Embedded AI Assistant SSO Configuration (General SAML) + ADFS Configuration
Embedded AI Assistant SSO Configuration (General SAML) + ADFS Configuration
Embedded AI Assistant SSO Configuration (General SAML) + ADFS Configuration
This guide walks you through the general SSO SAML setup for Embedded AI Assistant using Active Directory Federation Services (ADFS). This will allow you to copy a code snippet of the AI Assistant and paste it onto any page governed by your SSO provider, and Embedded AI Assistant will just work, automatic authentication and all.
Open the ADFS Management Console on your ADFS server.
In the left pane, select “Relying Party Trusts” and then click Add Relying Party Trust to start the wizard.

Follow the wizard to configure the Relying Party Trust. You’ll need to provide the metadata or SAML configuration details provided by the service or application you want to integrate with.
In the Select data source step, toggle the option Enter data about the relying party manually.

Specify Display Name: Enter a display name for the Relying Party Trust (e.g., “Moveworks Embedded AI Assistant”) and an optional description. Click “Next.”
Configure Certificate: In most cases, you’ll use the token-signing certificate already configured in your ADFS. You can choose to use an existing certificate or create a new one. Click “Next.”
Configure URL: For the “Relying party trust identifier,” based on the info below
Region SAML ACS URL (also called single sign-on URL, Destination URL, Recipient URL)
United States (default) https://CUSTOMER_ID.moveworks.com/login/sso/saml
Canada https://CUSTOMER_ID.am-ca-central.moveworks.com/login/sso/saml
EU https://CUSTOMER_ID.am-eu-central.moveworks.com/login/sso/saml
Australia / Asia Pacific https://CUSTOMER_ID.am-ap-southeast.moveworks.com/login/sso/saml
Government Secure Cloud https://CUSTOMER_ID.moveworksgov.com/login/sso/saml

Relying Party Trust Identifier: Enter the identifier or entity ID provided by the service provider (SP). This identifier should match the SP’s expectations and is used to uniquely identify the relying party trust. Click Add to add it to the list.
If this is the second Relying Party Trust you are setting up in ADFS for the customer. You might see an issue for Identifier Duplications.
In this case you should change the Identifier to be www.moveworks.com
Choose Access Control Policy: In most cases, you can leave this at the default setting. These rules control which users are allowed to authenticate to this RPT.
Ready to Add Trust: Review your settings. If everything looks correct, click “Next” to create the RPT. This completes the steps for creating a Relying Party Trust.
Next, you’ll create rules, or assertion claims, for your relying party trust – in this case, Moveworks only receives the outgoing claim type attributes and values, so the list of attributes might look different
With the RPT now created, you need to configure claim rules. In the “Relying Party Trusts” section of the ADFS Management Console, right-click on your new RPT and select Edit Claim Rules….
The Edit Claim Rules for the RPT window will appear. Here, you can add, edit, or remove claim rules as needed. These rules determine how attributes from your Active Directory are transformed into SAML assertions for the service provider.
Add Rule: To add a new rule, click “Add Rule…” and follow the wizard. You might create rules like “LDAP Claims” or “Transform Email Address.”

Create Rule: Transform email to NameID.

In the “Add Transform Claim Rule Wizard,” select “Send Claims Using a Custom Rule” and click Next.
Enter a name for the claim rule (e.g., “RelayState” which is the org_name in this case) and configure the custom rule.
From ADFS’s Encryption tab, copy your entire token-signing x.509 certificate and paste it in the Public certificate field.

This Certificate will be used when setting up the SSO Config on the Moveworks end.

The Script content in the case of ADFS differs because here we need to add the RelayState and the RPID as part of the Server URL. Here is the Documentation Link for reference on how these are structured.
Generating the right link can be a bit challenging at time. You can use the following ADFS Relay state Generator to help with that https://jackstromberg.com/adfs-relay-state-generator/
Essentially the Structure of the Server URL will be as follows (Example):
https://adfs.company-vd.com/adfs/lsmoveworks.comExample of how this will look on the Server:

You will need to follow the Embedded AI Assistant Configuration Guide to complete the remaining setup steps if you have not done so already.