Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Applies To: Dynamics CRM 2015
After you have enabled IFD on the Microsoft Dynamics CRM Server you will need to create a relying party for the IFD endpoint on the AD FS server.
Configure relying party trusts
- On the computer that is running Windows Server where the AD FS federation server is installed, start AD FS Management. 
- In the Navigation Pane, expand Trust Relationships, and then click Relying Party Trusts. 
- On the Actions menu located in the right column, click Add Relying Party Trust. 
- In the Add Relying Party Trust Wizard, click Start. 
- On the Select Data Source page, click Import data about the relying party published online or on a local network, and then type the URL to locate the federationmetadata.xml file. - This federation metadata is created during IFD Setup, for example, https://auth.contoso.com/FederationMetadata/2007-06/FederationMetadata.xml. - Type this URL in your browser and verify that no certificate-related warnings appear. 
- Click Next. 
- On the Specify Display Name page, type a display name, such as CRM IFD Relying Party, and then click Next. 
- On the Configure Multi-factor Authentication Now page, make your selection and click Next. 
- On the Choose Issuance Authorization Rules page, click Permit all users to access this relying party, and then click Next. 
- On the Ready to Add Trust page, on the Identifiers tab, verify that Relying party identifiers has three identifiers such as the following: - If your identifiers differ from the above example, click Previous in the Add Relying Party Trust Wizard and check the Federation metadata address. 
- Click Next, and then click Close. 
- If the Rules Editor appears, click Add Rule. Otherwise, in the Relying Party Trusts list, right-click the relying party object that you created, click Edit Claims Rules, and then click Add Rule. - Important - Be sure the Issuance Transform Rules tab is selected. 
- In the Claim rule template list, select the Pass Through or Filter an Incoming Claim template, and then click Next. 
- Create the following rule: - Claim rule name: Pass Through UPN (or something descriptive) 
- Add the following mapping: - Incoming claim type: UPN 
- Pass through all claim values 
 
 
- Click Finish. 
- In the Rules Editor, click Add Rule, and in the Claim rule template list, select the Pass Through or Filter an Incoming Claim template, and then click Next. - Claim rule name: Pass Through Primary SID (or something descriptive) 
- Add the following mapping: - Incoming claim type: Primary SID 
- Pass through all claim values 
 
 
- Click Finish. 
- In the Rules Editor, click Add Rule, 
- In the Claim rule template list, select the Transform an Incoming Claim template, and then click Next. 
- Create the following rule: - Claim rule name: Transform Windows Account Name to Name (or something descriptive) 
- Add the following mapping: - Incoming claim type: Windows account name 
- Outgoing claim type: Name 
- Pass through all claim values 
 
 
- Click Finish, and, when you have created all three rules, click OK to close the Rules Editor. 
See Also
Implement claims-based authentication: external access
© 2016 Microsoft Corporation. All rights reserved. Copyright