The Incident IQ ADFS App allows administrators to integrate Incident IQ with Active Directory Federation Services (ADFS). It comes with the Incident IQ LocalAd user sync service, which automatically populates user data in iiQ from the active directory server. This allows users to seamlessly log in to Incident IQ using ADFS single sign-on.
You can use the following links below to quickly navigate to a specific section in this document. To quickly return to this index simply use the Return to Index link located at the end of any section.
- App Installation
- Creating an Active Directory User
- Downloading the Service Provider Metadata
- Establishing the ADFS Party Trust
- Mapping SAML Attributes
- Downloading SYNC and Configuration ZIP Files
- Configuring the Active Directory Integration
- Creating a Scheduled Sync Task
Before beginning the installation process you will need to ensure you have the following:
- Ability to create and edit user permission in your active directory.
- A machine that runs .NET Framework v.4.5.1 or higher and also has network access to reach your district's AD server.
Begin by selecting Incident IQ Apps > Browse on the left navigation bar.
Click on the Microsoft ADFS app and then select Install to begin.
Step one of the installation process simply provides an overview of how installing the Microsoft ADFS app will affect your Incident IQ installation. Select Continue once you are ready to proceed to step two.
Step two of the installation process simply provides an overview of how installing the Microsoft ADFS app will affect your Incident IQ installation. Once you have completed your review select Install App to begin the integration process.
Once the installation has been completed you can now begin creating an active directory user.
Creating an Active Directory User
Once you've installed the Microsoft ADFS app in Incident IQ, you will now need to create a new user in your Active Directory. This user will need the following roles assigned to it:
- Replicating directory changes.
- Replicating directory changes in filtered set.
- Replicating directory changes all.
Important Note: You will need to complete this step before proceeding. If you are unfamiliar with how to grant these specific permissions to a user then please refer to the following Microsoft help guide on Giving Users Replicating Directory Changes Permissions.
Downloading the Service Provider Metadata
For the next phase of the ADFS installation, you will need to click on Download Service Provider Metadata under the General section of the Overview tab.
In the new tab, copy the URL in the window that opens with your site's metadata. This link will be used in the next section of your ADFS installation.
Establishing the ADFS Party Trust
On your AD server, begin by running the application ADFS (Active Directory Federated Services). Right-click the Relying Party Trusts node in the tree and click Add Relying Party Trust.
This will open the Add Relying Party Trust Wizard. From here, make sure to keep the Claims Aware option checked before clicking on Start.
Make sure the "Import data about the relying party published online or on a local network" option remains checked. In the "Federation metadata address" field you will need to paste the URL copied in during the previous section. Once you have the metadata link filled out, click Next.
In this step, you can keep the default name for the relying party or rename it to whatever you would like. Once you are satisfied with the name, click Next.
Leave "Permit everyone" checked on the "Choose an access control policy" section then click Next.
You will not need to do anything in the next step. Simply click Next.
Make sure "Leave Configure claims issuance policy for this application" checked then click Close.
In the Edit Claim Issuance Policy dialog that now is displayed, click Add Rule.
In the next step, leave Send LDAP Attributes as Claims selected and click Next.
Give the claim rule a name of your choosing (ie. IncidentIQ). In the Attribute store dropdown, select Active Directory.
Finally, you will need to map one or more LDAP attributes to send to IIQ that will be used to lookup the user. It’s important that you pick attributes that have the same value in both systems while being unique and available for all users that will be logging in. For most districts, mapping the username and email address will be sufficient. Once mapped, click Finish.
When you’re happy with your mapping, click View Rule Language. That will bring up a dialog similar to the one below. Take note of the URLs that start with the following:
These are the SAML attributes that will be passed to IncidentIQ and will need to be mapped inside of the Incident IQ ADFS app. This will be covered in the next section. Click OK on all three open dialogs to bring you back to the main ADFS window. This part of the setup is now complete.
Mapping SAML Attributes
At this point, you will need to map your SAML attributes that were identified at the end of the previous section. Begin by navigating to the Microsoft ADFS app in Incident IQ and selecting the Identity Provider Settings tab.
In the SAML Attribute Mapping section, click on the Add New Map button.
Next, you will need to enter your SAML data URL into the SAML Attribute Name field followed by selecting which user data field this should correspond to in Incident IQ. This process must be repeated for each data field you want to pull from ADFS.
Once you have completed mapping your SAML data URLs, click Save at the bottom of the page.
Downloading SYNC and Configuration Files
Now you will need to download the application for the AD-iiQ sync. This application will need to be downloaded on a machine that has network access to reach an AD server (you can run it on the AD server itself, but that's not a requirement). Additionally, the machine that runs the app will need to have the .NET framework v4.5.1 or higher.
You can download this file from the Microsoft Onsite Active Directory (v2) app in Incident IQ. To access this file, begin by selecting Incident IQ Apps > Manage on the left navigation bar.
On the Installed Apps tab, find the Microsoft ADFS app and click on Manage.
This will take you to the app Overview tab. From here, you will need to click on Download Local AD Synchronization Executable to download the executable zip file.
Next, you will need to download the UserSync.conf file. In the Overview tab, click on the Download Configuration Template button.
Configuring the Active Directory Integration
After you have created your AD user and downloaded the necessary files, you will now need to extract the Microsoft AD Connectors file. Once all files have been extracted, move the UserSync.conf file into the unzipped folder containing sync application.
Next, run the application titled IncidentIQ.Connectors.MicrosoftAd.exe. This will open up a new application window.
In the top section of the application window, you will need to modify the following default settings: ADUsername, ADPassword, ADDomain, and ADIp.
Important Note:All fields must be kept inside of quotation marks. Data entered without these quotations will not configure properly.
The ADPassword value should be encrypted. To get the encrypted value to fill into the settings, click the Common tab and enter the AD password in the text field labeled Clear text. Copy the Encrypted value and paste it as the value for the ADPassword setting.
Once all of your settings have been entered, click Save configuration.
After you've confirmed that the configuration has successfully saved, click Run now.
Running the application can take a while depending on the number of users in your AD (syncing about 10,000 users takes roughly 10-15 minutes). Upon completion, you will see a message stating "Completed sending data to IncidentIQ."
Creating a Scheduled Sync Task
To schedule the sync to occur automatically, you'll need to create a task in Windows Task Manager. You can do so by searching for Administrative Tools and selecting Task Scheduler. This will open the Task Scheduler window.
In the Task Scheduler window, start by clicking on Action > Create Basic Task...
This will open the Create Basic Task Wizard. At the very least, you will need to provide a name for the new task. You can also add a task if desired. Once complete, click Next.
In the next step, you will be asked to select when this task should Trigger. We recommend running it daily (overnight) for the most accurate user data. Please ensure you set the task to run regardless of whether a user is logged in or not on the server. Once complete, click Next.
For the next step, you will need to specify what action the task will take when running. Select Start a Program and then click on Next.
When specifying the action to perform, locate the file IncidentIQ.Connectors.MicrosoftAd.exe in the Program/script file browser. Supply the argument -usersync in the Add arguments field. And finally, you will need to indicate the path you unzipped the files to in the Start in field. Once complete, click Next.
In the final step, you may review all of the settings of your task. Once you have completed your review, click Finish to complete the task set up.