Configuring Workfront with SAML 2.0 Using ADFS

As a system administrator, you can integrate Workfront with a SAML 2.0 solution for single sign-on while using Active Directory Federation Services (ADFS).

This guide focuses on setting up ADFS without auto provisioning or attribute mappings. We recommend that you complete the setup and test it prior to setting up any auto provisioning.  

Enabling Authentication to Workfront with SAML 2.0

To enable authentication to the Workfront web application and the Workfront mobile application with SAML 2.0, complete the following sections:

Retrieving the Workfront SSO Metadata File

  1. Navigate to the Setup area in the Global Navigation Bar.
  2. Expand System, then click Single Sign-On (SSO).
  3. In the Type drop-down menu, select SAML 2.0.
  4. Copy the URL in the Metadata URL field. (This URL will be different from the one shown.)
  5. Continue to the following section "Configuring Relying Party Trusts."

Configuring Relying Party Trusts

    1. Open the ADFS Manager using the Windows server 2008 R2 (version may vary).
    2. Navigate to Start.
    3. Click Administration Tools.
    4. Click ADFS 2.0 Management.
    5. Select ADFS and expand Trust Relationships.
    6. Right-click Relying Party Trusts, and select Add Relying Party Trust to launch the Add Relying Party Trust Wizard.
    7. From the Welcome Page, select Start. This opens the Select Date Source section.
    8. Paste the metadata URL from Workfront.
    9. Click Next.
    10. Click OK to acknowledge the warning message. This opens the Specify Display Name section.
    11. Add a Display Name and Notes to distinguish the Trust, then click Next.
    12. Select Permit all user to access this relying party (Or None if you want to configure this later).
    13. Click Next. This takes you to the Ready to Add Trust section.
    14. Continue to the following section "Configuring Claim Rules."

Configuring Claim Rules

      1. Click Next in the Ready to Add Trust sectionthen ensure that the Open the Edit Claim Rules dialog box option is selected. This will allow you to edit Claim Rules in a future step.
      2. Click Close.
      3. Click Add Rule.
      4. Select Send LDAP Attribute as Claims.
      5. Click Next to display the Configure Claim Rule step.
      6. Specify the following minimum requirements to configure the claim rule: (This will go in the Federation ID on the user setup and is used to distinguish who is logging in.)
        Claim rule name: Specify a name for the claim rule. For example, "Workfront."
        Attribute store: Select Active Directory from the drop-down menu.
        LDAP Attribute: This can be any type of attribute. We recommend using SAM-Account-Name for this attribute. 
        Outgoing Claim Type: You must select Name ID as the outgoing claim type.
      7. (Optional) In order to establish auto provisioning, add the following additional claims in both the LDAP Attribute and Outgoing Claim Type:
        Given Name
        E-Mail Address
      8. Click Finish and then OK on the next screen.
      9. Right-click the new Claim, and select Properties.
      10. Select the Advanced Tab. And under Secure Hash Algorithm select SHA-1 or SHA-256.

NOTE What you select under Secure Hash Algorithm here must match the Secure Hash Algorithm field in Workfront under Setup > System > Single Sign-ON (SSO).

11. Continue to the following section "Uploading the Metadata File and Testing the Connection."

Uploading the Metadata File and Testing the Connection

  1. Open a browser and navigate to https://<Your Server>/FederationMetadata/2007-06/FederationMetadata.xml.
    This should download a Metadata file FederationMetadata.xml file.
  2. Click Choose File under Populate fields from Identity Provider Metadata, and select the FederationMetadata.xml file.
  3. (Optional) If the certificate information did not populate with the metadata file, you can upload a file separately. Select Choose File in the Certificate section.
  4. Click Test Connection. If set up correctly, you should see a page similar to the one shown below:
    NOTE If you want to set up attribute mapping, ensure that you copy the attributes from the Test Connection into the Directory Attribute. For more information, see Mapping User Attributes.
  5. Select Admin Exemption to allow system administrators to log in using Workfront credentials with the bypass url. Bookmarks pointing to <Domain> bypass the redirect.
  6. Select the Enable box to enable the configuration.
  7. Click Save.

Updating Users for SSO

Following this guide, the SSO Username will be their Active Directory Username

As a system administrator, you can bulk update users for SSO. For more information about updating users for SSO, see "Updating Users for SSO."

As a system administrator, you can also manually assign a Federation ID editing the user's profile and completing the Federation ID field. For more information about editing a user, see "Editing User Accounts."

NOTE When editing users' profiles to include a Federation ID, selecting Only Allow SAML 2.0 Authentication removes the ability to log in to Workfront using the bypass url (<Domain> 

This article last updated on 2019-04-12 16:00:29 UTC