This document describes how to configure Single Logout for AD FS. For general information, refer to Single Logout.
If you configured ADFS using the provided PowerShell script or manual setup instructions before Kantega SSO 3.5.0, enabling single logout may break login. We recommend applying the instructions below before enabling SLO. You'll know you have encountered the issue if you start seeing RESPONSE_MISSING_NAME_IDENTIFIER when trying to log in:
Begin configuration by navigating to your ADFS IDP and select Single Logout from the navigation menu. As of Kantega SSO 3.5.0 The logout URL should be populated and you can enable Single Logout and click "Save":
Read the following if the SAML provider logout URL for ADFS isn't already configured:
If the ADFS logout URL isn't specified already, it's most likely becaues your configuration predates Kantega SSO 3.5.0 where this URL wasn't being imported yet. It needs to be configured before Single Logout will work. You can either fill it manually, or do a metadata refresh against ADFS to obtain it. To refresh from metadata, use the indicated link in the nav menu. The ADFS metadata URL should already be on file and all you should have to do is click save. You may optionally upload a file.
Now go back to the Single Logout menu and if the logout URL is now populated, enable SLO and save.
We next need to configure ADFS. This will also be done by doing a metadata refresh. Open the AD FS Management application and navigate to Relying Party Trusts. Find the relying party for your application and right click it for this menu:
Click the Update button in the dialog that pops up.
To verify the import was successful, you may optionally right click the relying party again and this time select Properties. Navigate to the Endpoints tab and you should see that SAML Logout Endpoints have been detected:
Single Logout should now be enabled and working for new AD FS logins.