This article is a supplement to our main article on SSO (please read that first for context).

This article contains some screenshots which walk you through the process of configuring Skedda SSO with ADFS.

  • In your Server Manager, choose AD FS Management:

  • Choose "Edit Federation Service Properties..."

  • Copy the Federation Service identifier information for entry into the Skedda SSO settings page (as your Identity Provider ID):

  • Get your Base64-encoded certificate key for entry into the Skedda SSO settings page as shown below:

  • You can use a text-editor to copy the Base64 text of the certificate:

  • Next, grab the URL path of your login endpoint which you'll provide as the "Login URL" on the Skedda SSO Settings page:

  • Next, add a new Relying Party Trust for Skedda:

  • The trust should be a Claims-aware trust:

  • Choose the option to enter data about the relying party manually:

  • Type "Skedda" as the display name:

  • In the "Configure Certificate" step, just click next (Skedda expects signed assertions without encryption at this level):

  • Enter the Skedda ACS URL in the "Configure URL" step:

  • Use the Skedda entity id for the "Relying party trust identifier" and make sure you click "Add":

  • Configure the Access Control Policy according to your needs (e.g. permit everyone):

  • Review your settings and click "Next":

  • Finish the wizard and check the option to configure claims:

  • Choose to "Edit Claims Issuance Policy..." for your new Skedda app:

  • Choose "Send LDAP Attributes as Claims" and click Next:

  • Map the attributes as shown below:

Feel free to reach out to our support team if you have any questions on setting up SSO with ADFS!

If you're having trouble getting SSO to work after setting it up, take a look at our SSO Troubleshooting article!

Did this answer your question?