Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

1 Prerequisites:

  • Administrative Privileges
  • Service Account for AD FS ADFS integration
  • Certificate for the federation service eg. fs.mydomain.com
  • Windows Server 2012 R2
  • Server where AD FS ADFS is installed must be joined to a domain
  • IIS Feature should be present on the server

2 Adding AD FS ADFS Feature to Windows

In the Server Manager, select: Manage / Add Roles and Features.

Image RemovedImage Added

Press Next.

Image RemovedImage Added

Select Role-based or feature-based installation and press Next.

Image RemovedImage Added

Press Next.

Image RemovedImage Added

Select Active Directory Federation Services and press Next.

Image RemovedImage Added

Press Next.

Image RemovedImage Added

Press Next.

Image RemovedImage Added

Press Install.

Image RemovedImage Added

Press Close.

Image RemovedImage Added

3 Configuring AD FS ADFS Feature


In the Server Manager, select Post-deployment Configuration.

Image RemovedImage Added

Select Create the first federation server in a federation server farm and press Next.

Image RemovedImage Added

If current user does not have sufficient rights, press Change and select a administrative User, otherwise just press Next.

Image RemovedImage Added

Press Import to import Certificate.

Image RemovedImage Added

Select the certificate pfx file and press Open.

Image RemovedImage Added

Fill password for pfx file (if any).

Image RemovedImage Added

Fill Federation Service Display Name, and press Next.

Image RemovedImage Added

Select Service Account for AD FSADFS service and specify password or create one and press Next.

Image RemovedImage Added

Select Create a database on this server using Windows Internal Database, and press Next.

Image RemovedImage Added

Review options and press Next.

Image RemovedImage Added

Press Configure.

Image RemovedImage Added

Press Close.

Image RemovedImage Added

4 Configure Trust Relations

In the Server Manager, select Tools / AD FS ADFS Management

Image RemovedImage Added

Expand Trust Relationships in the tree, right click on Relying Party Trusts and press Add Relying Party Trust…

Image RemovedImage Added

Press Start.

Image RemovedImage Added

Select Enter data about the relying party manually and press Next.

Image RemovedImage Added

Enter Display Name eg; "dam.digizuiteAD FSdigizuiteADFS.com" and press Next.

Image RemovedImage Added

Select AD FS ADFS profile and press Next.

Image RemovedImage Added

Press Next.

Image RemovedImage Added

Select Enable support for the WS-Federation Passive protocol. Fill Relying party WS-Federation Passive Protocol URL.(It must be https and the URL must end with "/"). Now press Next.

Image RemovedImage Added

Press Next.

Image RemovedImage Added

Press Next.

Image RemovedImage Added

Select Permit all users to access this relying party, and press Next.

Image RemovedImage Added

Press "Next"

Image RemovedImage Added

Press Close.

Image RemovedImage Added

5 Add Claim Rules

Right click on the Relying Trust, and select Edit Claim Rules.

Image RemovedImage Added

Press Add Rule.

Image RemovedImage Added

Select Pass Through or Filter an Incomming Claim and press Next.

Image RemovedImage Added

  • Name Claim rule
  • Select incoming claim type Name
  • Select Pass through all claim values
NOTE: Name


Note
titleImportant!

Name claim is required, ADFS integration will fail if this is not configured correctly.

Press Finish.

Image RemovedImage Added

  • Repeat Previous steps for the Claim Types;
  • E-Mail Address
  • Given Name
  • Surname

Press Add Rule.

Image RemovedImage Added

Select Send LDAP Attributes as Claims and press Next.

Image RemovedImage Added

  • Name Claim Rule
  • Select Active Directory as Attribute store
  • Select Token-Groups as SIDs as LDAP Attribute
  • Select Group SID as Outgoing Claim Type

Press Finish.

Image RemovedImage Added

Press Add Rule.

Image RemovedImage Added

Select Send LDAP Attributes as Claims and press Next.

Image RemovedImage Added

  • Name Claim Rule
  • Select Active Directory as Attribute store
  • Select Token-Groups - Qualified by Domain Name as LDAP Attribute
  • Select Group as Outgoing Claim Type

Press Finish.

Image RemovedImage Added

6 Ensure that the SSL Certificates are trusted by Clients.

The certificates used in AD FS ADFS needs to be trusted by the client machines.

See: https://technet.microsoft.com/en-us/library/dd807040(v=ws.11).aspx and

https://blogs.technet.microsoft.com/adfs/2007/07/23/adfs-certificates-ssl-token-signing-and-client-authentication-certs/





Table of Contents

Table of Contents