Configure authenticator support
You can configure the SafeNet Agent for Active Directory Federation Services (ADFS) to support multiple types of authenticators:
-
User choice of authenticator (UCA): UCA allows users to select from their available authentication methods during AD FS sign-in. When a user signs in, they are presented with a list of the authentication methods that they have enrolled in SafeNet Authentication Service Private Cloud Edition (SAS PCE).

-
FIDO authenticators: In addition, you can configure the agent to support FIDO authenticators as one of the authentication methods that users can select.
Configure UCA support
After you install SafeNet Agent for ADFS, you can configure the agent to support UCA. Users can then choose their preferred authentication method when they sign in.
To configure UCA support, you must update the following files:
-
ADFSConfig.agentis the agent configuration file. -
SAFENET-MFA.iniis the agent initialization file.
Update the agent configuration file
In the agent configuration file (ADFSConfig.agent), replace the required values with the corresponding information from SAS PCE.
-
In SAS PCE, go to System > Setup > Agent Communication with JWT Token.

-
Under Generate the JSON Web Token (JWT), select Generate.

-
Copy the entire generated JWT and paste it in a text editor.
-
In SAS PCE, go to Virtual Servers > Comms > Authentication Processing > Authentication Agent Settings.

-
At the end of the Token Validator URL, copy the orgCode value and paste it in the text editor.
-
On the local drive where you installed the agent, go to Program Files > SafeNet > SAS > SafeNetMFA > bin, and open the ADFSConfig.agent file in a text editor.

-
Locate the string:
"AgentCommunicationJWT": "<AGENT_COMMUNICATION_JWT>" -
Select the
<AGENT_COMMUNICATION_JWT>value, and paste the JWT value that you generated in SAS PCE.All the content in the ADFSConfig.agent file must be in one line.

-
Locate the string:
"orgCode": "<ORG_CODE>" -
Select the
<ORG_CODE>value, and paste the token validator orgCode that you copied in SAS PCE.
The AD FS sign-in page can now list multiple authenticator options.
Update the INI file
Update the configuration parameters in the SAFENET-MFA.ini file.
-
On the local drive where you installed the agent, go to Program Files > SafeNet > SAS > SafeNetMFA > ini, and open the SAFENET-MFA.ini file in a text editor.

-
Set the
IdpEnvironmentvalue to0or1:- `0` (Default) Indicates that UCA is enabled. - `1` Indicates that legacy variant of the agent is enabled. -
For the
AuthAttemptsvalue, specify the maximum number of allowed authentication failure attempts. This value must exactly match the Account lock threshold that is defined in the account lockout policy in SAS PCE. The default value is3. -
To ensure that all changes made in the
ADFSConfig.agentandSAFENET-MFA.inifiles are applied successfully, on the ADFS Management Console (SafeNet Agent for ADFS), disable and then re-enable the agent.
Configure FIDO support
FIDO authenticators enable strong, phishing-resistant authentication with passkeys and platform authenticators.
After you configure UCA support, you can configure SafeNet Agent for ADFS to support FIDO authenticators. FIDO authentication does not work without UCA.
To configure FIDO support, you need to provide values in the agent configuration (ADFSConfig.agent) and initialization (SAFENET-MFA.ini) files. You can get the values from SAS PCE.
After you configure FIDO support, users can sign in with their FIDO authenticator.
-
In SAS PCE, go to System > Communications > FIDO Server Settings.

-
Copy the following values and paste them in a text editor:
- FIDO URL
- SAE URL
-
Go to Virtual Server > Self-Service > Configuring Self-Service > FIDO Enrollment.

-
Copy the FIDO Enrollment URL and paste it in your text editor.
-
On the local drive where you installed the agent, go to Program Files > SafeNet > SAS > SafeNetMFA > bin, and open the ADFSConfig.agent file in a text editor.

-
Locate the string:
"SAE":{"url":"<SAE_URL>","realmName":"<SAE_REALM_NAME>","tenantId":"<SAE_TENANT_ID>","username":"<SAE_USERNAME>","password":"<SAE_PASSWORD>"} -
Replace the values in the agent configuration file with the information that you copied from SAS PCE as follows:
Value in ADFSConfig.agent Value to use urlEnter the SAE URL from the FIDO Server Settings realmNameEnter the realm name, for example master.tenantIdLocated at the end of the FIDO Enrollment URL, after realms.userNameEnter the SafeNet Access Exchange (SAE) administrator credentials. passwordEnter the SAE administrator credentials. 
All the content in the ADFSConfig.agent file must be in one line.
-
On the local drive where you installed the agent, go to Program Files > SafeNet > SAS > SafeNetMFA > ini, and open the SAFENET-MFA.ini file in a text editor.

-
Replace the values in the agent initialization file with the information that you copied from SAS PCE as follows:
Value in SAFENET-MFA.ini Value to use FIDO2_API_URLFIDO URL from FIDO Server Settings FIDO_ENROLLMENT_URLFIDO Enrollment URL from FIDO Enrollment -
Save both the ADFSConfig.agent and SAFENET-MFA.ini files.
-
To ensure that all changes made in the
ADFSConfig.agentandSAFENET-MFA.inifiles are applied successfully, on the ADFS Management Console (SafeNet Agent for ADFS), disable and then re-enable the agent.