ADFS Not Resolving Active Directory Security Groups In SharePoint

Active Directory Federation Services + SharePoint Security Owner todaySeptember 5, 2018 835

share close

I ran into this issue really recently working at a client with a new, pretty basic ADFS environment that was acting as the identity provider, through an ADFS proxy server relay. I couldn’t wrap my head around why it wasn’t working, the groups themselves were resolving correctly, and even showing up in the identity data sources in the people picker. However, members of the AD securitygroup, (NOT the SharePoint group) were still being denied access to the SharePoint site.

To fix this issue follow these steps:

    1. Open the federation server box.
    2. Open the ADFS management console.
    3. Edit the claim rules for the relaying party trust
    4. Select the tab Issuance Transform Rules
    5. Edit the Send LDAP Attributes as Claims
      1. This should have:
      2. Claim Rule Name : Pass-through LDAP Claims
      3. Attribute Store : Active Directory
      4. Set: Token Groups unqualified names (Don’t Use: Token Groups – Qualified by domain name) | Outgoing ClaimType: Role
      5. Set: User-Principal-Name | Outgoing Claim Type : UPN
    6. Open the SharePoint management shell, run the following PowerShell script to create the issuer. If you have an issuer already made, remove it or execute the coordinating update commands. Make sure you replace the $certPath, $realm, and any of the string literals within $ap.

$certPath = your certification path
$cert = New-Object System.Security.Cryptography.X509Certificates.X509Certificate2(“$certPath”)
$map1 = New-SPClaimTypeMapping “” -IncomingClaimTypeDisplayName “EmailAddress” -SameAsIncoming
$map2 = New-SPClaimTypeMapping “” -IncomingClaimTypeDisplayName “Login” –SameAsIncoming
$map3 = New-SPClaimTypeMapping “” -IncomingClaimTypeDisplayName “Role” –SameAsIncoming
$map4 = New-SPClaimTypeMapping “” -IncomingClaimTypeDisplayName “Account ID” –SameAsIncoming
$realm = “urn:” + $env:ComputerName + “:adfs”
$signinurl = “https://yoursigninurl”
$ap = New-SPTrustedIdentityTokenIssuer -Name “ADFS” -Description ADFS 2.0 -Realm $realm -ImportTrustCertificate $cert -ClaimsMappings $map1, $map2, $map3, $map4 -SignInUrl $signinurl -IdentifierClaim $map1.InputClaimType

If you are curious about the way to update, rather than create a new issuer, you can use the following. In the above, you may or may not need all those assertion mappings depending on how your trusted relay issuance rule setup:

$issuer = Get-SPTrustedIdentityTokenIssuer
$map=New-SPClaimTypeMapping “” -IncomingClaimTypeDisplayName “Role” –SameAsIncoming

Now you HAVE to apply KB hotfix 2536591 located here:

Boom! Groups will work.

Written by: Owner

Tagged as: .

Rate it

Previous post