Active Directory Federation Services (AD FS) for Email Archive
This manual provides step-by-step instructions for setting up Active Directory Federation Services (ADFS) to provide Single Sign-On end user access to the Retarus Enterprise Email Archive.
AD FS Configuration
The AD FS 2.0 console is installed automatically when you install AD FS 2.0.
→ Start the AD FS 2.0 snap-in:
→ Select Add Relying Party Trusts.
→ In the wizard that opens, click on Start:
→ Select Import data about the relying party published online or on a local network to obtain the data online. The Retarus SP SAML URL is:
https://am.retarus.com/openam/saml2/jsp/exportmetadata.jsp?entityid=https://am.retarus.com
→ Ignore the following warning and click on OK to continue:
→ Enter a display name of your choice for this relying party entry in your ADFS (e.g., Retarus Enterprise Email Archive). You can also provide a description.
→ Select Permit all users to access this relying party.
→ You can leave the checkbox selected because you’ll have to enter claim rules to complete the ADFS SP configuration in order to access the Retarus Enterprise Email Archive.
→ Select add rule to send the NameID as a transient value using an “anonymous” value from AD, e.g., Primary SID.
→ Select Send Claims Using a Custom Rule from the drop-down menu.
→ Enter a name of your choice for the rule (e.g., Send Windows Primary SID as the transient Name ID).
→ Enter the following custom rule into the field:c:[Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/primarysid"] => issue(Type = "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier", Issuer = c.Issuer, OriginalIssuer = c.OriginalIssuer, Value = c.Value, ValueType = c.ValueType, Properties["http://schemas.xmlsoap.org/ws/2005/05/identity/claimproperties/format"] = "urn:oasis:names:tc:SAML:2.0:nameid-format:transient", Properties["http://schemas.xmlsoap.org/ws/2005/05/identity/claimproperties/spnamequalifier"] = "https://am.retarus.com");
→ Select Finish.
→ Add another rule in order to send the user’s email address as an attribute.
→ Select Send LDAP Attributes as Claims from the Claim rule template drop-down menu.
→ Enter a name for the claim rule (e.g., Send Primary Internet Email Address). Then select Active Directory as the attribute store with Email-Addresses in the LDAP Attribute column and email as the attribute in the Outgoing Claim Type column.
Both rules should now be visible in the first tab of the dialog:
→ Disable encryption of the SAML assertion sent to Retarus. Please note the data is anyhow protected because all communication with the Retarus Web Server is via TLS (SSL). Select the relying trust entry you created for Retarus Enterprise Email Archive and right-click to select Edit Properties.
→ Select the Encryption tab and then click on the Remove button.
→ Confirm the deletion.
The Encryption certificate field should now be empty as shown in the screenshot below. Select OK to save the changes and close the dialog.
→ Now you need to send the Federation metadata for your AD FS to Retarus. Open the following URL in your browser:<https://<your> adfs server hostname>/FederationMetadata/2007-06/FederationMetadata.xml
→ Save the content as a XML file using the browser’s save function.
The next step is to send this XML file to your Retarus Implementation Engineer.
Retarus – AD FS interaction
The following diagram displays the interaction between the Retarus system and the AD FS: