Configure ADFS for Netskope SSO using the Metadata File

Configure ADFS for Netskope SSO using the Metadata File

To complete these steps, you need the Netskope Metadata file. Go to Settings > Administration > SSO, and under Netskope Settings, click Download Netskope Metadata. Save the file for later reference.

  1. Add the Netskope admin console as a relying party trust. Open the ADFS Management window and right click the Relying Party Trusts folder, and then click Add Relying Party Trust.
    adfs-add-relyingpartytrust.png
  2. Enable Claims aware and click Start.
    AddPartyTrust.jpg
  3. For Select Data Source, select Import data about the relying party from a file and browse to select the file. When finished , click Next.
    ImportDataFile.png
  4. For Display name, enter a meaningful name, like Netskope_SSO, and then click Next.
    DisplayName.png
  5. For Configure Multi-factor Authentication Now, enable the I do not want to configure…. option, and then click Next.
    MFAoption.png
  6. For Choose Insurance Authorization Rules, enable the Permit all users to access…, option, and then click Next.
    ChooseIssuanceRules.png
  7. For Ready to Add Trust, the wizard displays the configured settings. Click Next.
    ReadyToAddTrust.png
  8. Enable the Open the Edit Claims dialog … checkbox and click Close.
    EditClaimsRules.png
  9. In the Edit Claim Rules dialog, click Add Rule.
    AddRule.png
  10. For Choose Rule Type in the Add Transform Claim Rule Wizard, select Send LDAP attributes as Claims as the Claim Rule Template so claims contain LDAP attribute values from the AD attribute store. Click Next.
    ChooseRuleType.png
  11. For Configure Claim Rule, enter and select the following:
    • Enter a name for the claim rule.
    • For Attribute Store, select Active Directory.
    • Map the LDAP attributes that represent the user’s login name to a field in the outgoing claim. In the LDAP attribute column, select User-Principal-Name. In the Outgoing Claim Type column, select or enter Name ID. (Note that Name ID is entered as two words, with a space between them).
    ConfigureClaimRule.png

    Click Finish.

  12. Click Add Rule and add another Claim Issuance Policy rule.
    AddRule2.png
  13. For Choose Rule Type, select Send Group Membership as a Claim, as the Claim Rule Template, and then click Next.
    ChooseRuleType2.png
  14. For Configure Claim Rule, enter and select the following:
    • Enter a name for the claim rule, like Tenant_Admin.
    • For User’s Group, browse and select the AD group that will be mapped to the Tenant Admin role in the Netskope UI.
    • For Outgoing Claim Type, select Group.
    • For Outgoing Claim Value, enter Tenant Admin.
    ConfigureClaimRule2.png

    In this rule, users in the Tenant_admin group are mapped to the predefined Tenant Admin role on the Netskope UI.

    Note

    Create a group claim role for each role present in the Netskope UI under Administration, both predefined and custom, if those roles are being used.

    Click Finish.

  15. Add another Claim Issuance Policy rule. For Choose Rule Type, select Transform an Incoming Claim, as the Claim Rule Template, and then click Next.
    ChooseRuleType3.png
  16. For Configure Claim Rule, enter and select the following:
    • Enter a name for the claim rule, like admin role.
    • For Incoming Claim Type, select Group.
    • For Outgoing Claim Type, select admin-role.
    • Enable Pass through all class values.
    ConfigureClaimRule3.png

    In this rule, users in the admin role group are mapped to the pre-defined Tenant Admin role on the Netskope UI. Click Finish.

  17. In the Edit Claim Rules dialog, the Transform incoming rule should be the last rule. When so, click OK.
    AddRule3.png

    Note

    Configure further roles as needed.

  18. Run the below PowerShell commands to disable the CRL Check:
    PS C:UsersAdministrator> Set-ADFSRelyingPartyTrust -TargetIdentifier <org_key> -SigningCertificateRevocationCheck None
    
    PS C:UsersAdministrator> Set-ADFSRelyingPartyTrust -TargetIdentifier <org_key> -EncryptionCertificateRevocationCheck None

ADFS is now configured for Netskope SSO. Proceed to the Configure Netskope SSO for ADFS section to complete the integration.

Share this Doc

Configure ADFS for Netskope SSO using the Metadata File

Or copy link

In this topic ...