ADFS SSO
Set up Active Directory Federation Services (ADFS) as your identity provider for Webrix.
What you'll enter in Webrix
- Client ID
- Client Secret
- Issuer (e.g.,
https://adfs.example.com/adfs) - Callback URL (read‑only):
{gatewayUrl}/api/auth/callback/adfs
Prerequisites
- ADFS 2016 or later (required for OIDC support)
- Administrative access to ADFS Management Console
- A Webrix account with administrative access
Steps in ADFS
1. Create an Application Group
- Open ADFS Management Console
- Right-click Application Groups → Add Application Group
- Enter a name (e.g., "Webrix Integration")
- Select template: "Server application accessing a web API"
- Click Next
2. Configure Server Application
- Note the Client Identifier (GUID) - this is your Client ID
- Add Redirect URI:
{gatewayUrl}/api/auth/callback/adfs- Replace
{gatewayUrl}with your actual Gateway URL (e.g.,https://your-org.mcp-s.com)
- Replace
- Click Next
3. Generate Client Secret
- Select "Generate a shared secret"
- Copy and save the Client Secret immediately (it won't be shown again)
- Click Next
4. Configure Web API
- Identifier: Use the same Client ID from step 2.1
- Access Control Policy: Choose your policy (usually "Permit everyone" or your organization's policy)
- Click Next
5. Configure Application Permissions
- Check these scopes:
- openid
- profile
- Click Next, then Close
6. Configure Claims
- Right-click your new Application Group → Properties
- Select the Web API → Edit
- Go to Issuance Transform Rules → Add Rule
- Choose Send LDAP Attributes as Claims:
- LDAP Attribute → Outgoing Claim Type:
E-Mail-Addresses→emailDisplay-Name→nameUser-Principal-Name→upn
- LDAP Attribute → Outgoing Claim Type:
- Click OK to save
7. Verify OIDC Discovery
Test that OIDC discovery is working by visiting in your browser:
https://adfs.example.com/adfs/.well-known/openid-configuration
You should see a JSON response with endpoints. If you get an error, ADFS may not support OIDC (pre-2016 versions).
Finish in Webrix
- In Admin → Settings → Authentication, choose Provider: ADFS
- Enter:
- Client ID: The GUID from step 2.1
- Client Secret: The secret from step 3.2
- Issuer:
https://adfs.example.com/adfs(your ADFS domain)
- Click Save Changes
Troubleshooting
"Unable to connect to ADFS"
- Verify the issuer URL is correct and accessible
- Ensure OIDC discovery endpoint returns valid JSON:
{issuer}/.well-known/openid-configuration - Check firewall rules allow outbound HTTPS connections to your ADFS server
"Invalid claims received"
- Verify claims are properly configured in ADFS (step 6)
- Ensure users have email addresses in Active Directory
- Check the Issuance Transform Rules include
email,name, andupn
Users can't sign in
- Verify users are assigned to the Application Group in ADFS
- Add users to Webrix first via Admin Console → Users → Add User
- Check that the email addresses match between ADFS and Webrix
Notes
- ADFS 2016+ is required for OIDC/OAuth 2.0 support
- Older ADFS versions only support SAML, which is not compatible with Webrix
- The issuer URL should end with
/adfs(e.g.,https://adfs.company.com/adfs)
Contact support
If you need assistance, contact Webrix support at [email protected] with:
- Your ADFS version
- The issuer URL you're using
- Any error messages from the configuration
- Screenshots of your ADFS Application Group settings (with secrets redacted)