ADFS as IdP For WordPress

WordPress SAML SP Single Sign-On plugin gives the ability to enable SAML Single Sign-On for your WordPress sites. Our plugin is compatible with all the SAML compliant Identity providers. Here we will go through a step-by-step guide to configure SSO between WordPress site and Active Directory Federation Services (ADFS) by considering ADFS as IdP.

miniorange img Pre-requisites : Download And Installation

To configure ADFS as SAML IdP with WordPress, you will need to install the miniOrange WP SAML SP SSO plugin:

Step 1: Setup ADFS as Identity Provider

Follow the steps below to configure ADFS as IdP

miniorange img Configure ADFS as IdP

  • In the miniOrange SAML SP SSO plugin, navigate to Service Provider Metadata tab. Here, you can find the SP metadata such as SP Entity ID and ACS (AssertionConsumerService) URL which are required to configure the Identity Provider.
  • wordpress saml upload metadata
  • On ADFS, search for ADFS Management application.
  • ADFS single sign on sso login sso-1
  • After opening the AD FS Management, select Relying Party Trust & then click on Add Relying Party Trust.
  • ADFS single sign on sso login sso-2
  • Click the Start button from the Relying Party Trust Wizard pop up. But before that please make sure Claims aware is selected.
  • ADFS single sign on sso login sso-3
  • Select the options for adding a relying party trust.
    • miniorange img Using Metadata URL

      • In Select Data Source: Import data about the relying party published online or on the local network option & then add URL in Federation metadata address (Navigate to Service Provider Info tab from the plugin for getting SP Meatadata URL).
      • ADFS single sign on sso login-4
      • Skip step-5 to step-8 & start configuring from step-9.

      miniorange img Using Metadata XML file

      • In Select Data Source: Import data about the relying party from a file option & then browse the metadata file(You can download the SP metadata file from the plugin under the Service Provider Metadata tab).
      • ADFS single sign on sso login sso-5
      • Skip step-5 to step-8 & start configuring from step-9.

      miniorange img Using Manual configuration

      • In Select Data Source: Enter Data about the relying party manually & Click on Next.
      • ADFS single sign on sso login sso-6
  • Enter Display Name & Click Next.
  • Upload the certificate & click Next. Download the certificate from plugin & use the same certificate to upload on ADFS.
  • Select Enable support for the SAML 2.0 WebSSO protocol & Enter ACS URL from the plugins Service Provider Info Tab. Click Next.
  • ADFS single sign on sso login sso-7
  • Add Entity ID from plugins Service Provider Info Tab as Relying party trust identifier then click Add button & then click Next.
  • ADFS single sign on sso login sso-8
  • Also download the Signing certificate from Service Provider Info Tab from the plugin.
  • Select Permit everyone as an Access Control Policy & click on Next.
  • ADFS single sign on sso login sso-9
  • Click the Next button from Ready to Add Trust & click Close.
  • It will show you the list of Relying Party Trusts. Select the respective application & click on Edit Claim Issuance Policy.
  • ADFS single sign on sso login sso-11
  • Click on Add Rule button.
  • ADFS single sign on sso login sso-12
  • Select Send LDAP Attributes as Claims & click on Next.
  • ADFS single sign on sso login sso-13
  • Enter the following details & click on Finish.
  • Claim rule name: Attributes
    Attribute Store: Active Directory
    LDAP Attribute: E-Mail-Addresses
    Outgoing Claim Type: Name ID
    ADFS single sign on sso login sso-14
  • Click Apply and then Ok.
  • Select property of the application & add the certificate downloaded from the add-on.
  • ADFS single sign on sso login sso-15