Configure settings in ADFS server
To configure settings in ADFS server, follow these steps:
1. Remote Desktop Protocol (RDP) or login into ADFS Server.
2. Launch AD FS Console from Server Manager, then click on Tools > AD FS Management.
3. Click Relying Party Trusts > Add Relying Party Trust.
4. Select Claims Aware and click Start.
5. Select Enter data about relying party manually and click Next.
6. Enter Display Name as SureMDM and click Next.
7. In Configure Certificate section, browse the certificate (adfs_xxxxxxx.cer) downloaded in step no.4, Configure SSO with ADFS.
8. Select Enable support for the SAML 2.0 WebSSO protocol and enter the URL as
https://<SureMDM Server URL>/console/ssoconsumer/<SureMDM Account ID>
Note: Admin should enter their SureMDM Server Path and Account ID into the above-mentioned URL.
9. Enter urn:42gears:suremdm:SAML2ServiceProvider in Relying party trust identifier field and click Add.
10. Select Permit everyone or select an option from the list and click Next > Close.
11. In the AD FS Console, right-click SureMDM and select Properties.
12. Select Signature tab and click Add.
13. Select the certificate (adfs_xxxxxxx.cer) downloaded in Configure SSO with ADFS,step no.4 and click Apply.
14. Select Endpoints tab and click Add SAML.
15. Select Endpoint type as SAML Logout and Trusted URL as
https://<SureMDM Server URL>/console/ssoconsumer/<SureMDM Account ID>
Note: Admin should enter their Server Path and Account ID into the above-mentioned URL.
16. Click OK.
17. In the Edit Claim Issuance Policy prompt, click Add Rule.
18. Click Next.
19. In the Claim rule name field enter SureMDM, select Attribute store as Active Directory and choose the mappings for LDAP Attribute and Outgoing Claim Type and click Finish.
20. Click OK.
21. Use the URL https://<SureMDM Server URL>/console/ssologin/<SureMDM Account ID> for SSO user login.
Note: Admin should enter their Server URL and Account ID into the above-mentioned URL.