Set up an WS Federation connection

Single Sign-On is only available for enterprise customers. Also, please note that the WS Federation protocol doesn't support the identity provider flow.

1 WS Federation protocol

  1. Open the ADFS Management Console.
  2. Click Add Relying Party Trust.
  3. Click Start.
  4. Select Enter data about the relying party manually and click Next.
  5. Enter a name (such as YOUR_APP_NAME) and click Next.
  6. Use the default (ADFS 2.0 profile) and click Next.
  7. Use the default (no encryption certificate) and click Next.
  8. Check Enable support for the WS-Federation... and enter the following value in the textbox:
  9. Click Next.
  10. Add a Relying Party Trust identifier with the following value: urn:auth0:onemedia-consulting
  11. Click Add and then Next.
  12. Leave the default Permit all users... and click Next.
  13. Click Next and then Close.
  14. In the Claim Rules window, click Add Rule...
  15. Leave the default Send LDAP Attributes as Claims.
  16. Give the rule a name that describes what it does.
  17. Select the following mappings under Mapping of LDAP attributes to outgoing claim types and click Finish.

LDAP Attribute

Outgoing Claim

Email Addresses


E-Mail Address



Name ID


Given Name



Set up the connection in OneInsight

After creating the relying party trust in ADFS, you can finalize the set up by creating a new WS Federation connection in OneInsight. This task can be performed using OneInsight's admin interface or via OneInsight Support. Enter the following information:

  • ADFS URL: URL to the ADFS federation metadata, e.g. https://ADFS.URL/FederationMetadata/2007-06/FederationMetadata.xml 
  • Email Domains: These will be used to check for SSO connections at (service provider initiated flow). The email domains that you can set in the admin interface is limited to the email domain of the currently logged in user. If you need additional email domains please contact support.

Did this help answer your question?

thumbs up
thumbs down

Thanks for the feedback! 🙏🏽