How to configure SAML Authentication on Storefront with ADFS

How to configure SAML Authentication on Storefront with ADFS

book

Article ID: CTX220638

calendar_today

Updated On:

Description

This document provides the steps to follow for manually configuring the SAML authentication with Storefront feature.
 


Instructions

Enable the Federated Authentication Service plug-in on a StoreFront store: 
  1. To enable Federated Authentication Service integration on a StoreFront Store, run the following PowerShell cmdlets as an Administrator account on the StoreFront server. If you have more than one store, or if the store has a different name, the path text highlighted below may differ.
  2. Set-ExecutionPolicy Bypass
Get-Module "Citrix.StoreFront.*" -ListAvailable | Import-Module
$StoreVirtualPath = "/Citrix/Store"
$store = Get-STFStoreService -VirtualPath $StoreVirtualPath
$auth = Get-STFAuthenticationService -StoreService $store
  1. Set-STFClaimsFactoryNames -AuthenticationService $auth -ClaimsFactoryName "FASClaimsFactory"
  2. Set-STFStoreLaunchOptions -StoreService $store -VdaLogonDataProvider "FASLogonDataProvider"
  3. In addition, make sure to enable XML Trust on the Delivery Controller(s)
  4. Add-PSSnapin Citrix.Broker.Admin.V2
  5. Set-BrokerSite -TrustRequestsSentToTheXmlServicePort $true
  6. Now that you have configured the FAS plug-in on the StoreFront server and enabled XML Trust:
  7. Open The StoreFront Management console, select the store you want to configure and choose Manage Authentication Methods
User-added image
  1. Click the checkbox for SAML to enable the authentication method. (See upgrade section in Introduction and Requirements document if SAML authentication method is not displayed). Click on the down arrow and select Identity Provider.
User-added image

Identity Provider Options:
  • SAML Binding – Options Post or Redirect  - Select Post
  • Address – The address to the Identity Provider.  See note below for additional information about this field
  • Signing Certificates – Import the certificate used to sign the SAML tokens. See note below for additional information about this field
 User-added image
 
Note – Address field: This is not necessarily the FQDN of the ADFS server. It is the name of the service. To verify the service name in ADFS, open the AD FS console, select Service, and click on Edit Federation Service
 
User-added image
  1. It should match the Federation Service Name.
User-added image
Note - Signing Certificate: The signing certificate can be retrieved from the ADFS server. Open the AD FS Console, Select Certificates, right click on the Token-signing certificate and choose View Certificate. Once the certificate is open you can select Copy to File from the Details tab to export the certificate. Once exported, you can copy to the Storefront server and import.
 
User-added image
 
  1. Next, Select Service Provider Option.
User-added image
  • Service Provider Identifier – The Storefront store that is using SAML.  To configure the store name add Auth to the store name. Example:
  • Store name:                                     https://sfserver.domain.com /Citrix/local
  • Service Provider Identifier:           https://sfserver.domain.com /Citrix/localAuth
User-added image
 
Create a Relying Party Trust in ADFS : 
 
  1. From the AD FS Console, select Relying Party Trust and in the actions pane select Add Relying Party Trust
User-added imageUser-added image

 
 
  1. At the initial screen hit Start
  2. At the Data Source screen select Enter Data about the relying party manually and click Next
User-added image
  1. Enter a Display Name and hit Next
  2. At the Chose Profile Screen select AD FS  profile
User-added image
 
  1. Click Next
User-added image
 
  1. In the Configure URL screen Select Enable support for SAML 2.0 WebSSO protocol. Under the relying party SAML URL enter the StoreFront address with Auth added at the end. See screenshot below
User-added image
  1. In the Configure Identifiers screen, enter the StoreFront base URL and click Add
User-added image
  1. On the multi-factor authentication screen click Next
  2. On the Choose Issuance Authorization Rules screen, select Permit all users access to relying party and click Next
  3. On the Ready to Add Trust Screen hit Next
  4. On the Finish screen, make sure that the Open the Edit Claim checkbox is checked and hit Close
User-added image
  1. Next we need to add a Claims Rule. Make sure to select the Issuance Transform Rules and click on Add Rule
User-added image
  1. Select Send LDAP Attributes as Claims and hit Next
User-added image
  1. Use the information below to complete the fields.
  • Claim rule name: UPN to Name ID
  • Attribute store: Active Directory
  • LDAP Attribute: User-Principal-Name
  • Outgoing Claim Type: Name ID
User-added image
  1. Click OK
User-added image