Follow the examples below to configure Active Directory Federation Services (AD FS) as the SAML identity provider (IdP) for Dynatrace SSO.
This page describes the IdP (AD FS) end of your SAML SSO configuration, not the Dynatrace end. Use it as part of the entire SAML configuration procedure for Dynatrace SaaS if you're using AD FS.
While we do our best to provide you with current information, Dynatrace has no control over changes that may be made by third-party providers. Always refer to official third-party documentation from your IdP as your primary source of information for third-party products.
On the Monitoring tab, specify the monitoring settings for the relying party trust.
https://sso.dynatrace.com/sso/metadata
If you can't do the above (perhaps due to corporate policy), you need to download the metadata manually:
wget -Outfile dynatrace_sso_metadata.xml https://sso.dynatrace.com/sso/metadata
Update-AdfsRelyingPartyTrust -TargetIdentifier "<DYNATRACE_SSO_IDENTIFIER>" -MetadataFile 'dynatrace_sso_metadata.xml'
On the Advanced tab, make sure the Secure hash algorithm is SHA-256
.
To configure claims mapping
Sso Dynatrace Relying Party Trust
under Trust Relationship
.Edit Claims Rules
.To create Active Directory transformations
Add Rule...
.Send LDAP Attributes as Claims
(the default option) and set values according to the following example values.Email Attribute Claim
Active Directory
E-Mail-Addresses
, Outgoing Claim Type = E-Mail Address
First and Last Name
Active Directory
Given-Name
, Outgoing Claim Type = givenName
Surname
, Outgoing Claim Type = sn
Token-Groups as SIDs
is an example LDAP attribute that can be used for group mapping. Depending on your corporate LDAP, select the one that contains the LDAP user groups.
Group Mapping
Active Directory
Token-Groups as SIDs
, Outgoing Claim Type = Group
To create an Email Address to NameID
transformation
Add Rule
.Transform an Incoming Claim
.Email to Name ID
E-Mail Address
Name ID
Email
selected
Ensure that the SAML message will be signed:
Set-ADFSRelyingPartyTrust -TargetIdentifier "<DYNATRACE_SSO_IDENTIFIER>" -SamlResponseSignature "MessageAndAssertion"
Ensure that the system clock's skew won't affect SAML request validation:
Set-ADFSRelyingPartyTrust -TargetIdentifier "<DYNATRACE_SSO_IDENTIFIER>" -NotBeforeSkew 2
Establish SAML authorization in Dynatrace SSO.
You need to specify First name attribute
, Last name attribute
, and the Security group claim attribute
.
Usually these attributes for AD FS will be as follows, but this may vary depending on the AD FS version and settings.
|
|
|
|
|
|