How to Integrate GLUU & ADFS - spring-security

I have a working setup of GLUU referece with customized login and ADFS. Both are working fine individually,
Now I would need to change the primary authentication of ADFS with GLUU, So that the authentication will happen at the GLUU.
Is there any reference to integrate ADFS with GLUU
Ideally ADFS should act a service provider and GLUU will act as a Identity provider. Can someone please help or suggest how to proceed on this.
Thanks in Advance

You can do this as per these guidelines.
Essentially, import the ADFS metadata into GLUU.
Then create an ADFS CP and import the GLUU metadata.
This uses SAML so you need a claims rule for NameID.
Use a claims Transform rule to convert e.g. email to NameID format email.
Then configure e.g. email as the NameID type in GLUU.

Related

ADFS2016 SAML2 to OAUTH2/OIDC

We have an MVC application (<myapp.somedomain.com>) .net 4.5.2 (OWIN/ADAL) that uses ADFS2016 for AuthN/AuthZ via OIDC/OAuth2. Users' credentials and attributes are stored in AD LDS. A client (X) requested to authenticate in the application via their IdP over SAML2. Is this possible WITHOUT making changes to the application?
The flow I am looking for; for this client the app’s URL would be (<myapp.somedomain.com/?client=x>). Our ADFS would recognize and redirect the client to their IdP where they would authenticate and than they would be send back to our ADFS along with some predefined claims. Our ADFS would map these claims to an Id Token / Access Token for our application to use. Am I dreaming or is this indeed feasible?
Any links to articles / documentation on how this could be achieved would be most helpful.
As #Wiktor suggests, you could add a SAML client-side stack to your app.
The other way is to federate ADFS with the SAML IDP.
When the user is redirected to ADFS, they use Home Realm Discovery to either redirect to the SAML IDP or authenticate on ADFS directly.
ADFS should handle the token conversions but you may have to fiddle around with the claims rules.

Kentor AuthServices with ADFS

Can anybody let me know the possibility/steps to use Kentor Authservices with customer ADFS ?
So far we have successfully implemented Kentor library to integrate with customers' Okta setups (Okta as the IdP). We have got another customer requiring their employees to login on our site using its ADFS credentials.
For test purpose, I added another IdP node in the web.config setting login.microsoft.com as "signOnUrl" to post SAML login request, and expected to redirect back to our portal after authentication. But it presented with Microsoft apps options page and stayed there. What should be "entityId" ? How to set "ReturnUrl" etc are blank area for me as of now.
I need to know what direction I should move to enable SSO using customers' adfs with Kentor.
On the ADFS side you can import the AuthServices metadata. It would be on:
https:/xxx/AuthServices/ address.
On the Kentor side, use the ADFS metadata:
https://my-adfs/FederationMetadata/2007-06/FederationMetadata.xml
The entityID, endpoints etc. are all there.

IdentityServer4 using Client Credentials Grant Type

We are setting up an Identity Server 4 instance and one of the GrantTypes we wish to use is the Client Credentials Grant Type.
Is there a way we can link Client Credentials up to a use an AspNetIdentity user so we can get the claims and users details back for the client credentials provided?
Thanks in Advance
The Client Credentials grant type does not represent a user, it represents an application, so you would not use AspNetIdentity with the client credentials grant type.
If you want to include user specific claims you need to look at one of the grant types which involves user authentication. Examples are available in the quickstarts here. I would advise looking first at the Resource Owner flow and then the OpenID Connect based flows.
The quickstarts also include an example of integration with ASP.Net Identity, that can be seen here

WSO2-OAuth2.0-ExternalAccessToken

I have a unique scenario in which we need to sync external oauth access-token with wso2am-key-manager.
Scenario is as follows, user login to our internal IDP server and IDP server generates access-token upon successful verification of user credentials so now the requirement is the UI(application) should be able to invoke API on wso2am using that access-token which was generated by IDP. So that is only possible if we sync that external-access-token to Wso2am-Key-manager. I am not able fit this requirement with available grant types, password, client-credential as all these grant types generates new access-token which we dont want.
please advise how to achieve it. thank you.
WSO2 API Manager supports to configure external key manager[1].So you can configure your IDP as keymanager to WSO2 APIM
[1] https://docs.wso2.com/display/AM200/Configuring+a+Third-Party+Key+Manager

IdentityServer3 integration with Ping Identity. Is it possible?

We are currently using IdentityServer3 for authentication and authorization with our asp.net MVC(angular.js) and webapi clients. We are about to bring on a new customer that uses PingIdentity for their Single Sign On(SSO). The customer would like to be able to integrate their SSO into our application.
Is this possible with IdentityServer3?
Thanks in advance!
You should be able to leverage the WS-Federation capabilities that both products have to integrate them. IdentityServer3 playing the Service Provider (or: RP) role, the customer playing the Identity Provider (or: IP) role.
Have you looked into KentorIT Authservices? It's a SAML plugin for IdentityServer3. I was able to add OneLogin SAML authentication with this plugin.
-Scott

Resources