--- layout: article title: ADFS SAML Implementation categories: [login-with-sso] featured: false popular: false hidden: true tags: [sso, saml, adfs] order: --- This article contains **Active Directory Federation Services (AD FS)-specific** help for configuring Login with SSO via SAML 2.0. For help configuring Login with SSO for another IdP, refer to [SAML 2.0 Configuration]({{site.baseurl}}/article/configure-sso-saml/). Configuration involves working simultaneously within the Bitwarden [Business Portal]({{site.baseurl}}/article/about-business-portal/) and the AD FS Server Manager. As you proceed, we recommend having both readily available and completing steps in the order they're documented. {% callout success %} **Already an SSO expert?** Skip the instructions in this article and download screenshots of sample configurations to compare against your own. [{% icon fa-download %} Download Sample]({{site.baseurl}}/files/saml-adfs-sample.zip) {% endcallout %} ## Open the Business Portal If you're coming straight from [SAML 2.0 Configuration]({{site.baseurl}}/article/configure-sso-saml/), you should already have an [Organization ID created]({{site.baseurl}}/article/configure-sso-saml/#step-1-enabling-login-with-sso) and the SSO Configuration screen open. If you don't, refer to that article to create an Organization ID and open your Business Portal to the SSO Configuration section: {% image sso/sso-saml1.png SAML 2.0 Configuration %} You don't need to edit anything on this screen yet, but keep it open for easy reference. ## Create a Relying Party Trust In the AD FS Server Manager, select **Tools** → **AD FS Management** → **Action** → **Add Relying Party Trust**. In the Wizard, make the following selections: 1. On the Welcome screen, select **Claims Aware**. 2. On the Select Data Source screen, select **Enter data about the relying party manually**. 3. On the Specify Display Name screen, enter a Bitwarden-specific display name. 4. On the Configure URL screen, select **Enable support for SAML 2.0 WebSSO protocol**. - In the **Relying party SAML 2.0 SSO service URL** input, enter the Assertion Consumer Service (ACS) URL retrieved from the Bitwarden SSO Configuration screen. For Cloud-hosted customers, this is always `https://sso.bitwarden.com/saml2/your-org-id/Acs`. For self-hosted instances, this is determined by your [configured Server URL]({{site.baseurl}}/article/install-on-premise/#configure-your-domain), for example `https://your.domain.com/sso/saml2/your-org-id/Acs`. 6. On the **Choose Access Control Policy** screen, select the 5. On the **Configure Identifiers** screen, add the SP Entity ID (retrieved from the Bitwarden SSO Configuration screen) as a relying party trust identifier. For Cloud-hosted customers, this is always `https://sso.bitwarden.com/saml2`. For self-hosted instances, this is determined by your [configured Server URL]({{site.baseurl}}/article/install-on-premise/#configure-your-domain), for example `https://your.domain.com/sso/saml2`. 6. On the **Choose Access Control Policy** screen, select the desired policy (by default, **Permit Everyone**). 7. On the **Ready to Add Trust** screen, review your selections. ### Advanced Options Once the Relying Party Trust is created, you can further configure its settings by selecting **Relying Party Trusts** from the left-hand file navigator and selecting the correct display name. #### Hash Algorithm To change the **Secure hash algorithm** (by default, SHA-256), navigate to the **Advanced** tab: {% image sso/cheatsheets/saml-adfs/saml-adfs3.png Set a Secure Hash Algorithm %} #### Endpoint Binding To change the endpoint **Binding** (by default, POST), navigate to the **Endpoints** tab and select the configured ACS URL: {% image sso/cheatsheets/saml-adfs/saml-adfs4.png %} ### Edit Claim Issuance Rules Construct Claim Issuance Rules to ensure that the appropriate claims, including Name ID, are passed to Bitwarden. The following tabs illustrate a sample ruleset: