Setting up SAML SSO for Active Directory
How to set up Single Sign-On (SSO) for users synced between an Active Directory domain server and a Secret Server user list.
The interface and workflows for Active Directory Federation Services (ADFS) Server are subject to change. For more current workflow and interface references, please refer to the Microsoft ADFS Server documentation.
ADFS Server
-
On your ADFS server, browse to your Secret Server instance and sign in.
-
Download the
SecretServerSAMLMetadata.xml
file from[YourSecretServerInstance.Name]/samlmetadata
. -
Open Active Directory Federation Services Management.
-
Under Trust Relationships, click Add Relying Party Trust to add your service provider information.
-
In the Add Relying Party Trust wizard, click Start.
-
Click Import data about the relying party from a file.
-
Browse to select the metadata XML file you downloaded earlier and click Next.
-
Enter a display name of your choice and click Next.
-
Decide whether to configure multi-factor authentication and click Next.
Secret Server
-
In Secret Server, click Admin > SAML Identity Providers, and click Create New Identity Provider.
-
Click Import IDP from XML Metadata and select the ADFS metadata you downloaded. If you don't see the file, you might need to change the metadata filetype to xml.
Adding Users to ADFS
For users to be authenticated by the SSO workflow you are setting up, Secret Server usernames must match domain AD usernames. If you manually add usernames to Secret Server or AD, you must inspect them carefully to ensure that they match. You can also use Secret Server Discovery to sync Secret Server usernames in bulk with AD usernames.
Once a username matches in both systems, the user can log into their desktop computer using their AD credentials and then browse to Secret Server without being prompted again for authentication.
Common Errors
If you encounter any of the errors below, check that the RelyingPartyTrust Rule on the ADFS server has both the message and assertion signed. By default, only the assertion is signed.
-
"Attempt to login via SAML from identity provider had no signed responses or assertions"
-
"Attempt to login via SAML with unsigned request"
-
"Attempt to login via SAML with unsigned assertion"
If you encounter the error, "SAML Response signature message from IDP failed verification," it means that Secret Server cannot decrypt the assertion message from the IDP (ADFS) because the public certificate thumbprint is incorrect. To fix this issue, follow the steps below.
-
Download the ADFS certificate, upload it to Secret Server (Admin > Configuration > SAML tab) and edit the IDP configuration.
-
Check the token-decrypting in ADFS to verify the certificate.
-
Use the Get-AdfsCertificate cmdlet to retrieve the certificates listed below that ADFS uses, and check that they are appropriately identified as primary (IsPrimary is set to True):
-
A primary token-signing certificate is used to digitally sign outgoing claims.
-
A primary token-encrypting certificate is published in federation metadata for use by trusted claims providers.
-
Information card signing and service communications certificates are always primary.
-