ShareFile single sign-on configuration guide for ADFS 3
Prerequisites to installation
To set up Citrix Content Collaboration to authenticate with Active Directory Federated Services, you need the following:
- Windows Server 2012 R2
- A publicly signed SSL Certificate from a CA. Self-signed and unsigned certificates are not accepted.
- An FQDN for your ADFS server
- Access to an administrator account within Citrix Content Collaboration with the ability to configure single sign-on.
Note:
To provision users from your Active Directory to Citrix Content Collaboration, reference the User Management Tool installation guide.
ADFS 3.0 (Role-based install)
-
You cannot download Microsoft Active Directory Federated Services 3.0 separately. You must use a Windows 2012 R2 server for this version.
-
Install the Role-based or featured based installation. Click Next.
-
Select the server for the install and click Next. Then select Active Directory Federation Services. Click Next.
-
Click Next through the Server Roles, AD FS and then to the Confirmation screen. Check the box for Restart, say Yes to the next screen, and click Install.
-
Once ADFS is installed, you must complete a post deployment activity if this is the first AD FS server in Active Directory. Use your own configuration information for this step.
Setting up ADFS 3.0
- In the ADFS 3.0 management console, start the Configuration Wizard.
-
When the wizard starts, select Create a new Federation Service and click Next.
-
Since we use a Wildcard Certificate, we must determine a Federation Service Name. If you are not using a wildcard SSL cert, you might not have to do this step. Then click Next to continue.
-
Click Next to configure.
-
Confirm that all the configurations were finished without error and click Close and exit the wizard.
-
Expand the Service node in the Management Console. Select the Token Signing certificate and click View Certificate in the right-hand column.
-
In the Certificate window, select the Details tab and then click Copy to File.
-
Click Next to continue.
-
Select Base-64 encoded X.509 (.CER) as the export format for the certificate, then click Next.
-
Save the certificate file and click Next.
-
Click Finish to save the file.
-
Browse to the folder where you exported the certificate and open it with Notepad.
-
Select all the text inside the Notepad and copy.
- Open Internet Explorer and go to your Citrix Content Collaboration account (
https://<yoursubdomain>.sharefile.com
). Sign in with your administrator account. Navigate to Admin Settings > Security > Login & Security Policy. Find Single sign-on / SAML 2.0 Configuration.- Switch Enable SAML setting to Yes.
-
ShareFile Issuer / Entity ID:
https://<subdomain>.sharefile.com/saml/info
-
Your IDP Issuer / Entity ID:
https://<adfs>.yourdomain.com
- X.509 Certificate: Paste the contents of exported certificate from previous section
-
Login URL:
https://<adfs>.yourdomain.com/adfs/ls
- In Optional Settings, change the following values.
- Enable Web Authentication: Yes (Check marked)
- SP-Initiated Auth Context: User Name and Password – Minimum
-
Minimize Internet Explorer and return to the ADFS Management Console. Expand the Trust Relationships node and select Relying Party Trusts. Then click Add Relying Party Trust… from the right-hand side of the console. This launches the Add Relying Trust Wizard.
-
Click Start to begin specifying a Relying Party Trust.
-
Retrieving the metadata from the SAML site can configure the trust automatically for you. Use
https://<yoursubdomain>.sharefile.com/saml/metadata
as the federation metadata address (host name or URL). Click Next. -
Specify a Display Name. Typically you keep this as
<yoursubdomain>.sharefile.com
, so you can identify the different trusts from each other. -
Permit all users to access this relying party. Click Next.
-
Verify that the information is correct and click Next.
-
Verify that the check box for Open the Edit Claim Rules dialog for this relying party trust when the wizard closes is checked. Then click Close.
-
On the Issuance Transform Rules tab, click Add Rule.
-
The first rule is to Send LDAP Attributes as Claims.
-
Users in the Citrix Content Collaboration platform are identified by their email address. We send the claim as a UPN. Give a descriptive Claim rule name, such as E-mail Address to E-mail Address. Select Active Directory as the attribute store. Finally, select E-Mail Address as the LDAP attribute and E-mail Address as the Outgoing Claim Type. Click Finish.
-
Create a second rule. This rule is used to Transform an Incoming Claim. Click Next.
-
The incoming claim type transforms the incoming email address to an outgoing Name ID claim type in the email format. Give a descriptive name, such as Named ID to E-Mail Address. The Incoming claim type is Email Address, the Outgoing claim type Name ID. The Outgoing name format is Email. Click Finish.
-
Verify that the claims are correct, then click OK.
-
Switch to any web browser and navigate to
https://<yoursubdomain>.sharefile.com/saml/login
. You are redirected to your ADFS services. If your sign-in email is linked to a user on AD, then you are able to authenticate with your AD credentials.