This guide demonstrates how to configure Active Directory Federation Services (ADFS) as an Identity Provider for Single Sign-On with Teamgage.
Not using ADFS? See Single Sign-On - SAML Setup Guide for more general guidance.
Before You Begin
To simplify setup, please check the following:
- Version: Check your version of ADFS and Windows Server.
These instructions are tailored to ADFS 4.0, which is integrated with Windows Server 2016.
If you are using a different version, please consider that some steps may differ slightly. - Environment: Determine which Teamgage server you are connecting to: UAT or Production
To ensure a smooth transition, we recommend first configuring SSO on our UAT (User Acceptance Testing) server to ensure compatibility with your environment.
This can also be used to prepare for your organisation's change management process. - LDAP Attribute: Verify which AD User property is used to store the relevant email address in Active Directory Users and Groups.
Depending on your organisation's Active Directory and/or Exchange configuration, this could be:- E-Mail-Addresses
- User-Principal-Name
- or something else
- E-Mail-Addresses
Quick Info
Federation Metadata URL:
- For UAT:
https://uat.teamgage.com/Saml2
- For Production: https://www.teamgage.com/Saml2
Claims Required:
- Name ID: email address, UPN, or object GUID if available
- Email Address: email address
Detailed Configuration Steps
- Open Administrative Tools > AD FS Management Console.
- Right-click on Relying Party Trusts > Add Relying Party Trust
- Create a Claims Aware application
- Import data about the relying party using the respective Federation metadata address
- UAT:
https://uat.teamgage.com/Saml2
- Production: https://www.teamgage.com/Saml2
- UAT:
- Enter an appropriate Display Name such as: Teamgage - UAT
- Assign an Access Control Policy of Permit everyone.
Per-user access control is managed within Teamgage based on your HR data, and does not need to be managed through SSO. - Complete the Wizard and Configure claims issuance policy
Alternatively: Right-click the application and select Edit Claim Issuance Policy. - Add Rule
- Send LDAP Attributes as Claims
- Configure the Claim Rule
- Select the Attribute Store: Active Directory
- Add the following mappings of LDAP Attributes to Outgoing Claims:
E-Mail-Addresses (or correct attribute) -> Name ID
E-Mail-Addresses (or correct attribute) -> E-Mail Address
Important: Ensure you select the correct LDAP Attribute for where your email address is stored.
Depending on your environment, this might not be the "E-Mail-Addresses" field.
See Before You Begin: 3. LDAP Attribute (above).
Finish and OK
To proceed with SSO activation, contact Teamgage Support with the following details:
The Federation Metadata URL for your ADFS server
Eg: https://adfs-host.example.net/FederationMetadata/2007-06/FederationMetadata.xmlA list of all email domains used within your organisation (or the relevant test/production environment)
Troubleshooting
Below are solutions to some common problems. If you have further difficulty, please contact Teamgage Support.
Error when submitting the Federation Metadata URL
Problem: You receive the error "The underlying connection was closed: An unexpected error occurred on a send."
Solution: ADFS uses the .NET Framework, which might need to be configured to use strong TLS encryption on outbound requests.
For more information see Microsoft Support Article: Considerations for disabling and replacing TLS 1.0 in ADFS.