Skip to main content
The ADFS connector integrates the Maverics Orchestrator with Microsoft Active Directory Federation Services — enabling OIDC-based authentication for applications that rely on ADFS for identity federation.
Console terminology: In the Maverics Console, this section is called Identity Fabric. The YAML configuration uses the connectors key to define identity provider integrations.

Overview

The ADFS connector uses OpenID Connect to federate authentication with ADFS. It uses type: adfs in the connector configuration and communicates with ADFS via its OIDC endpoint. It is designed for organizations modernizing their identity infrastructure — allowing you to migrate away from ADFS without disrupting existing applications or requiring simultaneous cutover of all relying parties.
The Maverics connector communicates with ADFS using the OIDC protocol. While ADFS supports WS-Federation and SAML natively, the Orchestrator uses the ADFS OIDC endpoint for authentication flows.

Use Cases

  • ADFS-to-cloud migration — Gradually move relying parties from ADFS to cloud-based identity providers without downtime
  • ADFS modernization — Add modern authentication capabilities (MFA, conditional access) to ADFS-protected applications without modifying ADFS itself
  • Hybrid on-prem/cloud federation — Bridge ADFS with cloud identity providers for organizations in transition

Configuration

Console UI documentation is coming soon. This section will walk you through configuring this component using the Maverics Console’s visual interface, including step-by-step screenshots and field descriptions.
ADFS configuration screen in Maverics Console

Configuration Reference

KeyTypeRequiredDescription
namestringYesUnique connector identifier referenced in app policies
typestringYesMust be adfs
oidcWellKnownURLstringYesOIDC discovery endpoint URL (ADFS OIDC endpoint)
oauthClientIDstringYesOAuth 2.0 client ID registered in ADFS
oauthClientSecretstringYesOAuth 2.0 client secret (use secret reference syntax)
oauthRedirectURLstringYesCallback URL registered in the ADFS application group
scopesstringNoSpace-separated OAuth scopes (default: openid profile email)
oauthExtraParamsmapNoAdditional query parameters for the authorization request
tlsstringNoNamed TLS profile for provider communication
For the complete field reference including health checks, offline access, and PKCE settings, see Identity Fabric.

Troubleshooting

  • Verify the oidcWellKnownURL is accessible from the Orchestrator host — the ADFS OIDC discovery endpoint is typically at {adfs-host}/adfs/.well-known/openid-configuration
  • Ensure the oauthRedirectURL matches exactly what is registered in the ADFS application group configuration
  • Check that the client secret reference resolves correctly via your secret provider