Acquire

Check why the best companies invested in us

Scale your support with a modern help desk and integrated knowledge base.

Get started today
Microsoft ADFS

Microsoft ADFS

SSO

Features with Acquire
Integrating Microsoft Active Directory Federation Services (ADFS) is straightforward. In addition to configuring your Admin account on acquire, you will need your organization’s assistance in adding Relying Party Trust information to your ADFS configurations.
Microsoft ADFS

Integrating Microsoft Active Directory Federation Services (ADFS) is straightforward. In addition to configuring your Admin account on acquire, you will need your organization’s assistance in adding Relying Party Trust information to your ADFS configurations.
There are several information we are going to cut and paste between Acquire and ADFS.

The Acquire Authentication Url. This is a name you pick when you create the authentication (see below). The Token-Signing certificate of the ADFS. The ADFS Federation Login URL. This is a URL where ADFS keeps the SAML access for your account. Example URL:  https://himank.eastus.cloudapp.azure.com/adfs/ls
Following the steps below, you can find these values and copy them from ADFS to Acquire and from Acquire to ADFS. You should read this guide all the way through, before beginning, so that you will be able to gather the necessary info for each step ahead-of-time. Once you have the required info, this integration should take less time. The screenshots below will help guide you.

PRE-REQUISITES

First, make sure that you have an Acquire account, Admin account with ADFS Integrations Configured. When this is configured, you can access ADFS login enabled at Acquire. ADFS Federation Login URL & signing certificate will need to create configurations between Acquire and ADFS.

Step 1: Add The Relying Party Trust And Claims Rules To ADFS

Now let’s perform some setup tasks in your Microsoft ADFS environment to integrate with your new Custom Authentication setup on Acquire. The instructions below were created from a Microsoft Windows Server 2016 running ADFS but should also work well for a Windows Server 2012 R2 infrastructure. You will need to ensure that your ADFS infrastructure is using a valid SSL certificate that can be verified.

First, we need to add a new Relying Party Trust.

 

Add Relying Party Trust Wizard. On the Welcome screen, select Claims aware, then click Start.

 

Select Relying party manual.

Enter a Display name on the next screen and click Next.

 

Next, choose appropriate configurations to profile select ADFS profile

Next enable SAML 2.0 WebSSO protocol

 

Next Enter relying on trust URL: https://app.acquire.io/adfs

Pass through all steps and finish The Finish screen shows that you have added the Relying Party Trust successfully. Leave the checkbox checked for Configure claims rules wizard, so that we can easily proceed to the next steps.

 

On the Configure Claim Rule screen, enter a Claim rule name and enter the info.

The Edit Claims window will appear. If you don’t see it, it may be hidden behind other windows on your screen. Click Add Rule…

On the Choose Rule Type screen, select Send LDAP Attributes as Claims, then click Next.

Name your Claim rule name. We’ll now add three LDAP attributes to outgoing claim types as follows. Click Finish, once completed.

Select Pass through all claim values, then click Finish.

 

Step 2: Download Token Signing Certificate For Authentication

Choose token signing & click view certificate

 

Follow these steps: Certificate > details > copy to file > Export File Format(Base 64 encoded X.509 {.cer})

Pass through certificate export wizard, save and copy certificate and add in acquire configurations.

Example certificate, copy and paste in acquire configure: (this is example certificate)

 

Step 3: Create The Acquire Authentication

Now in this step, you need to configure with Acquire. You will need ADFS Federation Login URL & Token-Signing certificate.

Acquire > Settings > Integrations > sso > Microsoft ADFS

Let’s add configuration & save.

 

Step 4: Testing

You can use the following URL to give to your domain users to log in with their Domain credentials: https://app.acquire.io/adfs

The above URL is case sensitive.

Your users can log in with either credential:

  • Domain\username
  • surendra@org.local
  • Password

 

If the login is successful, you will signed-in to Acquire automatically and redirected to the dashboard.