Skip to content

Commit 754aa22

Browse files
[CF1] adfs groups callout (#19816)
* [CF1] adfs groups callout * better placement
1 parent 21ad683 commit 754aa22

File tree

1 file changed

+8
-3
lines changed
  • src/content/docs/cloudflare-one/identity/idp-integration

1 file changed

+8
-3
lines changed

src/content/docs/cloudflare-one/identity/idp-integration/adfs.mdx

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,10 +17,10 @@ Active Directory is a directory service developed by Microsoft for Windows domai
1717

1818
To get started, you need:
1919

20-
- An Active Directory Domain Controller where all users have an email attribute
21-
- Generic SAML enabled for your Access Identity Provider (IdP)
20+
- An Active Directory Domain Controller where all users have an email attribute.
21+
- Generic SAML enabled for your Access Identity Provider (IdP).
2222
- A Microsoft server running with Active Directory Federation Services (AD FS) installed. All screenshots in these instructions are for Server 2012R2. Similar steps will work for newer versions.
23-
- A browser safe certificate for Active Directory Federation Services (AD FS)
23+
- A browser safe certificate for Active Directory Federation Services (AD FS).
2424

2525
Once you fulfill the requirements above, you are ready to begin. Installation and basic configuration of Active Directory Federation Services (AD FS) is outside the scope of this guide. A detailed guide can be found in a [Microsoft KB](<https://docs.microsoft.com/en-us/previous-versions/dynamicscrm-2016/deployment-administrators-guide/gg188612(v=crm.8)>).
2626

@@ -106,6 +106,11 @@ To create Claim Rules:
106106

107107
6. Select **E-mail-Addresses** from the **LDAP Attribute** and **Outgoing Claim Type** drop-down lists.
108108

109+
:::note[AD FS groups]
110+
111+
If you wish to use AD FS groups in your SAML claims, use `token-groups - unqualified names` instead of `is-member-of-DL`. Using `is-member-of-DL` will display the group in the form of LDAP paths, whereas `token-groups - unqualified names` will return only the group name.
112+
:::
113+
109114
7. Select **OK**. You return to the **Choose Rule Type** step.
110115

111116
8. Select **Transform an Incoming Claim** from the **Claim rule template** drop-down list to create the second rule.

0 commit comments

Comments
 (0)