Configuring AD FS for TaaS
To use Active Directory Federation Services (AD FS) as an identity provider for TaaS, you must first configure it. For more information about configuring AD FS, see How do I set up AD FS as a SAML identity provider with an Amazon Cognito user pool?
- From the AD FS Management Console, go to Actions > AD FS > Add Relying Party Trust....
- In the Welcome step, select Claims aware and then click Start.
- In the Select Data Source step, select Enter data about the relying party manually and then click Next.
- In the Specify Display Name step, enter a name, such as Tanium or TaaS, and then click Next.
- In the Configure Certificate step, click Next. A service-provider certificate is not required for TaaS.
- In the Configure URL step, select Enable support for the SAML 2.0 WebSSO protocol, enter the SSO URL value from the Cloud Management Portal, and then click Next.
- In the Configure Identifiers step, enter the Audience URI (SP Entity ID) value from the Cloud Management Portal, click Add, and then click Next.
- In the Choose Access Control step, select an appropriate access control policy for your organization, and then click Next.
You must give access to the user that is listed as the Primary TaaS Admin Username in the Cloud Management Portal. This user is the only user that is created in TaaS during the provisioning process. Additional users can be created in TaaS by this user or other delegated users.
- In the Ready to Add Trust step, click Next.
- In the Finish step, verify that Configure claims issuance policy for this application is selected, and then click Close.
If the Edit Claim Issuance Policy for <applicationDisplayName> window does not appear automatically, right-click Relying Party Trust for <applicationDisplayName>, and then click Edit Claim Issuance Policy....
- In the Edit Claim Issuance Policy for <applicationDisplayName> window, click Add Rule... to create the rule to send the e-mail addresses from AD to TaaS in both the e-mail address and NameID attributes.
- Enter a Claim rule name, such as Send E-mail Addresses.
- From the Attribute store drop-down menu, select Active Directory.
- In the first row of Mapping of LDAP attributes to outgoing claim types, select E-Mail-Addresses for the LDAP Attribute column and E-Mail Address for the Outgoing Claim Type column.
- In the second row of Mapping of LDAP attributes to outgoing claim types, select E-Mail-Addresses for the LDAP Attribute column and Name ID for the Outgoing Claim Type column.
- Click OK to save the rule and close the window.
- Click OK to save the claim issuance policy and close the window.
- Replace <yourADFSServer> in the following URL with your AD FS server/farm name and then provide the XML file to Tanium.
Amazon Cognito, which is used for identity federation with TaaS, does not support IdP-initiated SSO. To sign in to TaaS, you must first access your TaaS Console URL from the Cloud Management Portal. You cannot sign in from the AD FS IdP Initiated SSO page.
Last updated: 10/25/2021 10:16 AM | Feedback