diff --git a/src/content/docs/cloudflare-one/identity/idp-integration/adfs.mdx b/src/content/docs/cloudflare-one/identity/idp-integration/adfs.mdx index 2c6ad37646b41f6..76049cd16258ff2 100644 --- a/src/content/docs/cloudflare-one/identity/idp-integration/adfs.mdx +++ b/src/content/docs/cloudflare-one/identity/idp-integration/adfs.mdx @@ -17,10 +17,10 @@ Active Directory is a directory service developed by Microsoft for Windows domai To get started, you need: -- An Active Directory Domain Controller where all users have an email attribute -- Generic SAML enabled for your Access Identity Provider (IdP) +- An Active Directory Domain Controller where all users have an email attribute. +- Generic SAML enabled for your Access Identity Provider (IdP). - A Microsoft server running with Active Directory Federation Services (AD FS) installed. All screenshots in these instructions are for Server 2012R2. Similar steps will work for newer versions. -- A browser safe certificate for Active Directory Federation Services (AD FS) +- A browser safe certificate for Active Directory Federation Services (AD FS). Once you fulfill the requirements above, you are ready to begin. Installation and basic configuration of Active Directory Federation Services (AD FS) is outside the scope of this guide. A detailed guide can be found in a [Microsoft KB](). @@ -106,6 +106,11 @@ To create Claim Rules: 6. Select **E-mail-Addresses** from the **LDAP Attribute** and **Outgoing Claim Type** drop-down lists. +:::note[AD FS groups] + +If you wish to use AD FS groups in your SAML claims, use `token-groups - unqualified names` instead of `is-member-of-DL`. Using `is-member-of-DL` will display the group in the form of LDAP paths, whereas `token-groups - unqualified names` will return only the group name. +::: + 7. Select **OK**. You return to the **Choose Rule Type** step. 8. Select **Transform an Incoming Claim** from the **Claim rule template** drop-down list to create the second rule.