Which the launch of Sitecore 9.1 came the introduction of the identity server to Sitecore list roles. You can find a lot more information about the Identity Server here https://identityserver.io/- Personally I think this I is great enhancement and add are more easy extendable way of enabling 3 party authentication providers to Sitecore. As standard the Identity server runs on Sitecore HOST https://doc.sitecore.com/developers/91/sitecore-experience-management/en/sitecore-host.html And ships with the possibility to use Azure AD and the Identiytserver.Contrib.Membership module allowing for cloud AD and the old DB style of authenticating in Sitecore. This also means the the old Sitecore AD module is now deprecated and no longer supported. So in this blog post I will show how to integrated a On Premise Ad with Sitecore Idenityserver hosted on Sitecore Host.

First you need a AD of course and then you need ADFS server to act as a authentication provide to the Identityserver. This however is a little out of scope for this post. But here is two great links on how to configure and forward AD groups as roles

https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/operations/create-a-rule-to-send-group-membership-as-a-claim

https://stackoverflow.com/questions/55494354/user-groups-as-claims-through-openid-connect-over-adfs

Before we get to code you need to know about this nuget feed related to Sitcore Identity

https://sitecore.myget.org/F/sc-identity/api/v3/index.json

Since this feed contains some of packages needed. So this project or solution rather is to use OpenId Connect against the with the ADFS server

The solution consist of three class’ i will briefly show them here below

The App Settings classe seen below for retrieving the Setting for the Provider

public class AppSettings { public static readonly string SectionName = "Sitecore:ExternalIdentityProviders:IdentityProviders:ADFS"; public ADFSIdentityProvider ADFSIdentityProvider { get; set; } = new ADFSIdentityProvider(); }

The ADFSIdentityProvider which allows for a type strong way of accessing settings related to the module.

public class ADFSIdentityProvider { public bool Enabled { get; set; } public string Authority { get; set; } public string ClientId { get; set; } public string AuthenticationScheme { get; set; } public string MetadataAddress { get; set; } public string DisplayName { get; set; } }

And the CongifugreSitecore class which handles the communication with ADFS server

using System; using System.Security.Claims; using System.Threading.Tasks; using Microsoft.AspNetCore.Authentication; using Microsoft.AspNetCore.Authentication.OpenIdConnect; using Microsoft.Extensions.Configuration; using Microsoft.Extensions.DependencyInjection; using Microsoft.Extensions.Logging; using Microsoft.IdentityModel.Tokens; using Sitecore.Framework.Runtime.Configuration; namespace Sitecore.IdentityServer.ADFS { public class ConfigureSitecore { private readonly ILogger _logger; private readonly AppSettings _appSettings; public ConfigureSitecore(ISitecoreConfiguration scConfig, ILogger logger) { this._logger = logger; this._appSettings = new AppSettings(); scConfig.GetSection(AppSettings.SectionName); scConfig.GetSection(AppSettings.SectionName).Bind((object)this._appSettings.ADFSIdentityProvider); } public object IdentityServerConstants { get; private set; } public void ConfigureServices(IServiceCollection services) { ADFSIdentityProvider adfsProvider = this._appSettings.ADFSIdentityProvider; if (!adfsProvider.Enabled) return; _logger.LogDebug($"Adding ADFS clientId {adfsProvider.ClientId} Authority {adfsProvider.Authority} Scheme {adfsProvider.AuthenticationScheme}"); new AuthenticationBuilder(services).AddOpenIdConnect(adfsProvider.AuthenticationScheme, adfsProvider.DisplayName, (Action)(options => { options.SignInScheme = "idsrv.external"; options.SignOutScheme = "idsrv"; options.RequireHttpsMetadata = false; options.SaveTokens = true; options.Authority = adfsProvider.Authority; options.ClientId = adfsProvider.ClientId; options.ResponseType = "id_token"; options.MetadataAddress = adfsProvider.MetadataAddress; options.TokenValidationParameters = new TokenValidationParameters { NameClaimType = "name", RoleClaimType = "roles" }; //Added to enable DEBUG to see all claims //Can be removed in production options.Events = new OpenIdConnectEvents() { OnTokenValidated = (context) => { //This identity include all claims ClaimsIdentity identity = context.Principal.Identity as ClaimsIdentity; //ADD break POINT to see all the claims, return Task.FromResult(0); } }; })); } } }

With the solution build you can deploy this to your Identity Server in sitecoreruntime folder in a production folder. The installationor placement of files should look like below.

The Sitecore Plugin manifest should point to your assembly name an example given below.

And for the configuration files placed in Config folder is here an examplereplace clientid and autherityaddress and metaaddress with your own values

with that in place you can go ahead and restart the application pool for the identityserver to load in the configurations and you should see the AD login button.

clicking on the button should take you t your ADFS server for authentication, after taht you should be redirect to Sitecore.

Mapping of claims to roles works the same as with Sitecore Azure Ad implementation.

You can find the code for this on github

https://github.com/istern/Sitecore.IdentityServer.ADFS