Create a Web Logon Procedure
- Login to the DualShield Administration Console
- In the main menu, navigate to “Authentication | Logon Procedures”
- Click the “+Create” button on the toolbar
- Enter a suitable “Name”, then select 'Type' from the drop-down as "Web SSO".

- Click “Save” to confirm creation.
- Click back on the context "..." menu of the newly created Logon Procedure, then select “Logon Steps”
- In the popup window on the right, select "+ ADD" button, to add a new authentication method.
- Select from the list the required authentication method, i.e. “Static Password” (AD Password)
- Click "Save" to add the Step.
- Repeat 7 - 9 for any additional authentication steps you wish to use:

Create a Web Application
- In the main menu, navigate to “Authentication | Applications”
- Click the “+ CREATE” button in the toolbar
- Enter an appropriate “Name”
- Select the internal “Realm”
- Select the Logon Procedure created previously.

- Click "SAVE" to complete the Application creation.
- Click the context "..." menu of the newly created application, then "Agents"

- Select the "Single Sign-on Server | SSO Server"
- Click "SAVE" button to confirm.
- Click the context "..." menu of the newly created Application, then "Self Test" to confirm all components are correctly associated.

Create a new Service Provider
- In the main menu, navigate to "SSO | Service Providers"
- Click the "+ CREATE" button
- Select the "Single Sign-on Server"
- Select the Sharepoint "Application" created previously
- Enter a suitable "Name"
- Select 'Type' as "WS-Federation"

- Click the 2nd tab named "Attributes"
- Select the "+ CREATE" button
You need to create an Attribute that matches "RoleClaims" and "Identity Claims", as specified in the PowerShell scripts that will be created in the SharePoint Configuration section.
- Select 'Location' as "HTTP Body"
- Enter an appropriate "Name"
- The 'Format' select from the drop-down "attrname-format:url"
- Within 'Value' select "Fixed Value" and set the Value as the actual name specified in the RoleClaims (replacing "NameOfRole" in this field). As per the following article: Link Groups Script
- From the drop-down, set the 'Claim Type' as setting "http://schemas.microsoft.com/ws/2008/06/identity/claims"

14. Click "SAVE" button to confirm creation of new Attribute.
Next create 'Identity Claims attributes' that will be mapped to AD Attributes. There would usually be 3 attributes, containing emailaddress, givenName and Surname (see SSO Script article)
You are able to map AD Attributes as follows.
16. Selecting 'Value' as "Maps to an identity attribute"
17. Then click the magnifying glass, to the right of the field....
18. Here you can change "Identity Source" to your internal AD Domain
19. Then "Maps To" you can select a specific Attribute from Active Directory. ie: "Email"....


Ensure checkbox "Return in Response" is enabled on all your Attributes.
20. Click "SAVE" to create the new Attribute.
21. Repeat for the other Attributes. Then you should have all 3 setup, like follows:

22. Finally click "SAVE" to confirm creation of these new Attributes.
{"serverDuration": 54, "requestCorrelationId": "9fb07c5c2f3d1b20"}