To allow the users registered in Active Directory (AD) in your organization to sign in to Kaspersky Security Center Cloud Console, you must configure integration with Active Directory Federation Services (ADFS).
Kaspersky Security Center Cloud Console supports ADFS 3 (Windows Server 2016) or a later version. ADFS must be published and available on the internet. As the service communication certificate ADFS uses publicly trusted certificate.
In the main menu, click the settings icon () next to the name of the Administration Server.
The Administration Server properties window opens.
On the General tab, select the ADFS integration settings section.
Copy the callback URL.
You will need this URL to configure the integration in ADFS Management Console.
In ADFS Management Console, add a new application group, and then add a new application by selecting the Server application template (the names of the Microsoft interface elements are provided in English.).
ADFS Management Console generates client ID for the new application. You will need the client ID to configure the integration in Kaspersky Security Center Cloud Console.
As a redirect URI, specify the callback URL that you copied in the Administration Server properties window.
Generate a client secret. You will need the client secret to configure the integration in Kaspersky Security Center Cloud Console.
Save the properties of the added application.
Add a new application to the created application group. This time select the Web API template.
On the Identifiers tab, to the Relying party identifiers list, add the client ID of the server application that you added before.
On the Client Permissions tab, in the Permitted scopes list, select the allatclaims and openid scopes.
On the Issuance Transform Rules tab, add a new rule by selecting the Send LDAP Attributes as Claims template:
Name the rule. For example, you can name it 'Group SID'.
Select Active Directory as an attribute store, and then map Token-Groups as SIDs as a LDAP attribute to 'Group SID' as an outgoing claim type.
On the Issuance Transform Rules tab, add a new rule by selecting the Send Claims Using a Custom Rule template:
Name the rule. For example, you can name it 'ActiveDirectoryUserSID'.
The URL address of the federation server working in your organization.
In particular, Kaspersky Security Center Cloud Console adds '/.well-known/openid-configuration' to the issuer URL address and tries to open the resulting URL address (issuer_URL/.well-known/openid-configuration) to discover the issuer configuration automatically.
Client ID that the federation server generates to identify Kaspersky Security Center Cloud Console. You can find the Client ID in ADFS Management Console in the properties window of the server application that corresponds to Kaspersky Security Center Cloud Console.
You generate a client secret in ADFS Management Console when you specify the properties of the server application that corresponds to Kaspersky Security Center Cloud Console.
The members of the domain that you select will be able to sign in to Kaspersky Security Center Cloud Console with their domain account credentials. The domain names appear in the list after you complete the network polling.
Name of the field that refers to the user SID in the ID token. The field name is required to identify the user in Kaspersky Security Center Cloud Console. By default, this field in the ID token is called 'primarysid'.
Name of the field that refers to the array of SIDs of Active Directory security groups in which the user is included. By default, this field in the ID token is called 'groupsid'.
Click the Save button.
The integration with ADFS is complete. To sign in to Kaspersky Security Center Cloud Console with an AD account credentials, use the link provided in the ADFS integration settings section (Login link to Kaspersky Security Center Cloud Console with ADFS).
When you sign in to Kaspersky Security Center Cloud Console through ADFS for the first time, the console might respond with a delay.