This section describes how to configure a federation server using Active Directory Federation Services (AD FS) to work with Deep Discovery Analyzer.
Deep Discovery Analyzer supports connecting to the federation server using AD FS 4.0 and 5.0.
Active Directory Federation Services (AD FS) provides support for claims-aware identity solutions that involve Windows Server and Active Directory technology. AD FS supports the WS-Trust, WS-Federation, and Security Assertion Markup Language (SAML) protocols.
Before you begin configuring AD FS, make sure that:
You have a Windows Server installed with AD FS 4.0 or AD FS 5.0 to serve as a federation server.
You are logged on to the management console as a Deep Discovery Analyzer administrator.
You have obtained the metadata file from Deep Discovery Analyzer.
You have configured web browser settings on each endpoint to trust Deep Discovery Analyzer and the federation server.
For more information, see Configuring Endpoints for Single Sign-on through AD FS.
The Edit Claim Rules screen appears.
Claim Rule Name |
LDAP Attribute |
Outgoing Claim Type |
---|---|---|
<user-defined rule name> |
User-Principal-Name |
Name ID |
The following procedure shows you how to configure settings using the Send Group Membership as a claim rule for each AD group. If you want to grant access to users in a child group and its associated parent group, you must create a rule each for the child group and parent group.
To customize settings based on your requirements, it is recommended that you use the Send Claims using a Custom Rule option.
Make sure you set the outgoing claim type as DDAN_groups.
For more information, see https://success.trendmicro.com/solution/000258112.
The Add Transform Claim Rule Wizard screen appears.
The Configure Claim Rule tab appears.
Claim Rule Name |
User Group |
Outgoing Claim Type |
Outgoing Claim Value |
---|---|---|---|
<user-defined rule name> |
<user group name in AD FS> |
DDAN_groups |
<user group name in AD FS> |