ADFS (SSO) Integration with Automaton Anywhere Enterprise
We know how interesting and challenging to get SSO integrated with any application. I recently configured ADFS with Automation Anywhere Enterprise tool and following are the steps and configurations. SSO was not supported in Automation Anywhere 10.x versions and 11.x onwards SAML 2.0 support.
- Once the installation of Automation Anywhere Enterprise (AAE) completed, following Control Room window popup for configuration. Its important to know that we will not be able to switch or revert the authentication method in AAE once its configured until version 11.3.3. It will need a complete reinstallation to switch the authentication method.
- Copy the content from FederationMetadata.xml (https://adfsServerURL/federationmetadata/2007-06/federationmetadata.xml) and input as ‘SAML Metadata’ value.
Also provide the ‘Unique entity ID for control room(service provider)’. This value must match with Identifier name in ADFS relying party trust.
‘Encrypt SAML Assertion’ is optional.
- Click Next and you will get following screen where the AAE Control Room metadata is provided for ADFS relying party configuration. Copy the metadata and save it as xml file.
- Now go to ADFS to create Relying party trust for AAE Control Room. Right click on ‘Relying party trusts’ in ADFS console and ‘Add relying party trust wizard’.
Make sure ‘Claims aware’ is selected, then click ‘Start’.
- Here chose ‘Import data about the relying party from a file’ and browse to the xml file created in Step 3.
- In next screen provide the ‘Unique entity ID for control room(service provider)’ from Step 2.
- In ‘Access control policy’, chose permit everyone.
- Keep check box selected for ‘Configure claims issuance policy for this application’ and finish the wizard.
- Now right click on the relying party created and chose ‘Edit claim issuance policy…’. Click on ‘Add Rule’. Chose the claim rule template value as ‘Send LDAP Attributes as Claims’
- Give some name as claim rule and chose Active Directory as LDAP store. Ensure following are the mapping of LDAP attributes to outgoing claim types. The value in the right side (outgoing claim types) are case sensitive.
E-Mail-Addresses E-Mail Address
E-Mail-Addresses EmailAddress
E-Mail-Addresses Name ID
SAM-Account-Name UserID
Given-Name FirstName
Surname LastName
- Now again right click on the relying party created and chose ‘Edit claim issuance policy…’. Click on ‘Add Rule’. Chose the claim rule template value as ‘Transform an incoming claim’.
- Give a claim rule name and chose values as follows and click finish.
Incoming claim type 🡪 E-Mail Address
Outgoing claim type 🡪 Name ID
Outgoing name ID format 🡪 Email
Select ‘Pass through all claim values’
Comments
Post a Comment