The latter implements a provider of multi-factor authentication for Microsoft ADFS server, thus adding the second factor to the access gaining process.
Files of Indeed AM ADFS Extension reside in: indeed AM\Indeed AM ADFS Extension\<Version number>\
|
Create a configuration file named MFAAdapter.json with the following parameters.
id parameter of ModeId have different provider ID {EBB6F3FA-A400-45F4-853A-D517D89AC2A3} - SMS OTP {093F612B-727E-44E7-9C95-095F07CBB94B} - EMAIL OTP {F696F05D-5466-42b4-BF52-21BEE1CB9529} - Passcode {0FA7FDB4-3652-4B55-B0C0-469A1E9D31F0} - Software OTP {AD3FBA95-AE99-4773-93A3-6530A29C7556} - HOTP Provider {CEB3FEAF-86ED-4A5A-BD3F-6A7B6E60CA05} - TOTP Provider {DEEF0CB8-AD2F-4B89-964A-B6C7ECA80C68} - AirKeyProvider |
{ "ServerType":"eaNet", "EANetServerURL":"http://YourDomainName/am/core/", "ModeId":"{0FA7FDB4-3652-4B55-B0C0-469A1E9D31F0}", "LSEventCacheDirectory": "C:\\EventCacheEa\\" } |
Run PowerShell as administrator. Enter the following data to register an adapter:
YourPatch\MFAAdapter.json - specify full path to the previously created configuration file. |
Specify the version number of Indeed ADFS Extension used in $typeName variable, Version parameter. |
$typeName = "IndeedId.ADFS.MFAAdapter.MFAAdapter, IndeedId.ADFS.MFAAdapter, Version=1.0.6.0, Culture=neutral, PublicKeyToken=1ebb0d9282100d91" Register-AdfsAuthenticationProvider -TypeName $typeName -Name "Indeed Id MFA Adapter" -ConfigurationFilePath 'YourPatch\MFAAdapter.json' |
To remove an adapter, execute the following command:
Unregister-AdfsAuthenticationProvider -Name "Indeed Id MFA Adapter" |
To update configuration, execute the following command:
Import-AdfsAuthenticationProviderConfigurationData -Name "Indeed Id MFA Adapter" -FilePath 'YourPatch\MFAAdapter.json' |
Specify the URL of your server at the “Select Data Source” tab and click “Next”.
The standard ADFS idpinitiatedsignon.htm page is used as extension example. This page uses metadata address. |
The idpinitiatedsignon.htm page is deactivated in AD FS 2016 by default. To activate it, run PowerShell as administrator and execute the following command:
|