#
This topic details how to setup an OpenID Connect Configuration for an on-prem server without an option to utilize internet connected SaaS authentication services.
Prerequisites
- Refer to the hardware requirements for the server deployment: Getting Started
- During the Bootstrap process, use the Custom option for this AD FS setup.
- Verify that you have AD FS installed and configured: In your server manager, navigate to Server Rules and check that Active Directory Federation Services (Installed) is checked.
Configuring an AD FS Authentication Application
- In your Server Manager, select Tools > AD FS Management.
- Under Application Groups, select Add Application Group.
-
Select Server application accessing a web API.

- Under Welcome, give it a Name and Description, click Next.
- Under Server application, from the Client Identifier field copy the ID and paste it into a notepad file or other location for later use.
- For Redirect URI, enter your Hydden platform’s redirect URL, for example something like: https://my-new-hydden-server.demo.lab:22101/auth/oidc/callback. You can copy this from the Add OpenID Connect Configuration or Edit OpenID Connect Configuration modal in Hydden.
- Click Add and Next.
- Under Configure Application Credentials, select Generate a shared secret, and copy the secret to the clipboard. You might want to store it with the previously saved Client Identifier.
- Under Configure Web API, into the Identifier field, paste the previously saved Client Identifier.
- Click Add and Next.
- Under Apply Access Control Policy, you may first opt for Permit everyone amd adjust those permissions later.
- Click Next.
- Under Configure Application Permissions > Permitted scopes, add allatclaims, email, openID, and profile.
- Click Next.
- Review the Summary and click Next.
- Click Close.
-
You may now review the properties for your application, which will look something like this:

Next you need to add Issuance Transform Rules.
- Select the Hydden - Web API app.
- Navigate to the Issuance Transform Rules tab.
- Click on Add Rule.
- For Choose Rule Type, select Send LDAP Attributes as Claims and click Next.
-
Enter a name, for example, Hydden Attributes.

- Select Active Directory for the Attribute Store.
-
Add the five mapping rules as shown in the image above: E-Mail_Addresses, Company, Telephone-Number, Given-Name, Surname.
[!note]
For AD FS users to register and/or authenticate with Hydden, they must have a valid email address and First and Last Name configured in AD, the company association is optional.
Further editing or retrieval of application specifics is always available via the properties dialog.
Configuring the OpenID Provider
- In Hydden, navigate to Configuration > Tenant and select the OpenID Provider tab.
- Click + Add Provider.
- From the Provider drop-down, select Custom.
- Give your provider a name, for example, Active Directory (AD FS).
- Under Client ID, enter the previously saved Client Identifier string.
- Under Client Secret, enter the previously saved Shared Secret string.
- Under Issuer, enter the name of your AD FS server on which your created the server application and add /adfs to the address. For example, https://{yourADFSServerName}/adfs.
-
Under Switch Prompt, select login.

- Click Add.
You should now see an AD FS login prompt:
