mirror of
https://github.com/goauthentik/authentik
synced 2026-05-05 06:32:15 +02:00
website/docs: draft of new WS-Fed provider docs (#20091)
* first draft * add table of parms * tweak * add section about certs * a little more content * more info on wa * new procedurla file and edit sidebar * tweaks * dewi and jens edits * tweak to remove bullet * add docs link to the Rel Notes * dewi edits thx * ooops missed that last edit
This commit is contained in:
@@ -0,0 +1,38 @@
|
||||
---
|
||||
title: Create a WS-Federation provider
|
||||
---
|
||||
|
||||
An authentik WS-Federation provider is typically created as part of an application/provider pair, using the steps below. You can also create a standalone provider, and then later assign an application to use it.
|
||||
|
||||
## Create a WS-Federation provider and application pair
|
||||
|
||||
1. Log in to authentik as an administrator, and open the authentik Admin interface.
|
||||
2. Navigate to **Applications > Applications** and click **Create with provider** to create an application and provider pair.
|
||||
3. On the **New application** page, define the application details, and then click **Next**.
|
||||
4. Select **WS-Federation Provider** as the **Provider Type**, and then click **Next**.
|
||||
5. On the **Configure WS-Federation Provider** page, provide a name for the provider, select an authorization flow, and the two required configuration settings:
|
||||
- **Reply URL**: Enter the application callback URL, where the token should be sent. This is the specific endpoint on an RP (application) where an Identity Provider (STS) sends the security token and authentication response after after a successful log in.
|
||||
- **Realm**: Enter the identifier (string) of the requesting realm; that is, the Relying Party (RP) or application receiving the token. Realm is similar to the SAML 2.0 Entity ID.
|
||||
6. Click **Submit** to create both the application and the provider.
|
||||
|
||||
## Export authentik WS-Federation provider metadata
|
||||
|
||||
After an authentik WS-Federation provider has been created via any of the above methods, you can access its metadata in one of two ways:
|
||||
|
||||
### Download authentik metadata for a WS-Federation provider
|
||||
|
||||
To download the metadata of an authentik WS-Federation provider, follow these steps:
|
||||
|
||||
1. Log in to authentik as an administrator, and open the authentik Admin interface.
|
||||
2. Navigate to **Applications > Providers**.
|
||||
3. Click the name of the provider you want metadata for.
|
||||
4. On the **Overview** tab, in the **Related objects** section, click on **Download** under **Metadata**. This will download the metadata XML file for that provider.
|
||||
|
||||
### Access the Metadata tab for a WS-Federation provider
|
||||
|
||||
To view and optionally download the metadata of an authentik WS-Federation provider, follow these steps:
|
||||
|
||||
1. Log in to authentik as an administrator, and open the authentik Admin interface.
|
||||
2. Navigate to **Applications > Providers**.
|
||||
3. Click the name of the provider you want metadata for, and then click the the **Metadata** tab.
|
||||
4. The metadata for the provider will be shown in a codebox. You can optionally use the **Download** button to obtain the metadata as a file.
|
||||
53
website/docs/add-secure-apps/providers/wsfed/index.md
Normal file
53
website/docs/add-secure-apps/providers/wsfed/index.md
Normal file
@@ -0,0 +1,53 @@
|
||||
---
|
||||
title: WS-Federation Provider
|
||||
---
|
||||
|
||||
The WS-Federation provider is used to integrate with applications and service providers that use [WS-Federation protocol](https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-adfsod/204de335-ea34-4f9b-ae73-8b7d4c8152d1). WS-Fedederation is an XML-based identity federation protocol that uses token exchange for federated Single Sign-On (SSO) and IdP authentication, specifically for Windows applications such as Sharepoint.
|
||||
|
||||
There are similarities between WS-Federation and SAML protocols, but there are several key differences in terminology, most importantly:
|
||||
|
||||
- WS-Federation term: **STS (Security Token Service)**
|
||||
- SAML term: **IdP (Identity Provider)**
|
||||
|
||||
:::info SAML2 token support
|
||||
Note that we only support the SAML2 token type within WS-Federation providers, and that using the WS-Federation provider with Entra ID is not supported because Entra ID requires a SAML 1.0 token.
|
||||
:::
|
||||
|
||||
## Supported URL request parameters
|
||||
|
||||
The following URL request parameters are supported in the authentik WS-Federation provider:
|
||||
|
||||
- **wa**: The is a required parameter that represents the action being requested, typically wsignin1.0 for signing in. The parameter's value tells the Security Token Service (STS) which operation to execute.
|
||||
- **wtrealm**: The unique identifier (realm) of the Relying Party (RP) or application requesting the security token, for example, urn:my-app:rp. It defines the trust relationship between the RP and the Identity Provider (IdP) and indicates which application is initiating the WS-Federation request. This is a required query parameter that tells the Security Token Service (STS) which relying party the token is intended for.
|
||||
- **wreply**: The target URL to which the Identity Provider (IdP) sends the WS-Federation response containing the security token. This URL is supplied by the Service Provider (SP). authentik verifies that the received `wreply` parameter matches the URL configured by the administrator and stored in the database.
|
||||
- **wctx**: A context value that is used to maintain state between the Relying Party (RP) and the Identity Provider (IdP) across redirects. It serves the same purpose as the `RelayState` parameter in SAML. The RP includes this value in the authentication request, and the IdP returns it unchanged in the response, allowing the RP to validate and restore the original session or request context.
|
||||
|
||||
## WS-Federation bindings and endpoints
|
||||
|
||||
_Bindings_ define how an Identity Provider (IdP) and the WS-Federation STS (Security Token Service), or IdP in SAML terms, communicate; how messages are transported over network protocols, specifying transport (like HTTP), encoding, and security detail that allow WS-Federation to facilitate secure identity sharing across systems. Both the IdP and STS define various endpoints in their metadata, each associated with a specific WS-Federation binding.
|
||||
|
||||
| Endpoint | URL |
|
||||
| -------- | --------------------- |
|
||||
| SSO/SLO | `/application/wsfed/` |
|
||||
|
||||
## WS-Federation metadata
|
||||
|
||||
Using metadata ensures that WS-Federation single sign-on works reliably by exchanging and maintaining identity and connection information. WS-Federation metadata is an XML document that defines how IdPs and SPs securely interact for authentication. It includes information such as endpoints, bindings, certificates, and unique identifiers. The metadata is what you provide the application to configure it for authenticating with authentik.
|
||||
|
||||
You can [export WS-Federation metadata](./create-wsfed-provider.md#export-authentik-ws-federation-provider-metadata) from an authentik WS-Federation provider to an STS to automatically provide important endpoint and certificate information to the SP.
|
||||
|
||||
## Certificates
|
||||
|
||||
The certificates used with WS-Federation to sign Request Security Token Response (RSTR), which contains the assertion, are the same certificates that are used by SAML.
|
||||
|
||||
For details, refer to our [SAML certificates documentation](../saml/index.md#certificates).
|
||||
|
||||
## WS-Federation property mappings
|
||||
|
||||
Property mappings are used during the authentication process to align, or "map", user attributes values between the SP and STS (Security Token Service), the latter being the equivalent of SAML's IdP.
|
||||
|
||||
The same property mappings that are used in WS-Federation are used in SAML. For details, refer to our [SAML property mapping documentation](../saml/index.md#certificates).
|
||||
|
||||
## Attributes for WS-Federation
|
||||
|
||||
Ws-Federation and SAML also share the use of the [NameID](../saml/index.md#nameid) and the [AuthnContextClassRef](../saml/index.md#authncontextclassref) attributes.
|
||||
Reference in New Issue
Block a user