Configuring SSO with ADFS
  • 14 Sep 2022
  • 3 Minutes to read
  • Dark
    Light

Configuring SSO with ADFS

  • Dark
    Light

SSO is a feature only available for Airtable Enterprise payment plans. If you are interested in inquiring about enterprise pricing, you can contact us here.

This article is intended for administrators setting up SSO for their teams.

If you are looking for information on setting up SSO with Okta, please read this article instead.
If you are looking for information on setting up SSO with Google, please read this article instead.
If you are looking for information on setting up SSO with Azure AD, please read this article instead.
If you are looking for information on setting up SSO with OneLogin, please read this article instead.

The following is a list of instructions for configuring SSO with ADFS.

ADFS

Setting up SSO for ADFS

In the left navigation pane of ADFS, select Relying Party Trust, then Add Relying Party Trust, then Start.

Picture1.png

Click the radio button option to Enter data about the relying party manually, then click the Next button.

Picture2.png

You can enter whatever display name you want (like "Airtable") and any optional notes—then click the Next button again.

Picture3.png

Next, pick AD FS profile as the configuration profile.

Picture4.png

Click the Next button on the Configure Certificate page.

Picture5.png

For the Configure URL page, check the Enable support for the SAML 2.0 WebSSO protocol box and paste in this URL: https://airtable.com/auth/ssoCallback

Picture6.png

For the Configure Identifiers page, add https://airtable.com/sso/metadata0418.xml as a Relying party trust identifier.

Picture7.png

On the Configure Multi-factor Authentication Now? page, choose the "I do not want to configure multi-factor authentication settings for this relying party at this time." option.

Picture8.png

On the Choose Issuance Authorization Rules page, select the "Permit all users to access this relying party" option.

Picture9.png

On the final screen, check the "Open the Edit Claim Rules dialog for this relying party trust when the wizard closes" box. This will open the Edit Claim Rules dialog once you click the Close button.

Picture10.png

Once in the Edit Claim Rules dialog, go to the Issuance Transform Rules tab, then click the Add Rule button. This will open up the Add Transform Claim Rule Wizard.

Picture11.png

From within the Add Transform Claim Rule Wizard, you will be asked to Choose Rule Type. From the Claim rule template dropdown, select the Send LDAP Attributes as Claims option.

Picture12.png

Give your claim rule a name (like "LDAP Email") and map the E-Mail-Addresses LDAP attribute in the left column to the E-Mail Address outgoing claim type in the right column.

Picture13.png

You'll need to add another Transform Claim Rule here. This time, select the Transform an Incoming Claim option from the Claim rule template dropdown.

Picture14.png

Give this claim rule a name (like "Email Transform"), then set the following values:

  • Set Incoming claim type to E-Mail Address
  • Set Outgoing claim type to Name ID
  • Set Outgoing name ID format to Email
  • Select the Pass through all claim values radio button

Airtable also supports the following additional attribute maps:

  • "urn:oid:2.5.4.4" -> Basic Information; Last Name
  • "urn:oid:2.5.4.42" -> Basic Information; First Name

When you're done, click the OK button to save this Claim rule, and OK again to exit the Transform Claim Rule Wizard.

Next, you'll need to edit Airtable's relying trust properties. Under the Advanced tab, select SHA-256 as the secure hash algorithm. Then, copy the following X.509 certificate and save it to something like airtable.crt:

-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

Under the Signature tab, click Add, then upload airtable.crt. Click OK to complete. Next, you'll need to export your token signing certificate. In ADFS, click the Certificates folder, then Token Signing certificate.

Click the Details tab, then click the Copy to File button.

Picture15.png

Next, export as a Base-64 encoded X.509 (.CER) file.

Picture16.png

After that, submit your sign on URL and x.509 certificate (you can open the .cer file in a text editor and copy-paste it in) following the steps in this article.

After you have completed these steps, you should be able to log in from https://airtable.com/sso/login.

Troubleshooting

If you encounter any issues or need additional assistance, please contact us. If there are any relevant ADFS logs (Control Panel -> Administrative Tools -> Event Viewer -> Applications and Services Logs -> AD FS -> Admin), please include them in your email.


Was this article helpful?