Setting Up Remote Application Server to work with ADFS as Identity Provider over SAML

1 users found this article helpful
 

Architecture & Prerequisites

1. Supported Scenario

Parallels RAS acts as the SAML Service Provider (SP), while AD FS acts as the Identity Provider (IdP). Users authenticate via a browser and are redirected back to Parallels RAS after successful authentication.

SAML authentication is browser based and therefore requires HTTP/HTTPS accessibility between the user, AD FS, and the RAS Secure Gateway.

2. Prerequisites Checklist

Before starting, ensure the following requirements are met:

  • Parallels RAS is already deployed and functional

  • Active Directory is healthy and accessible
  • Domain Controllers have Domain Controller Authentication certificates that support smart card authentication
    • Certificates created using the Microsoft CA “Domain Controller Authentication” template are required
  • A dedicated Enrollment Server will be required.
    • Must be a standalone, secure server with no other RAS roles installed
    • Why an Enrollment Server Is Required?
      When using SAML authentication with smart card or certificate‑based authentication, Parallels RAS requires an Enrollment Server to request user certificates on behalf of authenticated users.
  • A web browser is available for users (SAML cannot be used with non‑browser authentication)
  • Prerequisites are in place as described in Setting up Windows Server side to comply RAS SAML pre-requisites

Prepare Parallels RAS – Enrollment Services

1.  Add the Enrollment Server Agent

  1. Open RAS Console

  2. Navigate to Enrollment Servers

  3. Click the + icon to add a new Enrollment Server agent

2. Configure AD Integration

In RAS Console → Enrollment Servers → AD Integration:



 


Create the Identity Provider in Parallels RAS

At this stage, RAS is prepared to act as a SAML Service Provider.

1. Add a New SAML Identity Provider

On the next page:

Click Apply to save the configuration.


Export Parallels RAS Service Provider Metadata

1. Configure SP Properties

2. Export SP Metadata

This file will be imported into AD FS when creating the relying party trust.


Prepare Active Directory Federation Services (ADFS)

- This section is optional and is provided for completeness if AD FS has not been installed.

1. Install the ADFS Role

On the Windows Server designated for federation services:

Refer Microsoft’s official documentation: Install the AD FS Role Service


Configure ADFS – Relying Party Trust

1. Create Relying Party Trust

2. Import SP Metadata

On the Specify Display Name section, set:


Configure ADFS – Claim Issuance Policy

1. Add LDAP Claims Rule


Configure AD FS – Map AD Attributes

In Configure Claim Rule:


Retrieve ADFS Federation Metadata URL

In AD FS Management:


Completing Parallels RAS SAML Configuration

Open RAS Console → Connection → SAML

Edit the ADFS Identity Provider
 

1. Configure the Login Theme

In the General tab:

2. Import IdP Metadata

If URL import fails:

 

3. Configure Attributes Mapping


Enable SAML Authentication

As the last configuration step:

  1. Go to RAS Console → Connection → Authentication

  2. Enable Web (SAML) authentication

  3. Click Apply


Validation

1. Test browser access to the SAML login URL, for example, https://publicFQDN/ThemeName

 

Was this article helpful?

Tell us how we can improve it.