Skip to content

Install Mideye ADFS Module for Push, SMS & TOTP MFA

Mideye ADFS Module lets users login with Mideye OTP alternatives in the ADFS portal.

  • SMS OTP
  • Touch Accept
  • Offline Challenge
  • Token Authentication
  • Yubikey Authentication

Supported ADFS-versions are:

Windows ServerADFS versionStatus
20194.0Supported
20163.0Supported
2012 R22.0Not supported (EOL)

Release notes →


This guide requires a working ADFS environment. Refer to Microsoft-documentation on how to configure ADFS before proceeding with this integration document.


Run the ADFS-package as an administrator. Mideye ADFS module installer — run as administrator

Specify installation folder. Use default for easier troubleshooting. Mideye ADFS module — select installation folder

Click Install.

Mideye ADFS module — ready to install confirmation

Add all Mideye Servers to the list. Default port is 1812. Timeout should be 35 multiplied with number of Mideye Servers in the list.

Mideye ADFS module — add Mideye Servers to RADIUS list

Configure Shared Secret for all Radius Client/Server communication. Mideye ADFS module — configure RADIUS shared secret

Choose language for informational / error messages and finish the installation.

Mideye ADFS module — select language and finish installation


Open AD FS management console and navigate to Access Control Policies. Remove all relying parties from any MFA policies. ADFS management console — Access Control Policies, remove MFA policies

Navigate to Authentication Methods and click Edit Multi-factor authentication methods. ADFS management console — Authentication Methods, edit MFA methods

Uncheck the Mideye ADFS-module and click OK. ADFS — uncheck Mideye module from authentication methods

ADFS — Apps and Features, uninstall Mideye ADFS module Open Control Panel and navigate Remove/Add programs. Uninstall the Mideye ADFS module.

ADFS — confirm uninstall complete in PowerShell To make sure that all register keys are removed from any older versions, open Powershell as an administrator and run

Terminal window
Unregister-AdfsAuthenticationProvider -Name Mideye.ADFS -Confirm:$false

Check if Mideye ADFS Module is in use. There should be no Mideye.ADFS output before continuing to next step.

Terminal window
(Get-AdfsGlobalAuthenticationPolicy).AdditionalAuthenticationProvider

If Get-AdfsGlobalAuthenticationPolicy output other than Mideye.ADFS. Add it to Set-AdfsGlobalAuthenticationPolicy command.

With only Mideye.ADFS output.

Terminal window
Set-AdfsGlobalAuthenticationPolicy -AdditionalAuthenticationProvider {}

With other services in output.

Terminal window
Set-AdfsGlobalAuthenticationPolicy -AdditionalAuthenticationProvider {OtherService}

Uninstall Mideye Authentication Provider for ADFS

Terminal window
$uninstall64 = gci "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" | foreach { gp $_.PSPath } | ? { $_ -match "Mideye Authentication Provider for ADFS" } | select UninstallString
if ($uninstall64) {
$uninstall64 = $uninstall64.UninstallString -Replace "msiexec.exe","" -Replace "/I","" -Replace "/X",""
$uninstall64 = $uninstall64.Trim()
Write "Uninstalling..."
start-process "msiexec.exe" -arg "/X $uninstall64 /qb" -Wait}

Verify no Mideye.ADFS module is present in ADFS.

Terminal window
Unregister-AdfsAuthenticationProvider -Name Mideye.ADFS -Confirm:$false

This should show following output.

Terminal window
WARNING: PS0105: No authentication provider with name 'Mideye.ADFS' is present in the policy store.

A update of the module consists of two steps. Uninstall and Install.

[First step is to follow the uninstall guide](#uninstall-mideye-adfs-module).
[Second step is to follow the install guide](#install-mideye-adfs-module).
If the Mideye ADFS Module is present when installing new update there will be some errors when trying to configure and uninstall the Mideye ADFS Module.

The Mideye ADFS Module is configured via the Configuration Editor found in "C:\Program Files\Mideye\ADFS\Mideye ADFS Configuration Editor.exe" This needs to be opened with Administrator privileges.

Enabling Mideye MFA requires two steps in AD FS Management console. First it needs to be added as a MFA alternative. Then MFA needs to be set as a Access policy for the relying party.

1. Enable Mideye MFA

  • Navigate to AD FS Management → Service → Authentication Methods → Edit Multi-Factor Authentication Methods… and select Mideye Authentication Provider for ADFS v3.0.0 checkbox.

2. Enable MFA on Relying party

  • Navigate to AD FS Management → Relying Party Trust → Relying Party → Edit Access Control Policy.. and set the Permit everyone and require MFA

Policies can be modified under “AD FS Management → Access Control Policies

Create RADIUS-client ¨ Refer to Reference Guide (Mideye Server 4) and RADIUS Clients (Mideye Server 5+), how to create a new RADIUS-client on the Mideye Server.

Configure Multiple Mideye Servers in Client Settings in "C:\Program Files\Mideye\ADFS\Mideye ADFS Configuration Editor.exe"

When more than one Mideye-server is specified in the RADIUS-server list, the module will always try with the one on top of the list. If the first Mideye Server does not respond, the next in the list will automatically be moved up to the top. The failed Mideye Server will be placed in the bottom.

Check RADIUS-logs

Check if anything is written to the Mideye RADIUS logs

Mideye Server\log\radius-messages.log

If nothing is logged, verify that udp/1812 is allowed between your ADFS server and Mideye Server. Also, check Event viewer for logs on the ADFS-server.

With the release of Mideye ADFS Module 3.1 it is now possible to use two different adapters, which are identified by the Mideye Server by their NAS ID. This makes it possible to configure ADFS with two different authentication types (e.g. each adapter has its own authentication type and configuration), which will be presented at the login portal as two choices of authentication methods.

Each adapter can be presented to the end user with its own ‘Provider friendly name’, which could help to distinguish between which adapter provides which authentication type.

An example of how it could look:

Mideye ADFS login portal — two authentication adapters shown

The two adapters can be configured through the Mideye ADFS configurator, which is usually found in "C:\Program Files\Mideye\ADFS\Mideye ADFS Configuration Editor.exe".

Mideye ADFS Module 3.1 also offers the possibility to configure the ADFS server to use passwordless authentication. This feature is enabled by ticking a box named ‘Allow additional authentication providers as primary’ found in the following path: AD FS Management → Service → Authentication Methods → Edit Primary Authentication Methods → Allow additional authentication providers as primary

It should look something like this:

ADFS — Allow additional authentication providers as primary checkbox

After clicking ‘Apply’, followed by closing and opening the window again, it should now allow the adapters from the Mideye module to be set as primary:

ADFS — Mideye adapters listed as primary authentication providers

The login page will also receive a different look once this setting is enabled:

ADFS login portal — passwordless authentication with Mideye adapters

After setting Multi-Factor Authentication methods you can test the login by going to the ADFS login portal if that is enabled.

  • https://<adfs_fqdn>/adfs/ls/idpinitiatedsignon

check if idpinitiatedsignon-page is enabled:

Get-AdfsProperties | Select-Object EnableIdpInitiatedSignonpage

enable idpinitiatedsignon-page:

Set-AdfsProperties –EnableIdpInitiatedSignonPage $True


Mideye Server Radius Client needs to be configured to Ignore user password This is because the user is verified and authenticated through the ADFS system. Mideye Server just adds the one time password part to the login.

Open Mideye Web-GUI and navigate to “Configuration” followed by RADIUS-clients. Select Edit on the new RADIUS client and click the “Client Configuration” tab. Check the checkbox for “Ignore password”.

Mideye Server 5 — RADIUS client Ignore Password checkbox

Check “Ignore Password”

Customise error messages, language and Serverlist

To change language and customise informational / error messages, open Mideye ADFS configuration editor. To customise any field, check the Custom edit button and make any changes followed by Save.

To add/remove/edit the RADIUS-server list open the tab Client settings and check the Custom edit button. Make any changes followed by Save.

On the created RADIUS-client, navigate to Client configuration and remove the “Check static password”. This check is not necessary since ADFS will perform a username and password check before allowing an authentication.

Mideye Server 4 — uncheck Check static password on RADIUS client

Uncheck “Check static password”


Error: System.AggregateException: One or more errors occurred. System.Exception: Could not connect to regedit.

Problem: Permissions for the service account used by ADFS, was not executed correctly during installation.

Fix: Open "C:\Program Files\Mideye\ADFS\Mideye ADFS Configuration Editor.exe" as Administrator and add permissions to registry. Go to Permissions tab and click Add Permissions.

Mideye ADFS Configuration Editor — Permissions tab, add permissions


Error:

  • Mideye Authentication Provider for ADFS is displayed in Apps & Features (seems to be installed)
  • Old version is located in AD FS Management → Service → Authentication Methods → Edit Multi-Factor Authentication Methods…
  • Event ID: 364 Microsoft.IdentityServer.RequestFailedException: No strong authentication method found for the request from
  • When opening "C:\Program Files\Mideye\ADFS\Mideye ADFS Configuration Editor.exe" following error message is shown. An error occurred - Registry path is invalid Parameter name: regPath
  • Uninstall does not work. Windows can't access the specified device, path, or file. You may not have the appropriate permissions to access the item.

Reason: Mideye ADFS Module was not properly uninstalled before updating to next release.

Fix: Do a proper uninstall of Mideye ADFS Module and reinstall.

  1. Make sure that Mideye ADFS Module is not present in AD FS Management → Service → Authentication Methods → Edit Multi-Factor Authentication Methods…
  2. Unregister the module from ADFS Unregister-AdfsAuthenticationProvider -Name Mideye.ADFS -Confirm:$false
  3. Run the install package ex. Mideye ADFS v3.0.0.exe Click Next > then Remove then Finish.
  4. Do a new install of Mideye ADFS Module.

ID: 364 - Encountered error during federation passive request.

Section titled “ID: 364 - Encountered error during federation passive request.”

Error:

Encountered error during federation passive request.
Additional Data
Protocol Name:Saml
Relying Party:
Exception details:
System.AggregateException: One or more errors occurred. ---> System.Exception: Requested registry access is not allowed.

Reason: This error occurs in v2.3.4 when Mideye ADFS Module can not write to registry.

Fix: Known Bug and fixed in v3.0.0