This guide explains how to configure Single Sign-On (SSO) between your company’s Active Directory Federation Services (ADFS) and iChemistry using the SAML 2.0 protocol.
1. Prerequisites
Before starting, please make sure you have:
- Access to your organization’s ADFS Management Console (administrator permissions required).
 - The following iChemistry SSO configuration details:
 
Setting  | Value  | 
Entity ID  | iChemistrySSO  | 
Login URL (Initiation)  | Your iChemistry login link  | 
Reply URL (Assertion Consumer Service URL)  | https://ichemistry.intersolia.com/SingleSignOn/Login  | 
2. Add a New Relying Party Trust
- Open ADFS Management on your ADFS server.
 - In the Actions pane, click Add Relying Party Trust...
 - The Add Relying Party Trust Wizard will open.
 - Choose Claims aware and click Start.
 - Select Enter data about the relying party manually → click Next.
 - Enter a name, e.g. iChemistry SSO.
 - (Optional) Add a description like “Single Sign-On integration for iChemistry via SAML2”.
 - Click Next.
 
3. Configure Identifiers and Endpoints
Identifiers (Entity ID)
- Click Add...
 - Enter the following value:
 - iChemistrySSO
 
Endpoints
- Under “Configure URL”:
- Check Enable support for the SAML 2.0 WebSSO protocol.
 - In Relying party SAML 2.0 SSO service URL, enter:
 - https://ichemistry.intersolia.com/SingleSignOn/Login
 
 - Click Next.
 - Under Relying party trust identifier, make sure the following is added:
 - iChemistrySSO
 
Click Next, then Next again to skip multi-factor options (unless your policy requires it).
4. Choose Access Control Policy
Select one of the following options:
- Permit everyone — if all users in your organization should be able to access iChemistry.
 - Or Permit specific group — to restrict access to a specific AD group (e.g., “iChemistry Users”).
 
Click Next and then Close to finish the wizard.
5. Add Claim Rules
After the trust is created, the wizard will prompt to open the Edit Claim Issuance Policy window.
If it doesn’t open automatically, right-click your new relying party trust → Edit Claim Issuance Policy.
Now add the following claim rules, in order:
Rule 1: Send LDAP Attributes as Claims
- Click Add Rule…
 - Select Send LDAP Attributes as Claims.
 - Click Next.
 - Enter rule name:
Send user attributes - Configure as follows:
 
LDAP Attribute  | Outgoing Claim Type  | 
E-Mail-Addresses  | userEmail  | 
Display-Name  | userFullName  | 
Employee-Number  | userId  | 
If your AD doesn’t have Employee-Number, you can skip that here and add a constant value in the next step.
Click Finish.
Rule 2: Transform Constant Claims (Optional Defaults)
- Click Add Rule…
 - Select Send Claims Using a Custom Rule.
 - Click Next.
 - Name it Add constant claims.
 - Copy-paste this rule text:
 
c:[Type == "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress"]
=> issue(Type = "userRole", Value = "Read-only user"),
issue(Type = "departmentId", Value = "SSO");
This ensures every user gets a default role (“Read-only user”) and department (“SSO”).
 These can later be updated manually in iChemistry.
Click Finish.
6. Verify Claim Output
Your final Claim Rules list should include:
- Send user attributes
 - Add constant claims
 
All attributes must match exactly (case-sensitive):
Claim Name  | Example Value  | Purpose  | 
userEmail  | jane.doe@company.com  | Unique user ID / login  | 
userFullName  | Jane Doe  | Display name  | 
userId  | 12345  | Optional employee number  | 
departmentId  | SSO  | Default organization  | 
userRole  | Read-only user  | Default permission group  | 
7. Export Federation Metadata
- In ADFS Management, expand Service → Endpoints → confirm /FederationMetadata/2007-06/FederationMetadata.xml exists.
 - Open your federation metadata URL in a browser, usually:
 - https://<your-adfs-domain>/FederationMetadata/2007-06/FederationMetadata.xml
 - Save the XML file and send it to your Intersolia contact.
 
8. Test and Verify
Once Intersolia confirms SSO is enabled:
- Open the iChemistry login link (e.g. https://ichemistry.intersolia.com/main/returkraft).
 - You should be redirected to your ADFS login page.
 - After authentication, iChemistry will:
- Create an account automatically (if none exists),
 - Assign it default permissions, and
 - Grant access.
 
 
9. Common Issues & Solutions
Problem  | Solution  | 
Missing claims in SAML response  | Make sure userEmail, userFullName, userRole, and departmentId are all included.  | 
Empty attributes  | If an AD field is empty, use constant values (e.g. “SSO”).  | 
Access denied  | Confirm the user is allowed by your Access Control Policy.  | 
User not created  | Verify userEmail matches an actual iChemistry domain user address.  | 
10. What Happens Next
After you send the Federation Metadata XML, Intersolia will complete configuration on the iChemistry side.
 Once finished, local logins for your domain will be disabled, and your users will authenticate via ADFS automatically.