US English (US)
FR French
DE German
PL Polish
SE Swedish
FI Finnish

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

English (US)
US English (US)
FR French
DE German
PL Polish
SE Swedish
FI Finnish
  • Log in
  • Home
  • Identity Governance and Administration (IGA)
  • IGA solution library
  • Instructions & guidelines
  • Customer instructions

Efecte Secure Access - Customer instructions for ADFS configuration

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • Service Management
    Matrix42 Professional Solution Matrix42 Core Solution Enterprise Service Management Matrix42 Intelligence
  • Identity Governance and Administration (IGA)
    IGA overview IGA solution library
  • Platform
    ESM ESS2 ESS Efecte Chat for Service Management Integrations Add-ons
  • Release Notes for M42 Professional, IGA, Conversational AI
    2026.1 2025.3 2025.2 2025.1 2024.2 2024.1 2023.4 2023.3 2023.2 2023.1 2022.4 2022.3 Release Information and Policies
  • Other Material
    Terms & Documentation Guidelines Accessibility Statements
  • Services
+ More
    • Service Management

    • Identity Governance and Administration (IGA)

    • Platform

    • Release Notes for M42 Professional, IGA, Conversational AI

    • Other Material

    • Services

Efecte Secure Access - Customer instructions for ADFS configuration

In this article is described instructions how Customer is be able to configure Active Directory (AD) to provide authentication functionalists for Efecte solutions end-users. 

This configuration is usually implemented by Customer's AD specialist or Authentication specialist and this should not take more that half a day to implement and test. 

Instructions are the same for all Efecte solutions, build on top of Efecte Service Management platform (like for example ITSM, IGA, HR etc.) and which are using Efecte Secure Access component for authentication.

Configure ADFS Authentication


Efecte Secure Access supports Single-Sign-On (SSO) by using ADFS (Active Directory Federation Services) authentication. This means that end-users don't have to sing-in to Efecte Solutions by adding user credentials (username + password), but instead they are authenticated automatically if user is logged in to the AD domain. 

How to configure ADFS

1. Open ADFS console
2. Create a rule to Send LDAP Attributes as Claims


Delete

Good to Know

Using the Send LDAP Attributes as claims rule template in ADFS, Customer can create a rule that will select attributes from Lightweight Directory Access Protocol (LDAP) attribute store, such as AD, to send as claims to the relying party. 
For example, Customer can use this rule template to create a Send LDAP Attributes as Claims rule that will extract attribute values for authenticated users from the displayName and telephoneNumber AD attributes and send those values as two (2) different outgoing claims. 

Customer can also use this rule to send all the user's group memberships. If needed, only individual group memberships can be sent by using the Send Group Membership as a claim rule template. 

Customer can use following procedure to create a claim rule with the ADFS Management snap-in. 

https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/operations/create-a-rule-to-send-ldap-attributes-as-claims


3. Define the Role of the Claims Rule Language


Delete

Good to Know

The ADFS claim rule language acts as the administrative building block for the behavior of incoming and outgoing claims, while the claims engine acts as the processing engine for the logic in the claim rule language that defines custom rule. 

For more information about Claim Engine, see 
https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/technical-reference/the-role-of-the-claims-engine

More information about the Role of the Claim Rule Language
https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/technical-reference/the-role-of-the-claim-rule-language


4. Edit Rule for passing needed attributes to be sent to Efecte Secure Access


The last row (picture above) shows ADFS side configuration to pass group names to be used as a claim at Efecte Secure Access.

Delete


adfs config secure access

Was this article helpful?

Yes
No
Give feedback about this article

Related Articles

  • Secure Access - Customer instructions for Entra ID configuration SAML
  • Customer Instructions for New Cloud Component Migration
  • Efecte Secure Access - Customer instructions for Virtu Authentication
  • Efecte Secure Access - Customer instructions for User Federation (AD)

Copyright 2026 – Matrix42 Professional.

Matrix42 homepage


Knowledge Base Software powered by Helpjuice

0
0
Expand