My scenario: I have bunch of applications which supports SAML 2.0 and OIDC for SSO. All these applications are integrated with ADFS 4.0. Now, I have a requirement to provide access of these applications to the other Org users which are using a cloudbased
IAM.
I have established the delegated authentication (cross/chained federation) between ADFS and IAM and by using below powershell cmd, I am able to bypass ADFS login page and directly see the IAM login page for SAML based applications:
Set-AdfsRelyingPartyTrust
[-ClaimsProviderName <String[]>]
but for OIDC based applications, I am getting ADFS page which asks to select claim provider. I have used below:
Set-AdfsWebApiApplication -TargetName "App1" -ClaimsProviderName IAMSystem
but no luck. Please guide.