Skip to content

Application Group Configuration

To use Microsoft AD FS as an authentication provider for Huddo Boards, you will need to configure an Application Group.

  1. Open ADFS Management Console

    Click Add Application Group

    add

  2. Enter a name for the Application Group

    Name: Huddo Boards

    Template: Server application accessing a web API

    Click Next

    template

  3. Server application

    Tip

    Copy the Client Identifier

    This will be used as the MSAD_CLIENT_ID in the Boards configuration and the Identifier set in the Web API configuration later

    Set the redirect URI to https://<BOARDS_URL>/auth/msad/callback and click Add. For example:

    • https://boards.example.com/auth/msad/callback or
    • https://connections.example.com/boards/auth/msad/callback

    server

  4. Enable Generate a shared secret

    Warning

    Copy the newly generated client secret - this will not be shown again

    This will be used as the MSAD_CLIENT_SECRET in the Boards configuration

    Click Next

    secret

  5. Web API - add the Identifier

    Identifier: <MSAD_CLIENT_ID> (from step 3)

    Note

    This must match the Client Identifier set previously in order for the id_token generated at login to have additional claims and access the user name and email.

    Click Add, then Next

    web

  6. Access Control Policy

    Click Next

    access-control-policy

  7. Select the following scopes:

    • allatclaims - this must be set to include all claims in the id_token
    • openid - required for authentication
    • email - required for the user's email
    • profile - required for the user's name

    Click Next

    scopes

  8. Review the configration and click Next

    review

  9. Click Close

    close

  10. Right click the newly created Application Group and select Properties

    newly-created

  11. Select the Web API

    Click Edit

    properties

  12. Click the Issuance Transform Rules tab

    Click Add Rule

    rules

  13. Select the Send LDAP Attributes as Claims template

    Click Next

    template

  14. Configure claim rule

    Name: LDAP Attributes

    Select the attribute store - Active Directory

    Map the LDAP attributes to outgoing claim types (type these in manually)

    LDAP Attribute Outgoing Claim Type
    Display-Name displayName
    E-Mail-Addresses email
    objectGUID objectGUID

    Warning

    The Outgoing Claim Type must be typed exactly as shown for Boards to use these values.

    Click Finish

    rule

  15. Click OK to save the changes

    save

  16. Click OK to close the Application Group properties

    properties-ok