Prerequisites
Before you begin configuring AD FS, make sure that:
- You have a Windows Server installed with AD FS 3.0 to serve as a federation server.
- You are logged on to the management console as a Cloud App Security global administrator. For details, see Administrator and Role.
Setting ADFS
- On the ADFS server, go to Start > All Programs > Administrative Tools > ADFS Management.
Click the image to enlarge.
- On the AD FS management console, select the AD FS root folder, click on the Actions menu, and then choose
Add Relying Party Trust
.Click the image to enlarge.
- Complete settings for each screen in the Add Relying Party Trust wizard.
- On the Welcome screen, click Start.
Click the image to enlarge.
- Select Enter data about the relying party manually, and then click Next.
Click the image to enlarge.
- Specify a display name (e.g. Trend Micro Cloud App Security), and click Next.
Click the image to enlarge.
- Select ADFS profile.
Click the image to enlarge.
- Click Next.
No encryption certificate is required, and HTTPS will be used for communication between Trend Micro Cloud App Security and federation servers.
Click the image to enlarge.
- Select Enable support for the SAML 2.0 WebSSO protocol, type the relying party SAML 2.0 SSO service URL, and then click Next.
The SAML 2.0 SSO service URL is Cloud App Security_admin_site/ssoLogin depending on your serving site. For example, if the URL of your Cloud App Security management console in the address bar is "https://admin-eu.tmcas.trendmicro.com" after logon, the SAML 2.0 SSO service URL is https://admin-eu.tmcas.trendmicro.com/ssoLogin.
Click the image to enlarge.
- Provide the identifier in the Relying party trust identifier field, click Add, and then click Next.
This is also referred to as Application Identifier on the Cloud App Security management console.
Click the image to enlarge.
- On the "Configure Multifactor Authentication Now?" screen, choose the default settings.
The default setting is set to "I do not want to configure multi-factor authentication settings for the relying party trust at this time."
Click the image to enlarge.
- Select Permit all users to access this relying party, and then click Next.
Click the image to enlarge.
- Click Next.
Click the image to enlarge.
- Click Close.
Click the image to enlarge.
Keep the option ticked to launch the Claim Rules window to proceed in adding rules to the newly-created Relying Party Trust.
- On the Welcome screen, click Start.
- Once the "Edit Claim Issuance Policy for Trend Micro Cloud App Security Administrator Console" dialog box opens, go to the Issuance Transform Rules tab, and click Add Rule.
Click the image to enlarge.
- Complete settings for each screen in the Add Transform Claim Rule wizard.
- For the Claim rule template drop-down, select Send LDAP Attributes as Claims and click Next.
Click the image to enlarge.
- On the Configure Rule tab, specify a claim rule name, and then select Active Directory from the Attribute store drop-down.
- Select the following LDAP attributes and specify an outgoing claim type for each attribute:
LDAP Attribute Outgoing Claim TYpe E-Mail-Addresses E-Mail Address User-Principal-Name Name Click the image to enlarge.
- Click Finish.
- For the Claim rule template drop-down, select Send LDAP Attributes as Claims and click Next.
- Click Add Rule.
Click the image to enlarge.
- Complete settings on each tab of the Add Transform Claim Rule Wizard screen.
- From the Claim rule template drop-down, select Transform an Incoming Claim, and then click Next.
- On the Configure Claim Rule tab, specify the following:
- Claim rule name: provide a claim rule name
- Incoming claim type: select or type "E-Mail Address"
- Outgoing name ID format: Email
- Select Pass through all claim values, and click Finish.
Click the image to enlarge.
- Click Apply, and then click OK. The newly-created rules will appear on the Issuance Transform Rules tab.
Click the image to enlarge.
- Collect the single sign-on logon and logoff URLs, and obtain a certificate for AD FS ignature validation on the Cloud App Security managemeng console.
- On the AD FS management console, go to AD FS > Service > Endpoints.
Click the image to enlarge.
- Look for the SAML 2.0/WS-Federation type endpoint and collect the URL path.
The URL path will be used when you configure logon and logoff URLs on Trend Micro Cloud App Security.
- Logon URL: <adfs_domain_name>/adfs/ls/
- Logoff URL: <adfs_domain_name>/adfs/ls/?wa=wsignout1.0
Click the image to enlarge.
- Go to AD FS > Service > Certificates.
Click the image to enlarge.
- Look for the Token-signing certificate, right-click it, and then select View Certificate.
Click the image to enlarge.
- Click the Details tab, and click Copy to File.
Click the image to enlarge.
- Using the Certificate export wizard, select Base-64 Encoded X.509 (.CER).
Click the image to enlarge.
- Assign a name to the file to complete the export of the certificate into a file, and then click Next.
Click the image to enlarge.
- Click Finish.
The exported certificate will be used when configuring single sign-on (SSO) in Trend Micro Cloud App Security (CAS) web console.
- On the AD FS management console, go to AD FS > Service > Endpoints.
- Configure the authentication methods.
- On the AD FS management console, go to AD FS > Authentication Policies.
Click the image to enlarge.
- Under the Authentication Policies area, click Edit next to Global Settings under Primary Authentication.
Click the image to enlarge.
- On the Primary tab, select the following:
- Under Extranet section:
- Forms Authentication
- Certificate Authentication
- Under Intranet section:
- Forms Authentication
- Windows Authentication
Click the image to enlarge.
- Under Extranet section:
- Click OK.
- On the AD FS management console, go to AD FS > Authentication Policies.