Versions Compared
Key
- This line was added.
- This line was removed.
- Formatting was changed.
1 Prerequisites:
- Administrative Privileges
- Service Account for AD FS ADFS integration
- Certificate for the federation service eg. fs.mydomain.com
- Windows Server 2012 R2
- Server where AD FS ADFS is installed must be joined to a domain
- IIS Feature should be present on the server
2 Adding AD FS ADFS Feature to Windows
In the Server Manager, select: Manage / Add Roles and Features.
Image RemovedImage Added
Press Next.
Image RemovedImage Added
Select Role-based or feature-based installation and press Next.
Image RemovedImage Added
Press Next.
Image RemovedImage Added
Select Active Directory Federation Services and press Next.
Image RemovedImage Added
Press Next.
Image RemovedImage Added
Press Next.
Image RemovedImage Added
Press Install.
Image RemovedImage Added
Press Close.
Image RemovedImage Added
3 Configuring AD FS ADFS Feature
In the Server Manager, select Post-deployment Configuration.
Image RemovedImage Added
Select Create the first federation server in a federation server farm and press Next.
Image RemovedImage Added
If current user does not have sufficient rights, press Change and select a administrative User, otherwise just press Next.
Image RemovedImage Added
Press Import to import Certificate.
Image RemovedImage Added
Select the certificate pfx file and press Open.
Image RemovedImage Added
Fill password for pfx file (if any).
Image RemovedImage Added
Fill Federation Service Display Name, and press Next.
Image RemovedImage Added
Select Service Account for AD FSADFS service and specify password or create one and press Next.
Image RemovedImage Added
Select Create a database on this server using Windows Internal Database, and press Next.
Image RemovedImage Added
Review options and press Next.
Image RemovedImage Added
Press Configure.
Image RemovedImage Added
Press Close.
Image RemovedImage Added
4 Configure Trust Relations
In the Server Manager, select Tools / AD FS ADFS Management
Image RemovedImage Added
Expand Trust Relationships in the tree, right click on Relying Party Trusts and press Add Relying Party Trust…
Image RemovedImage Added
Press Start.
Image RemovedImage Added
Select Enter data about the relying party manually and press Next.
Image RemovedImage Added
Enter Display Name eg; "dam.digizuiteAD FSdigizuiteADFS.com" and press Next.
Image RemovedImage Added
Select AD FS ADFS profile and press Next.
Image RemovedImage Added
Press Next.
Image RemovedImage Added
Select Enable support for the WS-Federation Passive protocol. Fill Relying party WS-Federation Passive Protocol URL.(It must be https and the URL must end with "/"). Now press Next.
Image RemovedImage Added
Press Next.
Image RemovedImage Added
Press Next.
Image RemovedImage Added
Select Permit all users to access this relying party, and press Next.
Image RemovedImage Added
Press "Next"
Image RemovedImage Added
Press Close.
Image RemovedImage Added
5 Add Claim Rules
Right click on the Relying Trust, and select Edit Claim Rules.
Image RemovedImage Added
Press Add Rule.
Image RemovedImage Added
Select Pass Through or Filter an Incomming Claim and press Next.
Image RemovedImage Added
- Name Claim rule
- Select incoming claim type Name
- Select Pass through all claim values
Note | ||
---|---|---|
| ||
Name claim is required, ADFS integration will fail if this is not configured correctly. |
Press Finish.
Image RemovedImage Added
- Repeat Previous steps for the Claim Types;
- E-Mail Address
- Given Name
- Surname
Press Add Rule.
Image RemovedImage Added
Select Send LDAP Attributes as Claims and press Next.
Image RemovedImage Added
- Name Claim Rule
- Select Active Directory as Attribute store
- Select Token-Groups as SIDs as LDAP Attribute
- Select Group SID as Outgoing Claim Type
Press Finish.
Image RemovedImage Added
Press Add Rule.
Image RemovedImage Added
Select Send LDAP Attributes as Claims and press Next.
Image RemovedImage Added
- Name Claim Rule
- Select Active Directory as Attribute store
- Select Token-Groups - Qualified by Domain Name as LDAP Attribute
- Select Group as Outgoing Claim Type
Press Finish.
Image RemovedImage Added
6 Ensure that the SSL Certificates are trusted by Clients.
The certificates used in AD FS ADFS needs to be trusted by the client machines.
See: https://technet.microsoft.com/en-us/library/dd807040(v=ws.11).aspx and
Table of Contents
Table of Contents |
---|