Relying Party Trust
Guide to ADFS Federation (Metadata Import Edition) | Lazy Admin Blog

How to set up a Relying Party Trust in 5 minutes using XML metadata.
Setting up a manual federation trust is a recipe for typos. If a 3rd party sends you a URL or an XML file, use it. Importing metadata ensures that certificates, identifiers, and endpoints are configured perfectly without you having to manually paste long strings of thumbprints.
1. The Pre-Reqs (Don’t start without these!)
Before you open the ADFS console, make sure you have:
- The Metadata: Either a file or a URL (e.g.,
https://adfs.xyz.com/federationmetadata/2007-06/federationmetadata.xml). - The Claim Mapping: Exactly which LDAP attribute they need (e.g., Employee-ID) and what it should be called on their end (e.g., Name ID).
- Contact Info: Name, email, and phone for their admin. Put this in the Notes field so the next admin isn’t hunting for it during a certificate expiry.
2. Step-by-Step: Adding the Trust
- Open ADFS Management and go to Trust Relationships > Relying Party Trusts.
- Right-click and select Add Relying Party Trust.
- Select Data Source: Choose “Import data about the relying party from a file” and point it to their
federationmetadata.xml. - MFA: Select “I do not want to configure multi-factor authentication” (unless required by your security policy).
- Authorization: Select “Permit all users to access this relying party.”
- Finish: On the final screen, open the Notes tab and paste the 3rd party contact details.
3. Configuring the Claim Rules
This is the “handshake” where you translate your AD data into something they can read.
- Right-click your new trust and select Edit Claim Rules.
- Click Add Rule and choose “Send LDAP Attributes as Claims.”
- Claim Rule Name: “Send EmployeeID as NameID” (Be descriptive!).
- Attribute Store: Active Directory.
- Mapping:
- LDAP Attribute:
Employee-ID - Outgoing Claim Type:
Name ID
- LDAP Attribute:
4. The “Lazy” Testing Method
Don’t wait for them to tell you it’s broken. Test it yourself:
- Go to your ADFS sign-on page:
https://your-adfs-url.com/adfs/ls/idpinitiatedsignon.htm. - Select the new trust from the list and sign in.
- The Proof: Take a screenshot of the successful login page and send it to the 3rd party. If you can see the trust, you’ve done your part.
This entry was posted in Active Directory and tagged Active Directory, ADFS Federation, Claim Rules, Exchange Federation, federationmetadata.xml, IDP Initiated Sign On, NameID Mapping, Relying Party Trust, SAML Metadata, SSO.