Specify Display Name step, in the fieldDisplay Name, enter SeniorX and clickNext;
- In the Choose Profile step, keep the AD FS profile option selected and clickNext;
- click inNext in the Configure Certificate step. The certificate is made available when the tenant is requested via SARA, an email is sent to the consultant with the link to download a .zip where the certificate is inside the SAML folder in .jks format (if you do not have the certificate or need it in other format, contact senior X Platform support);
- In the Configure URL step, select the optionEnable support for the SAML 2.0 WebSSO protocol is atRelying party SAML 2.0 SSO service URL report https://platform.senior.com.br:9443/commonauth. Then clickNext;
- In the Configure identifiers step,Relying party trust identifier report SeniorX and clickAdd. Then clickNext;
- click inNext in the Configure Multi-factor Authentication Now? step;
- In the Choose Issuance Authorization Rules step, keep the option selectedAllow all users to access the relying party and clickNext;
- click inNext in the Ready to Add Trust stage;
- In the Finish step, keep the option selectedOpen the Edit Claim Rules dialog for this relying party trust when the wizard closes and clickClose.
After these settings, the Edit Claim Rules for SeniorX screen will open:
- On the Issuance Transform Rules tab, clickAdd Rule;
- In the Add Transform Claim Rule Wizard, in the Choose Rule Type step, keep the Send LDAP Attributes as Claims option selected and clickNext;
- In the Configure Claim Rule step:
- Claim rule name: SAM-Account-Name -> User Name
- attribute store : Active Directory
- Mapping of LDAP attributes to outgoing claim types:
- LDAP Attribute : SAM-Account-Name
- Outgoing Claim Type :UserName
- click inFinish
- and add one more rule: C
- laim rule name
- : Display-Name -> Name
- attribute store
- : Active Directory Mapping of LDAP attributes to outgoing claim types
- : LDAP Attribute
- click inFinish
- and add one more rule: C
- laim rule name : User-Principal-Name -> Email Address
- attribute store
- : Active Directory
- Mapping of LDAP attributes to outgoing claim types :
- LDAP Attribute : User-Principal-Name
- click inFinish;
- In the Choose Claim Rule step, add one more rule. InClaim rule template select Transform an Incoming Claim and clickNext;
- In the Configure Claim Rule ste
- p:
- Claim rule name : User Name -> Name ID
- Incoming claim type :UserName
- Outgoing claim type :NameID
- click inFinish and close the Add Transform Claim Rule Wizard screen;
- In the AD FS Management application, in the Relying Party Trusts folder, right-click SeniorX, and then clickProperties;
- On the SeniorX Properties screen, on the Signature tab, clickAdd.. and select the certificate obtained with Senior;
- On the Endpoints tab, clickAdd SAML...
- and report
- :
- Endpoint type: SAML Logout
- Binding: POST
- click inOK ;
- click inApply is atOK To finish, go to ADFS settings.
Before starting to configure authentication on the senior X Platform, still in the AD FS Management application, in the Service folder, click on Claim Descriptions and note the values for Claim Type, claimsUsername,Email Address It isName. These values will be used for authentication on the platform.
- Access the platform with the tenant administrator user;
- Go to Technology > Administration > Tenant Management > Configure, select the tenant and clicksettings;
- On the Authentication tab, change the authentication type to "SAML Authentication";
- In SAML Settings, enter:
- SAM
- L request redirect URL: https://platform.senior.com.br/auth/LoginWithCodeServlet
- Identity Provide
- r Entity ID: https://<ADFS URL>/adfs/services/trust
- Service Provider Ent
- Under SAML User Data:
- Claim that defines the user's username: claim type of claim User Name
- Claim that defines the user's email : claim type of claim E-Mail Address
- Claim that defines the user's full name : claim type of claim Name
- Role that will be defined for new users: determine the role that the user will receive on their first login via ADFS
- click inTo save to complete the settings.
To test the configuration, open another browser or an incognito tab in the same browser and access the platform's URL, entering the tenant's domain in the URL.
https://login.senior.com.br/login/?redirectTo=https%3A%2F%2Flogin.senior.com.br&tenant=tenant.com.br
If the configuration is correct, a redirection will be automatically made to the ADFS login screen. When providing valid credentials, you will be redirected to the already authenticated senior X Platform. Confirm that all user data is correct according to your profile on the platform. If any attribute is incorrect, review the claims part, both in ADFS and in the senior X Platform.
Important
Currently, it is not possible to integrate roles through SAML/ADFS integration for the senior X Platform. The linking of these roles must be done manually.






