Ensure that the Display Name from cb-metadata.xml matches the “sp”:”name” value from /etc/cb/sso/sso.conf.
Edit the claim rules to create rules for EDR:
Ensure that the value in NameID matches the EDR login name. (The EDR server depends on this.)
The EDR server uses the transient NameID policy, so be sure that claim rules comply with this policy.
Example:
a. Right-click on the relying party trust created above and select Edit Claim Rules.
b. Add a new rule to use Active Directory SAM-Account-Name as the Common Name.
c. Click OK.
d. Right-click on the relying party trust again and select Edit Claim Rules.
e. Add a new rule to translate Common Name to the NameID transient format.
f. Click OK.
Above the SAM Account Name and NameID claim rules, add these additional claim rules:
a. Add a given_name rule as follows:
b. Add a last_name rule as follows:
c. Add an email rule as follows:
d. Add a role rule as follows. This rule can contain any mapping needed for groups in the Active Directory. Validate that changes are reflected in the attr_map.py file.
Change the default Secure hash algorithm to SHA-1 as follows:
Next, add a special filter in IIS to allow logout requests to go through.
To add an IIS filter for ADFS logout:
Open IIS Manager.
In the left pane, locate the adfs/ls directory:
In the right pane, select Request Filtering:
Select the Query Strings tab:
Select the Allow Query String action:
Add in a new Query string called SAMLRequest.
Select the Edit Feature Settings action:
Change Maximum query string (Bytes) to 4096:
Restart the ADFS/LS IIS web pages to implement these changes.