Setting Up ADFS
- Create a new Service Provider trust in ADFS:
- Open the ADFS Management tool.This is typically located under Control Panel > System and Security > Administrative Tools.
- In the left folder list, right click Relying Party Trusts and left click Add Relying Party Trust…
The Add Relying Party Trust Wizard appears.
- On the Welcome screen, click Claims aware, then click Start.
- On the Select Data Source screen, click Import data about the relying party from a file and upload your Lookout Service Provider metadata text file.This file is provided by Lookout during setup.
- On the Specify Display Name screen, enter a Display name, then click Next.
- On the Choose Access Control Policy screen, select one or more policies, then click Next.This configures your Relying Party with the necessary Lookout certificates and endpoints:
- Click Next.
- Click Next again, then click Finish.Your configuration appears in the Relying Party Trusts list.
- Open the ADFS Management tool.
- Configure and map the required Lookout attributes in the outgoing SAML assertion:
- Right click your Lookout configuration and click Edit Claim Issuance Policy > Add Rule.
- Select Send LDAP Attributes as Claims, then click Next.
- Name the rule
lookout-ldap-attributes
, then add the following attributes:LDAP Attribute Outgoing Claim Type Description Surname
sn
The user's last name. Given-Name
givenname
The user's first name. User-Principal-Name
mail
The user's email. - Click OK.
- Configure the Lookout
ent
attribute:- Click Add Rule, then select Send Claims Using a Custom Rule and click Next.
- Name the rule
lookout-ent
and copy the following into the Custom rule body, replacing the value with your Lookout ent GUID.This value is provided to you by Lookout:=> issue(Type = "ent", Value = "<Your Lookout ent GUID>");
For example:
- Click OK.
- Configure the Lookout
upn
attribute:- Click Add Rule, then select Send Claims Using a Custom Rule and click Next.
- Name the rule
lookout-upn
and copy the following into the Custom rule body, using your own Windows account name:c:[Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/<windowsaccountname>", Issuer == "AD AUTHORITY"] => issue(store = "Active Directory", types = ("upn"), query = ";mail;{0}", param = c.Value);
For example:
- Click OK.
- Click New Rule, then select Transfer an Incoming Claim and click Next.
- Name the rule
lookout-upn-to-nameId
and set the following:Field Value Incoming claim type: UPN Outgoing claim type: Name ID Outgoing name ID format: Email Pass through all claim values (Selected) - Click OK.
- Configure the Lookout
memberof
attribute.This consists of three separate rules:- Click Add Rule, then select Send Claims Using a Custom Rule and click Next.
- Name the rule
lookout-memberof-phase1
and copy the following into the Custom rule body, using your own Windows account name:c:[Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/<windowsaccountname>", Issuer == "AD AUTHORITY"] => add(store = "Active Directory", types = ("http://test.com/phase1"), query = ";memberOf;{0}", param = c.Value);
For example:
- Click Finish.
- Click Add Rule.
- Select Send Claims Using a Custom Rule and click Next.
- Name the rule
lookout-memberof-phase2
and copy the following into the Custom rule body:c:[Type == "http://test.com/phase1"] => add(Type = "http://test.com/phase2", Value = RegExReplace(c.Value, ",[^\n]*", ""));
For example:
- Click Finish.
- Click Add Rule.
- Select Send Claims Using a Custom Rule and click Next.
- Name the rule
lookout-memberof
and copy the following into the Custom rule body:c:[Type == "http://test.com/phase2"] => issue(Type = "memberof", Value = RegExReplace(c.Value, "^CN=", ""));
For example:
- Click Finish.