The external address for the router.
The external IP address of the router.
The HTTPS port for the router.
Select this check box to publish all applications except the Grid Management Pages via the SAML Router. Select this option if management of the grid is authenticated with a client certificate.
If load balancers or proxies are placed in front of the Grid, the SAML Session Provider needs to publish endpoints for those addresses, as described in Configuring Login and Logout Endpoints.
Write one entry per row in the format fqdn:port. The first entry will be configured as the Logout Endpoint, and will be used to form the Entity ID for the SAML Session Provider (to be used in IFS and AD FS). If nothing is added here, all login and logout endpoints are based on the SAML router properties defined above.
Select this check box to create Assertion Consumer Services for the Additional ACS endpoints only. No ACS value will be created based on the SAML Router properties. Select this option if all SAML authentication should pass via the load balancer - that is, no direct access to grid routers by end users.
The fully qualified domain name of the AD FS server.
The SSL port of the AD FS endpoint.
Provide the URI to the federation metadata. The default AD FS value is /FederationMetadata/2007-06/FederationMetadata.xml. The URI can found in the AD FS management console:expand "Service">"Endpoints". In the Metadata section, find the URL Path for the FederationMetadata.
The Secondary Identity Provider properties are only applicable in cloud scenarios.
After you click, the installer will get the SSL certificates from the AD FS server and you will have to confirm them before continuing. The installer will retrieve the AD FS metadata and parse it for suggested values for a later installation step.
After you click, the connection to IFS web services is validated and the credentials tested.
Change the value to http://schemas.infor.com/claims/Person