Configure AD FS SSO with Engagedly
Table of contents
- Introduction
- Configure SAML SSO in Engagedly
- Create a relying party trust in AD FS
- Configure claim rules
- Add AD FS details to Engagedly
1. Introduction
Active Directory Federation Service (AD FS) allows users to sign in to Engagedly using their existing Windows or Active Directory credentials.
This integration helps admins enable single sign-on (SSO), centralize authentication, improve security, reduce password-related issues, and simplify user management.
📒Note: Admins and users with integration permissions are authorized to configure this integration.
For more information about SSO integrations, refer to the Overview of integrations.
📒Note: This document covers the integration setup for both Tangerine (V2) and Indigo (V3). Screenshots are captured from Indigo (V3), so the user interface may vary slightly in Tangerine.
Prerequisites
- Install and configure AD FS on your Microsoft server.
- Ensure users exist in AD FS with first name, last name, and email address.
- Ensure the same users exist in Engagedly with matching email IDs.
2. Configure SAML SSO in Engagedly
Navigate to Settings > Integrations.
- In the "SSO" field, click SAML Single Sign On.
- Click ADD at the to right.
- Enter an identifier name as required and click SAVE.

Engagedly generates the ACS URL and Entity ID.
3. Create a relying party trust in AD FS
- In the “Windows Server Management”, select Tools, open AD FS Management, and select the Relying Party Trusts folder.
- In the right panel, click Add Relying Party Trust in the “Actions” section.

3. Click Start to begin the setup wizard.
4. In the left panel, click Select Data Source, select Enter data about the relying party manually, and click Next.

5. Enter the display name as required and click Next.
6. (Optional) Add notes after entering the display name.

7. Select the AD FS profile, and click Next.

8. Skip the certificate step and click Next.
Configure SAML settings
- Select Enable support for the SAML 2.0 WebSSO protocol.
- Paste the ACS URL from Engagedly into the “Relying party SAML 2.0 SSO service URL” field, and click Next.

3. Paste the Entity ID from Engagedly into the “Relying Party Identifier” field, and click Next.
4. Skip multi-factor authentication (MFA) unless required.
5. Select I do not want to configure multi-factor authentication settings for this relying party trust at this time, and click Next.

6. Select Permit all users to access this relying party and click Next.
7. Click Close to exit.
The relying party trust is successfully created.
4. Configure claim rules
You must add two claim rules.
Rule 1: Send LDAP attributes
- Click Add Rule.
2. In the “Claim rule template” drop-down, select Send LDAP Attributes as Claims and click Next.

3. Enter a name for the claim rule as required.
4. In the “Attribute store” drop-down, select Active Directory.
5. In the “LDAP Attribute” and “Outgoing Claim Type” fields, select E-Mail-Address and click Finish

Rule 2: Transform claim (Mandatory)
- Click Add Rule.
2. In the “Claim rule template” drop-down, select Transform an Incoming Claim, and click Next.

3. Enter a name for the claim rule as required.
4. Set:
-
- Incoming claim type: E-mail Address
- Outgoing claim type: Name ID
- Outgoing name ID format: Email Address
5. Select Pass through all claim values and click Finish.

5. Add AD FS details to Engagedly
Configure the relying party trust settings.
- Right-click the newly created Relying Party Trust and select Properties.
- Select the Advanced tab and then select SHA-1 from the drop-down.
- Select the Monitoring tab.
- In “AD FS Management”, paste the ACS URL (from Engagedly) into the “Relying Party’s Federation Metadata URL” field, and click Test URL.
Close the wizard if the configuration settings are correct, and it works well.
Get metadata
- In “AD FS Management”, select Service/Endpoints > Metadata > Type: Federation Metadata.
- Download the metadata XML file.
- Copy the following values, paste them into Engagedly, and click Save:
| AD FS value | Paste into Engagedly field |
|
Single Sign-On URL |
Identity Provider Single Sign On URL |
| Relying Party Trust Identifier | Identity Provider Issuer |
| Token-signing certificate | Identity Provider X.509 Certificate |
Export certificate
- In “AD FS Management”, select these folders in the left panel: AD FS > Services > Certificates.
- In the “Token-signing” field, double-click the certificate.

3. In the “Certificate” pop-up, open the Details tab, select Copy to File, and then click OK.
4. In the “Certificate Export Wizard pop-up”, click Next.
5. Select Base-64 encoded X.509 and click Next.
6. Click Browse and follow the prompts to export the certificate.
7. Click Finish in the “Certificate Export Wizard” pop-up.
8. Open the downloaded certificate in a text editor and copy the entire content, including the ----- BEGIN CERTIFICATE-----and----- END CERTIFICATE----- lines.

9. Paste the certificate content into the ”Identity Provider X.509 Certificate” field in Engagedly and click SAVE.
10. (Optional) Click Test Connection to verify the setup.
11. Use the toggle to activate authentication using SAML and click SAVE.

Users can now sign in to Engagedly using their Active Directory credentials through AD FS SSO.