Single Sign-On with Microsoft Active Directory FS
This guide explains how to enable single sign-on (SSO) for applications being proxied by F5 NGINX Plus. The solution uses OpenID Connect as the authentication mechanism, with Microsoft Active Directory Federation Services (AD FS) as the Identity Provider (IdP) and NGINX Plus as the Relying Party (RP), or OIDC client application that verifies user identity.
This guide applies to NGINX Plus Release 34 and later. In earlier versions, NGINX Plus relied on an njs-based solution, which required NGINX JavaScript files, key-value stores, and advanced OpenID Connect logic. In the latest NGINX Plus version, the new OpenID Connect module simplifies this process to just a few directives.
Prerequisites
-
A Microsoft AD FS instance, either on-premises or in Azure, with administrator privileges.
-
An NGINX Plus subscription and NGINX Plus Release 34 or later. For installation instructions, see Installing NGINX Plus.
-
A domain name pointing to your NGINX Plus instance, for example,
demo.example.com
.
Configure the AD FS Server
Microsoft Active Directory Federation Services (AD FS) serves as the Identity Provider.
Create an AD FS Application
-
In AD FS, open the Server Manager.
-
In Server Manager, select Tools, and then select AD FS Management.
-
In AD FS Management, right-click on Application Groups and select Add Application Group.
-
On the Application Group Wizard Welcome screen:
-
Enter the Name of your application, for example,
NGINX Demo App
. -
Under Standalone applications, select Server application.
-
-
On the Application Group Wizard Server application screen:
-
Copy the Client Identifier value generated by AD FS. The client identifier is your AD FS Application ID, you will need it later when configuring NGINX Plus.
-
In Redirect URI, enter the Redirect URI for your NGINX Plus instance, for example,
https://demo.example.com/oidc_callback
, and then click Add.
-
-
On the Application Group Wizard Configure Application Credentials screen:
-
Select Generate a shared secret.
-
Copy and save the generated Client Secret, you will need it later when configuring NGINX Plus. You will not be able to view the secret after the application group is created.
-
Select Next to complete the steps for adding the application group.
-
Get the OpenID Connect Discovery URL
Check the OpenID Connect endpoint URL. By default, AD FS publishes the .well-known/openid-configuration
document at the following address:
https://adfs-server-address/adfs/.well-known/openid-configuration
.
-
Run the following
curl
command in a terminal:curl https://adfs-server-address/adfs/.well-known/openid-configuration | jq .
where:
-
the
adfs-server-address
is your AD FS server address -
the
/adfs/.well-known/openid-configuration
is the default address for AD FS for document location -
the
jq
command (optional) is used to format the JSON output for easier reading and requires the jq JSON processor to be installed.
The configuration metadata is returned in the JSON format:
{ ... "issuer": "https://adfs-server-address/adfs", "authorization_endpoint": "https://adfs-server-address/adfs/oauth2/authorize/", "token_endpoint": "https://adfs-server-address/adfs/oauth2/token/", "jwks_uri": "https://adfs-server-address/adfs/discovery/keys", ... }
-
-
Copy the issuer value, you will need it later when configuring NGINX Plus. Typically, the OpenID Connect Issuer for AD FS is:
https://adfs-server-address/adfs
.
You will need the values of Client ID, Client Secret, and Issuer in the next steps.
Set up NGINX Plus
With AF DS configured, you can enable OIDC on NGINX Plus. NGINX Plus serves as the Rely Party (RP) application — a client service that verifies user identity.
-
Ensure that you are using the latest version of NGINX Plus by running the
nginx -v
command in a terminal:nginx -v
The output should match NGINX Plus Release 34 or later:
nginx version: nginx/1.27.4 (nginx-plus-r34)
-
Ensure that you have the values of the Client ID, Client Secret, and Issuer obtained during AD FS Configuration.
-
In your preferred text editor, open the NGINX configuration file (
/etc/nginx/nginx.conf
for Linux or/usr/local/etc/nginx/nginx.conf
for FreeBSD). -
In the
http {}
context, make sure your public DNS resolver is specified with theresolver
directive. By default, NGINX Plus re‑resolves DNS records at the frequency specified by time‑to‑live (TTL) in the record, but you can override the TTL value with thevalid
parameter:http { resolver 10.0.0.1 ipv4=on valid=300s; # ... }
-
In the
http {}
context, define the AD FS OIDC provider namedadfs
by specifying theoidc_provider {}
context:http { resolver 10.0.0.1 ipv4=on valid=300s; oidc_provider adfs { # ... } # ... }
-
In the
oidc_provider {}
context, specify:-
Your actual AD FS Client ID from Step 5 of AD FS Configuration with the
client_id
directive -
Your Client Secret from Step 6 of AD FS Configuration with the
client_secret
directive -
The Issuer URL from Step 2 of AD FS Configuration with the
issuer
directiveThe
issuer
is typically your AD FS OIDC URL. By default, NGINX forms the provider metadata endpoint by appending.well-known/openid-configuration
to the issuer. For AD FS, this often resolves tohttps://adfs-server-address/adfs/.well-known/openid-configuration
. If your AD FS issuer differs fromhttps://adfs-server-address/adfs
(for example, a custom path), you can explicitly specify the metadata document with theconfig_url
directive. -
Important: All interaction with the IdP is secured exclusively over SSL/TLS, so NGINX must trust the certificate presented by the IdP. By default, this trust is validated against your system’s CA bundle (the default CA store for your Linux or FreeBSD distribution). If the IdP’s certificate is not included in the system CA bundle, you can explicitly specify a trusted certificate or chain with the
ssl_trusted_certificate
directive so that NGINX can validate and trust the IdP’s certificate.
http { resolver 10.0.0.1 ipv4=on valid=300s; oidc_provider adfs { issuer https://adfs.example.com/adfs; client_id <client_id>; client_secret <client_secret>; } # ... }
-
-
Make sure you have configured a server that corresponds to
demo.example.com
, and there is a location that points to your application (see Step 10) athttp://127.0.0.1:8080
that is going to be OIDC-protected:http { # ... server { listen 443 ssl; server_name demo.example.com; ssl_certificate /etc/ssl/certs/fullchain.pem; ssl_certificate_key /etc/ssl/private/key.pem; location / { # ... proxy_pass http://127.0.0.1:8080; } } # ... }
-
Protect this location with AD FS OIDC by specifying the
auth_oidc
directive that will point to theafds
configuration specified in theoidc_provider {}
context in Step 5:# ... location / { auth_oidc adfs; # ... proxy_pass http://127.0.0.1:8080; } # ...
-
Pass the OIDC claims as headers to the application (Step 10) with the
proxy_set_header
directive. These claims are extracted from the ID token returned by AD FS:-
$oidc_claim_sub
- a uniqueSubject
identifier assigned for each user by AD FS -
$oidc_claim_email
the e-mail address of the user -
$oidc_claim_name
- the full name of the user -
any other OIDC claim using the
$oidc_claim_
variable
# ... location / { auth_oidc adfs; proxy_set_header sub $oidc_claim_sub; proxy_set_header email $oidc_claim_email; proxy_set_header name $oidc_claim_name; proxy_pass http://127.0.0.1:8080; } # ...
-
-
Create a simple test application referenced by the
proxy_pass
directive which returns the authenticated user’s full name and email upon successful authentication:# ... server { listen 8080; location / { return 200 "Hello, $http_name!\nEmail: $http_email\nAD FS sub: $http_sub\n"; default_type text/plain; } }
-
Save the NGINX configuration file and reload the configuration:
nginx -s reload
Complete Example
This configuration example summarizes the steps outlined above. It includes only essential settings such as specifying the DNS resolver, defining the OIDC provider, configuring SSL, and proxying requests to an internal server.
http {
# Use a public DNS resolver for Issuer discovery, etc.
resolver 10.0.0.1 ipv4=on valid=300s;
oidc_provider adfs {
# The 'issuer' is typically your AD FS OIDC URL
# e.g. https://adfs.example.com/adfs
issuer https://adfs.example.com/adfs;
# Replace with your actual AD FS Client ID and Secret
client_id <client_id>;
client_secret <client_secret>;
}
server {
listen 443 ssl;
server_name demo.example.com;
ssl_certificate /etc/ssl/certs/fullchain.pem;
ssl_certificate_key /etc/ssl/private/key.pem;
location / {
# Protect this location with AD FS OIDC
auth_oidc adfs;
# Forward OIDC claims as headers if desired
proxy_set_header sub $oidc_claim_sub;
proxy_set_header email $oidc_claim_email;
proxy_set_header name $oidc_claim_name;
proxy_pass http://127.0.0.1:8080;
}
}
server {
listen 8080;
location / {
return 200 "Hello, $http_name!\nEmail: $http_email\nAD FS sub: $http_sub\n";
default_type text/plain;
}
}
}
Testing
-
Open
https://demo.example.com/
in a browser. You will be automatically redirected to the AD FS sign-in page. -
Enter valid AD FS credentials of a user who has access the application. Upon successful sign-in, AD FS redirects you back to NGINX Plus, and you will see the proxied application content (for example, “Hello, Jane Doe!”).
Legacy njs-based AD FS Solution
If you are running NGINX Plus R33 and earlier or if you still need the njs-based solution, refer to the Legacy njs-based Microsoft AD FS Guide for details. The solution uses the nginx-openid-connect
GitHub repository and NGINX JavaScript files.
See Also
Revision History
- Version 1 (March 2025) – Initial version (NGINX Plus Release 34)