{"id":267,"date":"2022-02-16T01:03:51","date_gmt":"2022-02-15T23:03:51","guid":{"rendered":"https:\/\/my-virt.alfadir.net\/?p=267"},"modified":"2022-02-16T01:03:51","modified_gmt":"2022-02-15T23:03:51","slug":"adfs-with-vmware-unified-access-gateway-uag","status":"publish","type":"post","link":"https:\/\/my-virt.alfadir.net\/index.php\/2022\/02\/16\/adfs-with-vmware-unified-access-gateway-uag\/","title":{"rendered":"ADFS with VMware Unified Access Gateway (UAG)"},"content":{"rendered":"\n<p>This article talks about configuration of ADFS with VMware Unified Access Gateway without the use of Workspace One Access.<\/p>\n\n\n\n<p>There\u2019re two use cases here to configure ADFS with Unified Access Gateway<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>Use Case #1: ADFS as MFA, so users first authenticate using ADFS, and then authenticate using standard credential to get the list of available resources (desktop or apps)<\/li><li>Use Case #2: ADFS for single authentication method, so users will authenticate once with ADFS and then will connect to VDI VMs or published apps without the need to enter any other credentials. This use case of course required VMware TrueSSO to works<\/li><\/ol>\n\n\n\n<p>Initial configuration is the same for both and to make it short here the different steps required:<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>Change Expiration Period for Service Provider Metadata<ol start=\"1\" type=\"1\"><li><a href=\"https:\/\/my-virt.alfadir.net\/index.php\/2022\/01\/12\/change-the-expiration-period-for-service-provider-metadata-on-connection-server\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/my-virt.alfadir.net\/index.php\/2022\/01\/12\/change-the-expiration-period-for-service-provider-metadata-on-connection-server\/<\/a><\/li><\/ol><\/li><li>Deploy UAG<ol start=\"1\" type=\"1\"><li><strong>Configure Edge Service and specify a Connection Server fqdn (not the load-balancer)<\/strong><\/li><li>Check connection is working<\/li><\/ol><\/li><li>Connect to &lt;federation fqdn&gt; and save the FederationMetadata.xml file<\/li><li>Import FederationMetadata.xml in UAG (Upload Identity Provider Metadata)<\/li><li>Configure UAG for SAML or SAML and Passthrough auth methods<\/li><li>Specify Identity Provider<\/li><li>Download SAML Service Provided .xml file<\/li><li>Configure ADFS<ol start=\"1\" type=\"1\"><li>Add a new Relying Party Trusts<\/li><li>Specify UAG SP .xml file as source<\/li><li>Configure Claim Issuance Policy<\/li><\/ol><\/li><li>Connect to UAG as \u201cclient\u201d<ol start=\"1\" type=\"1\"><li>Auth using ADFS<\/li><li>Auth using AD credential<br><\/li><\/ol><\/li><\/ol>\n\n\n\n<p>Now if we want to go further and implement ADFS with TrueSSO:<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>Generate SAML IdP Settings<ol start=\"1\" type=\"1\"><li>Import signed cert or use Generated one<\/li><li>Copy Content of Download IDP Settings<\/li><\/ol><\/li><li>Configure Horizon Connect Server for SAML auth with UAG and ADFS<ol start=\"1\" type=\"1\"><li>Connect to admin console of Horizon Connection Server<\/li><li>Add SAML Authenticator for UAG<ol start=\"1\" type=\"1\"><li>Mode Static<\/li><li>Past Content of UAG Download IDP Settings<\/li><li>Change EntityId if required<\/li><\/ol><\/li><li>Add SAML Authenticator for ADFS<ol start=\"1\" type=\"1\"><li>Mode Static<\/li><li>Past Content of FederationMetadata.xml<\/li><\/ol><\/li><\/ol><\/li><li>Enable TrueSSO for UAG and ADFS<ol start=\"1\" type=\"1\"><li>Using vdmUtil, enable both authenticator<\/li><\/ol><\/li><li>Check True SSO connection<ol start=\"1\" type=\"1\"><li>Connect to UAG as Client<\/li><li>Once authenticated to ADFS, the list of available resource appears, and you can login without any other cred<\/li><\/ol><\/li><\/ol>\n\n\n\n<p>That said, let see with some nice pictures how we do that :<\/p>\n\n\n\n<!--more-->\n\n\n\n<h2 class=\"wp-block-heading\" id=\"let-s-start-with-use-case-1\">Let&#8217;s start with Use Case #1<\/h2>\n\n\n\n<p>Ok the first thing is to change the expiration delay of  the SP SAML certificat of your Horizon Connection Servers and wait a maximum of 24h do get the new one generated (I personaly set mine to 10 years):<\/p>\n\n\n\n<p><a href=\"https:\/\/my-virt.alfadir.net\/index.php\/2022\/01\/12\/change-the-expiration-period-for-service-provider-metadata-on-connection-server\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/my-virt.alfadir.net\/index.php\/2022\/01\/12\/change-the-expiration-period-for-service-provider-metadata-on-connection-server\/<\/a><\/p>\n\n\n\n<p>And the second thing is to get the FederationMetada.xml so, you should be able to get it by connecting to https:\/\/&lt;federation fqdn&gt;\/FederationMetadata\/2007-06\/FederationMetadata.xml, just check on the AD FS Management:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"624\" height=\"373\" src=\"https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture1.png\" alt=\"\" class=\"wp-image-269\" srcset=\"https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture1.png 624w, https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture1-300x179.png 300w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/><figcaption>AD FS Management<\/figcaption><\/figure>\n\n\n\n<p>Then connect to the UAG and move to Identity Bridging Settings \\ Upload Identity Provider Metadata, click the wheel:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"624\" height=\"219\" src=\"https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture2.png\" alt=\"\" class=\"wp-image-270\" srcset=\"https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture2.png 624w, https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture2-300x105.png 300w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/><\/figure>\n\n\n\n<p>Select the FederationMetadata.xml file and click save (no need to specify EntityID, it will be filled automaticaly from the xml file<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"624\" height=\"232\" src=\"https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture4.png\" alt=\"\" class=\"wp-image-271\" srcset=\"https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture4.png 624w, https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture4-300x112.png 300w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/><\/figure>\n\n\n\n<p>Now move to General Settings \\ Horizon Settings :<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"624\" height=\"177\" src=\"https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture5.png\" alt=\"\" class=\"wp-image-272\" srcset=\"https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture5.png 624w, https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture5-300x85.png 300w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/><\/figure>\n\n\n\n<p>Click &#8220;More&#8221;:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"624\" height=\"630\" src=\"https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture6.png\" alt=\"\" class=\"wp-image-273\" srcset=\"https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture6.png 624w, https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture6-297x300.png 297w, https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture6-150x150.png 150w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/><\/figure>\n\n\n\n<p>Select &#8220;SAML and Paththrough&#8221; for &#8220;Use Case #1&#8243;or &#8220;SAML&#8221; for &#8220;Use Case #2&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"624\" height=\"429\" src=\"https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture7.png\" alt=\"\" class=\"wp-image-274\" srcset=\"https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture7.png 624w, https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture7-300x206.png 300w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/><\/figure>\n\n\n\n<p>Select the Identity Provider and click &#8220;Download SAML service Provider metadata&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"624\" height=\"409\" src=\"https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture9.png\" alt=\"\" class=\"wp-image-276\" srcset=\"https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture9.png 624w, https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture9-300x197.png 300w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/><\/figure>\n\n\n\n<p>Go to the bottom and click &#8220;<strong>Save<\/strong>&#8221; :<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"configure-ad-fs-relying-party-trust\">Configure AD FS Relying Party Trust<\/h2>\n\n\n\n<p>Now connect to your AD FS server, directly or using the MMC on your admin station.<\/p>\n\n\n\n<p>Open AD FS Management and click &#8220;Add Relying Party Trust&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"624\" height=\"182\" src=\"https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture14.png\" alt=\"\" class=\"wp-image-277\" srcset=\"https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture14.png 624w, https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture14-300x88.png 300w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/><\/figure>\n\n\n\n<p>Click &#8220;Start&#8221;<\/p>\n\n\n\n<p>Select &#8220;Import data about the relying party from a file&#8221; and select the xml files you downloaded from the UAG (SAML service provider metadata)<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"624\" height=\"506\" src=\"https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture16.png\" alt=\"\" class=\"wp-image-278\" srcset=\"https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture16.png 624w, https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture16-300x243.png 300w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/><\/figure>\n\n\n\n<p>Continue with all default options..<\/p>\n\n\n\n<p>Click &#8220;Edit Claim Issuance Policy&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"252\" height=\"238\" src=\"https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture21.png\" alt=\"\" class=\"wp-image-279\"\/><\/figure>\n\n\n\n<p>And add the following rule :<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"624\" height=\"507\" src=\"https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture24.png\" alt=\"\" class=\"wp-image-280\" srcset=\"https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture24.png 624w, https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture24-300x244.png 300w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/><\/figure>\n\n\n\n<p>Now you should be prompted to enter your AD FS credential first before beeing able to login to Horizon and this is the end for &#8220;Use Case #1&#8221; \ud83d\ude42<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"let-s-move-forward-to-use-case-2\">Let&#8217;s move forward to &#8220;Use Case #2&#8243;&#8230;<\/h2>\n\n\n\n<p class=\"has-vivid-red-color has-text-color\"><strong>Notes :<br>TrueSSO must be installed and configured<\/strong> <br><strong>Horizon Edge Service must be configured for a direct connection to a Connection Server and not to the load-balancer in front of the connection servers.<\/strong><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Let start by configuring SAML connection between the UAG and the Connection Server :<br>For this, connect to https:\/\/&lt;you connection server url&gt;\/SAML\/metadata\/sp.xml and copy the content of the .xml file<\/p>\n\n\n\n<p>Connect to the UAG as admin and click on the wheel in front of &#8220;SAML Settings&#8221; in &#8220;Advanced Settings&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"624\" height=\"233\" src=\"https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture30.png\" alt=\"\" class=\"wp-image-281\" srcset=\"https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture30.png 624w, https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture30-300x112.png 300w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/><\/figure>\n\n\n\n<p>In &#8220;SAML Service Provider Settings&#8221;:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Specify a name<\/li><li>Past the SAML SP metadata from your connection server and click &#8220;<strong>Save<\/strong>&#8220;<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"624\" height=\"226\" src=\"https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture47.png\" alt=\"\" class=\"wp-image-288\" srcset=\"https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture47.png 624w, https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture47-300x109.png 300w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/><\/figure>\n\n\n\n<p>The new Service Provider appears and can be edited later if ever the certificate change (eg. because of expiration)&#8230; Click &#8220;Close&#8221;:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"624\" height=\"420\" src=\"https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture48.png\" alt=\"\" class=\"wp-image-289\" srcset=\"https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture48.png 624w, https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture48-300x202.png 300w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/><\/figure>\n\n\n\n<p>Now, go back to edit the Horizon Edge Service, click &#8220;More&#8221; to show all items and in &#8220;SAML SP&#8221;, enter the Service Provider Name you set in the previous step :<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"624\" height=\"200\" src=\"https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture49.png\" alt=\"\" class=\"wp-image-290\" srcset=\"https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture49.png 624w, https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture49-300x96.png 300w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/><\/figure>\n\n\n\n<p>Move to the bottom of the page and click &#8220;<strong>Save<\/strong>&#8220;<\/p>\n\n\n\n<p>Click again on the wheel in front of &#8220;SAML Settings&#8221; in &#8220;Advanced Settings&#8221;<\/p>\n\n\n\n<p>You can use the self signed certificate or upload Private Key and Signed certificates (preferred) if not already done<\/p>\n\n\n\n<p>Specify external hostname of UAG and click download<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"624\" height=\"519\" src=\"https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture32.png\" alt=\"\" class=\"wp-image-282\" srcset=\"https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture32.png 624w, https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture32-300x250.png 300w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/><\/figure>\n\n\n\n<p>Select and Copy the content of &#8220;Identity Provider Settings&#8221;:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"624\" height=\"262\" src=\"https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture34.png\" alt=\"\" class=\"wp-image-283\" srcset=\"https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture34.png 624w, https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture34-300x126.png 300w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/><\/figure>\n\n\n\n<p>Click &#8220;Close&#8221;:<\/p>\n\n\n\n<p>Connect to the admin console of your connection server, then go to Settings \\ Server \\ Connection Servers<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"624\" height=\"453\" src=\"https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture35.png\" alt=\"\" class=\"wp-image-284\" srcset=\"https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture35.png 624w, https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture35-300x218.png 300w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/><\/figure>\n\n\n\n<p>Select your Connection Server and click &#8220;Edit&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"624\" height=\"453\" src=\"https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture35-1.png\" alt=\"\" class=\"wp-image-286\" srcset=\"https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture35-1.png 624w, https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture35-1-300x218.png 300w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/><\/figure>\n\n\n\n<p>Go to &#8220;Authentication&#8221; and click &#8220;Manage SAML Authenticators&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"624\" height=\"305\" src=\"https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture37.png\" alt=\"\" class=\"wp-image-287\" srcset=\"https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture37.png 624w, https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture37-300x147.png 300w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/><\/figure>\n\n\n\n<p>Click &#8220;Add&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"624\" height=\"140\" src=\"https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture38.png\" alt=\"\" class=\"wp-image-291\" srcset=\"https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture38.png 624w, https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture38-300x67.png 300w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/><\/figure>\n\n\n\n<p>Create the SAML 2.0 Authenticator for the UAG:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Select &#8220;Static&#8221;<\/li><li>Enter a label (eg. UAG-01)<\/li><li>Past the content of &#8220;Identity Provider Settings&#8221; from the UAG<\/li><li>Click &#8220;OK&#8221;:<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"624\" height=\"438\" src=\"https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture39.png\" alt=\"\" class=\"wp-image-295\" srcset=\"https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture39.png 624w, https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture39-300x211.png 300w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/><\/figure>\n\n\n\n<p>Note : if you have to create multiple SAML 2.0 Authenticator for UAGs change the entityID as it should be unique:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"624\" height=\"438\" src=\"https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture40.png\" alt=\"\" class=\"wp-image-296\" srcset=\"https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture40.png 624w, https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture40-300x211.png 300w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/><\/figure>\n\n\n\n<p>Create a second SAML 2.0 Authenticator for AD FS:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Select &#8220;Static&#8221;<\/li><li>Enter a label (eg. AD FS)<\/li><li>Past the content of &#8220;FederationMetadata.xml&#8221;<\/li><li>Click &#8220;OK&#8221;:<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"624\" height=\"403\" src=\"https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture42.png\" alt=\"\" class=\"wp-image-297\" srcset=\"https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture42.png 624w, https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture42-300x194.png 300w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/><\/figure>\n\n\n\n<p>You should have at least 2 SAML authenticators :<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>One for UAG<\/li><li>One for ADFS<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"624\" height=\"488\" src=\"https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture43.png\" alt=\"\" class=\"wp-image-298\" srcset=\"https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture43.png 624w, https:\/\/my-virt.alfadir.net\/wp-content\/uploads\/2022\/02\/Picture43-300x235.png 300w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/><\/figure>\n\n\n\n<p>Now we need to enable &#8220;ADFS&#8221; SAML authenticator for True SSO:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>From the connection server, type de following command to list all authenticator:<\/li><\/ul>\n\n\n\n<pre class=\"wp-block-code\"><code>vdmUtil \u2013-authAs &lt;admin horizon> \u2013-authDomain &lt;domain> \u2013-authPassword &lt;password> \u2013-truesso --list \u2013-authenticator<\/code><\/pre>\n\n\n\n<ul class=\"wp-block-list\"><li>And the following command to enable to enable &#8220;AD FS&#8221; SAML authenticator for True SSO:<\/li><\/ul>\n\n\n\n<pre class=\"wp-block-code\"><code>vdmUtil \u2013-authAs &lt;admin horizon> \u2013-authDomain &lt;domain> \u2013-authPassword &lt;password> \u2013-truesso \u2013-authenticator \u2013-edit \u2013-name ADFS \u2013-truessoMode ENABLED<\/code><\/pre>\n\n\n\n<p>Now, you should be able to connect to your Horizon resources using your ADFS credentials<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This article talks about configuration of ADFS with VMware Unified Access Gateway without the use of Workspace One Access. There\u2019re two use cases here to configure&#46;&#46;&#46;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[47,14,48,46,19,11],"class_list":["post-267","post","type-post","status-publish","format-standard","hentry","category-unified-access-gateway","tag-adfs","tag-horizon","tag-mfa","tag-uag","tag-unified-access-gateway","tag-vmware"],"_links":{"self":[{"href":"https:\/\/my-virt.alfadir.net\/index.php\/wp-json\/wp\/v2\/posts\/267","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/my-virt.alfadir.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/my-virt.alfadir.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/my-virt.alfadir.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/my-virt.alfadir.net\/index.php\/wp-json\/wp\/v2\/comments?post=267"}],"version-history":[{"count":7,"href":"https:\/\/my-virt.alfadir.net\/index.php\/wp-json\/wp\/v2\/posts\/267\/revisions"}],"predecessor-version":[{"id":299,"href":"https:\/\/my-virt.alfadir.net\/index.php\/wp-json\/wp\/v2\/posts\/267\/revisions\/299"}],"wp:attachment":[{"href":"https:\/\/my-virt.alfadir.net\/index.php\/wp-json\/wp\/v2\/media?parent=267"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/my-virt.alfadir.net\/index.php\/wp-json\/wp\/v2\/categories?post=267"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/my-virt.alfadir.net\/index.php\/wp-json\/wp\/v2\/tags?post=267"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}