Prerequisites
To be able to use Microsoft Active Directory Federated Services (AD FS) Single Sign-On (SSO) to log in to your Viima board, the following prerequisites must first be met:
An Active Directory instance (AD)
An active Viima Unlimited or Enterprise subscription
Admin access to a Viima board (for credentials, please contact your Viima super user)
A server running Microsoft Server 2012 or 2008
An SSL certificate to sign your AD FS login page with and the fingerprint for that certificate.
Collected data
Viima collects the following data from the AD FS:
User Principal Name
E-mail address
First name
Surname
User Groups (optional)
User Groups is an optional field that is only required when the board access restriction is set to "Allow listed users and users belonging to any of the following users groups". In that case, please ensure to provide the User Group information when creating the claim rules by adding a claim for the User Group LDAP attribute (step 4 of "Creating claim rules"). After that, you can enable the access restriction "Allow listed users and users belonging to any of the following user groups" in Viima and list the desired user groups for which you wish to grant access to the board.
Overview
Adding a Relying Party Trust
Creating claim rules
Configuring Viima
Adding a Relying Party Trust
Step 2:
Add a new Relying Party Trust by clicking "Add Relying Party Trust” from the “Action" dropdown menu.
Step 4:
Select "Import data about the relying party published online or on a local network" and enter the following URL into the Federation metadata address:
Then, click "Next".
Step 6:
On this screen, you may configure multi-factor authentication for your AD FS login.
However, this is beyond the scope of this guide so you can skip this by clicking “Next”.
Step 8:
On this screen, the wizard will display an overview of your settings. You can directly proceed by clicking “Next”.
Step 9:
Make sure the “Open the Edit Claim Rules dialog for this relying party trust when the wizard closes” checkbox is marked and click "Close".
This will automatically open the "Edit Claim Rules" dialog.
Creating claim rules
Once the relying party trust has been created, you can add claim rules and update the RPT with minor changes that aren't set by the wizard. If you completed all steps up to this point, the claim rule editor should open automatically.
Step 2:
From the dropdown menu under "Claim rule template:", select “Send LDAP Attributes as Claims”.
Then click "Next".
Step 4:
From the dropdown menu under "Attribute store:", select "Active Directory".
Under "Mapping of LDAP attributes to outgoing claim types:", create the following claim rules:
Given-Name | Given Name
Surname | Surname
E-Mail-Addresses | E-mail Address
User-Principal-Name | UPN
Then click "Finish"
Configuring Viima
If you already know your board name, the easiest way to get to access rights is through the following URL:
https://app.viima.com/admin/organization-name/board-name/#settings/access
If you do this, proceed directly to Step 3. Otherwise, start from Step 1.
Step 5:
Choose "SAML 2.0 (AD FS, Okta)" from the login options and click the "Connect to a SAML service" button.
Step 6:
In the "Login URL" field, fill in the Login URL of your SAML service. For example, https://ad.viima.com/adfs/ls/idpinitiatedsignon.
Step 7:
In the "Entity ID" field, fill in your SAML service Identifier. For example, https://ad.viima.com/adfs/services/trust.
This can be found in the AD FS Management console which we opened earlier in this guide (Step 2 of Adding a relying trust party).
In the AD FS Management console, click "Edit Federation Service Properties...” from the “Action" dropdown menu.
From here, you can find your Entity ID under "Federation Service Identifier"
Step 8:
In the text field next to "Certificate fingerprint (SHA1)", fill in your SHA-1 encrypted fingerprint.
The fingerprint can be acquired by running the following PowerShell command on the system with the installed certificate:
C:\> Get-AdfsCertificate
P.S. Make sure to use the Token-Signing fingerprint.
Congratulations!
You should now have a working AD FS SSO implementation for your Viima board. To test the integration, please log out and try to sign in to your Viima board with AD FS by using a valid account that is in the Active Directory.
If you face any issues with logging in using Internet Explorer, please see our guide for Troubleshooting issues with Internet Explorer.
Don't forget to save your changes!
Green "Save" buttons can be found on all pages where changes can be made. Clicking this activates those changes.