Configuring Single Sign-On with Active Directory Federation Services
Before you get started
Complete these initial setup steps:
- Enable RelayState for iDP-initiated sign on by following the instructions here. The location varies depending on the version of ADFS that is being using.
- Restart the ADFS service so the changes are applied.
Adding a Gallery Access Control Profile
- Open Administrative Tools from the Windows Start menu or Control Panel and then open the AD FS Management application.

- Open Services > Certificates in the left hand explorer panel.

- Double-click on the Token-signing certificate that you want to use.

- Click on the Details tab and click Copy to File…

- Click Next in the export wizard, then select the Base-64 encoded X.509 (.CER) option.

- Save the certificate file to your local file system and then open it in a text editor. This is the certificate that will be used to setup the Gallery access control profile.
- Open the Gallery module.
- Click the settings icon (
) on the home page. - Click Access Control Profiles in the left navigation.
- Click .
- Give it a Name and then select SSO - Requires a username and password for access.

- In the SAML 2.0 Endpoint (HTTP) field, enter the URL to the iDP-initiated sign-on page for your ADFS server. This usually ends in
IdpInitiatedSignOn.aspx. For example, if the SP-initiated sign-on link ishttps://sso-test.brightcove.com/adfs/ls, the iDP-initiated sign-on page ishttps://sso-test.brightcove.com/adfs/ls/IdpInitiatedSignOn.aspx. - Check the My SSO System is ADFS (Active Directory Federation Services) option.
- Copy and paste the certificate that you saved in step 6 into the X.509 Certificate field.

- Click to save the access control profile. The new access control profile should appear in the list of profiles.

- Back in the AD FS Management application, open Relying Party Trusts.

- Click Add Relying Party Trust… in the right hand panel.
- Click Start in the wizard and then paste the Metadata URL that was displayed in step 15 into the Federation metadata address field.

- Click Next and then give your relying party trust a name.

- Continue clicking Next until the Finish step. Uncheck the Configure claims issuance policy for this application checkbox. Click Close.

You should now be able to associate a Portal Experience to the access control profile that was created. After the experience is published, navigating to it should go through the ADFS sign-on workflow.