Configure SAML with Active Directory Federation Services as identity provider

  An administrator role is required. For information, see User roles.

Before you begin, read Configure single sign-on using SAML protocol.

Verify your domain in your Nintex Automation Cloud tenant

  1. Sign in to Nintex Automation Cloud using an email address with administrator privileges.
  2. Click Settings.
  3. Click User management.
  4. In the Identity federation section, click Configure.
  5. Tip: The initial page in the setup wizard includes a warning message that lists the Nintex Automation Cloud tenants associated with the tenant you're going to configure with SAML. Click View more to see the list of tenants.

  6. Verify your domain using the verification code and adding a DNS record. For more information, see Verify a domain for SAML configuration.
  7. Caution: As part of the prerequisites to federation configuration, you must first verify ownership over a domain that you're going to use for SAML configuration. If you have not verified your domain, or if your DNS is still processing the verification, you can continue configuring SAML in Nintex Automation Cloud, but you cannot submit your SAML configuration.

Get the Identity Provider data from Nintex Automation Cloud

Note: Make sure your domain is verified and service provider details are updated. For more information about updating service provider details, see Upgrade identity federation.

  1. In the Verify Domain page of the setup wizard Nintex Automation Cloud, click Next.
  2. In the Configure Identity Provider page, select ADFS as the identity provider.
  3. Additional fields appear for the following:

    • Relying party trust identifiers
    • Callback Url
    • Mapping of LDAP attributes to outgoing claim types

    Note: You will later need to copy and insert these values in specific fields in Active Directory Federation Services.

  4. Keep your Nintex Automation Cloud browser open and go to Active Directory Federation Services.

Add Nintex Automation Cloud to Active Directory Federation Services

  1. Sign in to Active Directory Federation Services as an administrator.
  2. Add Nintex Automation Cloud as an application or service provider for SAML.
  3. Copy the Relying party trust identifiers and Callback URL values, and the attribute statements from Nintex Automation Cloud, and then paste them in the corresponding fields in Active Directory Federation Services
    1. In the Configure URL tab of the Add Relying Trust Wizard, paste the Callback URL value in the Relying party SAML 2.0 SSO service URL field.
    2. In the Configure Identifiers tab of the Add Relying Trust Wizard, paste the Relying party trust identifiers value from Nintex Automation Cloud.
    3. Nintex Automation Cloud SAML configuration in Microsoft Active Directory Federation Services

    4. In the Configure Claim Rule page of the Add Transform Claim Rule Wizard, use the name and values from the Attribute table in Nintex Automation Cloud.
    5. Caution: Select the values from the drop-down list and do not enter values manually.

      Microsoft Active Directory Federation Services in Nintex Automation Cloud

  4. Retrieve the SAML metadata URL or file. Copy the metadata URL, and paste it in the URL field of Nintex Automation Cloud's setup wizard.

Caution: After adding Nintex Automation Cloud as a SAML application to your identity provider, make sure that users exist in the directory of your identity provider. Depending on the identity provider, an empty directory may cause SAML configuration to fail. For information on how to manage user accounts, refer to your identity provider's documentation.

    For the SAML configuration steps in Active Directory Federation Services, see the Auth0 documentation.

Complete the SAML configuration

Note: 
  • Make sure that you have provided the metadata URL or file in Nintex Automation Cloud's setup wizard.
  • Make sure that your domain is successfully verified.

Follow these steps to complete the SAML configuration:

  1. In the Connect page of the setup wizard in Nintex Automation Cloud, click Connect.
  2. Note: The Connect button is enabled only when your domain is successfully verified and you have provided the metadata URL or file.

    After connecting, your SAML configurations are checked. If successful, the setup wizard goes to the final page with the following information:

    Information Description
    Expiry date of certificate Date when your certificate expires.
    Recipient email address of the reminder for certificate expiry

    When your certificate is expiring soon, a reminder email will be sent to the recipient email address.

    Caution: You must renew the certificate before the expiry date.

    One-Time Password (OTP) URL

    The One-Time Password (OTP) URL is used for troubleshooting purposes when configuration fails and you are locked out of your tenant.

    Follow these steps to access your tenant when you cannot sign in due to a failed configuration of SAML:

    1. To copy the One-time password URL, click (Copy) next to the One-time password URL field.
    2. Open a new tab on your web browser, paste the copied URL and press ENTER.
    3. Enter your email address, and click Submit.
    4. For verification, a one-time password is sent to your email address. The one-time password expires after five minutes.

    5. Enter the one-time password you received, and click Sign in.
    6. You can access your Nintex Automation Cloud tenant and resume configuring your identity federation.

  1. Click Done.

    The Identity federation section now lists information about your SAML configuration such as provider, domain, person who completed the configuration, and the date of configuration.

Test your SAML connection

  1. Sign in to your Nintex Automation Cloud tenant.
  2. Click Sign in or press ENTER.
  3. You are taken to the login page of Active Directory Federation Services.

  4. In Active Directory Federation Services's login page, type your credentials, and then submit.
  5. If the SAML configuration is successful, you are granted access to the Nintex Automation Cloud tenant.