SSO with Microsoft AD FS is available on Postman Enterprise plans.
To configure SSO with Microsoft Active Directory Federation Services (AD FS), you can use your Microsoft AD FS server. You must be an administrator in both Microsoft AD FS and Postman to configure SSO for your team.
Before you configure SSO with Microsoft AD FS, you must create the following:
After you meet these minimum requirements, install Microsoft AD FS on your server. To configure and install Microsoft AD FS, see Deploy and configure AD FS in the Microsoft Knowledge Base.
Before configuring your server in Microsoft AD FS, you must configure SSO in Postman. When choosing the Authentication Type, select AD FS. Name your authentication and Continue.
To continue configuring your server, complete the following tasks in order:
A relying party trust defines the connection between Microsoft AD FS and Postman.
Open AD FS Management on your computer.
Select the Relying Party Trusts folder.
On the Actions sidebar, select Add Relying Party Trust to start the configuration wizard for a new trust.
In the Welcome screen, select Start.
In the Select Data Source screen, select Enter data about the party manually and then select Next.
In the Specify Display Name screen, enter a display name you'll recognize later and then select Next. You can optionally add notes.
In the Choose Profile screen, select AD FS profile and then select Next.
In the Configure Certificate screen, upload the Encryption Certificate downloaded from Postman or use the default certificate settings, and then select Next.
In the Configure URL screen, select Enable support for the SAML 2.0 WebSSO protocol. Take the ACS URL from Postman and add it as your Relying party SAML 2.0 SSO service URL, and then select Next.
In the Configure Identifiers screen, take the Entity ID from Postman and add it as your Relying party trust identifier. Select Add, and then select Next.
In the Configure Multi-factor Authentication Now? screen, select I do not want to configure multi-factor authentication settings for this relying party trust at this time.
In the Choose Issuance Authorization Rules screen, select Permit all users to access this relying party and then select Next.
In the Ready to Add Trust screen, review your settings and then select Next.
In the Finish screen, select Close to exit and open the Claim Rules editor.
After you create a relying party trust, you can create two claim rules.
Open AD FS Management on your computer.
Select the Relying Party Trusts folder, and then select the relying party trust you created.
On the Actions sidebar, select Edit Claim Rules to start the configuration wizard for a new rule.
Select Add Rule to create a new rule.
In the Select Rule Template screen, select Send LDAP Attributes as Claims as the claim rule template, and then select Next.
In the Configure Rule screen, enter a claim rule name you'll recognize later. Select Active Directory as the attribute store. In the LDAP Attribute column, select E-Mail Addresses. In the Outgoing Claim Type column, select E-Mail Address. Then select Finish.
Select Add Rule to create another new rule.
In the Select Rule Template screen, select Transform an Incoming Claim as the claim rule template, and then select Next.
In the Configure Rule screen, enter a claim rule name you'll recognize later. Select E-mail Address as the incoming claim type. Select Name ID as the outgoing claim type. Select Email as the outgoing name ID format. Select Pass through all claim values. Then select Finish.
Select Apply, and then select OK to save the new rules.
To change the hash algorithm for the relying party trust, do the following:
Open AD FS Management on your computer.
Select the Relying Party Trusts folder, and then select the relying party trust you created.
In the Actions sidebar, select Properties.
Select the Advanced tab. Select SHA-1 as the secure hash algorithm.
Select Apply, and then select OK.
Enable the RelayState parameter on your Microsoft AD FS servers, and then restart your service.
Open the configuration file.
For Microsoft AD FS 2.0, open the following file in a text editor:
%systemroot%\inetpub\adfs\ls\web.config
For Microsoft AD FS 3.0, open the following file in a text editor:
%systemroot%\ADFS\Microsoft.IdentityServer.Servicehost.exe.config
In the <microsoft.identityServer.web>
section, add a line for <useRelayStateForIdpInitiatedSignOn enabled="true" />
as follows, and then save the change:
<microsoft.identityServer.web>
...
<useRelayStateForIdpInitiatedSignOn enabled="true" />
</microsoft.identityServer.web>
For Microsoft AD FS 2.0, run IISReset
to restart IIS.
For both Microsoft AD FS 2.0 and 3.0, restart the Active Directory Federation Services (adfssrv
) service.
If you're using Microsoft AD FS 3.0 you only need to restart the Active Directory Federation Services (
adfssrv
) service on your Microsoft AD FS 3.0 servers, not the WAP servers.
After you configure your server, submit your identity provider's (IdP) details to Postman.
https://<federation service name>/federationmetadata/2007-06/federationMetadata.xml
.Last modified: 2024/07/24