- Setup your own AD FS server
- Create an application in your AD FS Server, obtain "Client ID", "Client Secret" and "Discovery Document Endpoint". Discovery Document Endpoint typically ends with
/.well-known/openid-configuration. Configure your application with redirect urihttps://<YOUR_AUTHGEAR_ENDPOINT>/sso/oauth2/callback/adfs.
{% hint style="info" %}
Redirect URI has the form of /sso/oauth2/callback/:alias. The alias is used as the identifier of OAuth provider. You can configure the alias in Authgear Portal.
{% endhint %}
- In the portal, go to Authentication > Social / Enterprise Login.
- Enable Sign in with Microsoft AD FS.
- Fill in Client ID, Client Secret and Discovery Document Endpoint.
- Save the settings.
🎉 Done! You have just added Microsoft AD FS Login to your apps!
Microsoft AD FS supports the prompt=login parameter. You can include this parameter in your request when you want users to re-authenticate. See our guide on using the prompt=login parameter in Authgear SDKs to learn more.