- Microsoft Windows server 2008 R2 or higher, running ADFS 2.0 or higher.
- Your ADFS server must be publicly available (NAT translation or using a federation proxy/Web Application Proxy) for users to authenticate outside of your local network.
- Instructions are based on ADFS 3.0. For ADFS 2.0 servers, you may notice some slight differences in the configuration.
Customize your Motivosity domain name (for this example, we’ll use “abc”). Logged in with administrative rights, go to Setup > Preferences and choose your domain name.
Export your ADFS XML federation metadata. This is typically available at the following URL:
Log into your ADFS server with administrative rights.
Open the ADFS administration console.
Navigate to Trust Relationships > Relying Party Trusts.
Select Add Relying Party Trust.
Click Next at the Configure Certificate page (skip this step).
At the Configure URL step, select Enable support for the SAML 2.0 WebSSO protocol and specify the URL https://app.motivosity.com/sso/saml in the Relying party SAML 2.0 SSO service URL field:
At the Configure Multifactor Authentication Now? step, click next (skip this step).
At the Configure Issuance Authorization Rules step, select Permit All Users to access this relying party.
Under the Issuance Transform Rules tab, click Add Rule…
From there you will want to select 'Transform an Incoming Claim" under Claim rule Template
Click OK. Click Apply and OK to exit the claim rules configuration.
Navigate to your custom domain (https://abc.motivosity.com). This should redirect you to login on your ADFS page. Upon successful login, you will be redirected to your Motivosity portal.