<fontface="Arial, sans-serif">Now that we have configured SimpleSAMLphp as the service provider, ADFS as the IdP, exchanged metadata between the two and configured some basic claims rules. We are now able to test authentication.</font>
Now that we have configured SimpleSAMLphp as the service provider, ADFS as the IdP, exchanged metadata between the two and configured some basic claims rules. We are now able to test authentication.
1.<fontface="Arial, sans-serif">Navigate to the simplesaml web application for our site https://sso.lewisroberts.com/simplesaml then select the</font>**<font face="Arial, sans-serif">Authentication</font>**<fontface="Arial, sans-serif">tab and click</font>**<font face="Arial, sans-serif">Test configured authentication sources</font>**<fontface="Arial, sans-serif">.
1. Navigate to the simplesaml web application for our site https://sso.lewisroberts.com/simplesaml then select the Authentication tab and click Test configured authentication sources.
2.<fontface="Arial, sans-serif">Select</font>**<font face="Arial, sans-serif">transishun-sp</font>**<fontface="Arial, sans-serif">from the list.
3.<fontface="Arial, sans-serif">You will be immediately sent off to the ADFS server (or Web Application Proxy depending on how your ADFS farm is configured). Enter your user ID in the format “domain\user” or “user@domain”.
</font>**<font face="Arial, sans-serif">NB</font>**<fontface="Arial, sans-serif">: Now, I’ve cheated slightly, I have [enabled Alternate Login ID](https://technet.microsoft.com/en-us/library/dn659436.aspx) so I can sign in with my email address. If you see the article I’ve linked to, Microsoft</font>**<font face="Arial, sans-serif">strongly</font>**<fontface="Arial, sans-serif">recommend using the mail attribute for sign in. As they say;</font>_<font face="Arial, sans-serif"><font style="font-size: 10pt" size="2">One of the benefits of this feature is that it enables you to adopt SaaS providers, such as Office 365 with AAD without modifying your on-premise UPNs. It also enables you to support line-of-business service applications with consumer-provisioned identities.</font></font>_<fontface="Arial, sans-serif"></font>
3. You will be immediately sent off to the ADFS server (or Web Application Proxy depending on how your ADFS farm is configured). Enter your user ID in the format “domain\user” or “user@domain”.
NB: Now, I’ve cheated slightly, I have enabled Alternate Login ID so I can sign in with my email address. If you see the article I’ve linked to, Microsoft strongly recommend using the mail attribute for sign in. As they say;
One of the benefits of this feature is that it enables you to adopt SaaS providers, such as Office 365 with AAD without modifying your on-premise UPNs. It also enables you to support line-of-business service applications with consumer-provisioned identities.
4.<fontface="Arial, sans-serif">Once signed in, you’ll be bounced back to SimpleSAMLphp and shown your claims. If it all went a bit wobbly, double-check everything and then check the Event Viewer for hints as to what could have gone wrong.
4. Once signed in, you’ll be bounced back to SimpleSAMLphp and shown your claims. If it all went a bit wobbly, double-check everything and then check the Event Viewer for hints as to what could have gone wrong.
5.<fontface="Arial, sans-serif">Click</font>**<font face="Arial, sans-serif">Logout</font>**<fontface="Arial, sans-serif">to test this works as expected – this is where the</font><fontface="Arial, sans-serif"><fontstyle="font-size: 10pt"size="2">sign.logout</font></font><fontface="Arial, sans-serif">declaration in the Service Provider configuration becomes relevant. ADFS</font> _<fontface="Arial, sans-serif">requires</font>_ <fontface="Arial, sans-serif">the logout to be signed.
5. Click Logout to test this works as expected – this is where the sign.logout declaration in the Service Provider configuration becomes relevant. ADFS requires the logout to be signed.
6.<fontface="Arial, sans-serif">Let’s add another claim using the</font>**<font face="Arial, sans-serif">Send Group Membership as a Claim</font>**<fontface="Arial, sans-serif">template just to get a little more understanding of what’s happening.