You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/direct-federation-adfs.md
+24-25Lines changed: 24 additions & 25 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: B2B
8
8
ms.topic: how-to
9
-
ms.date: 04/11/2022
9
+
ms.date: 04/14/2022
10
10
11
11
ms.author: mimart
12
12
author: msmimart
@@ -74,17 +74,8 @@ An AD FS server must already be set up and functioning before you begin this pro
74
74
1. In the navigation pane, select **Relying Party Trusts**.
75
75
1. Under **Actions**, select **Add Relying Party Trust**.
76
76
1. In the **Add Relying Party Trust** wizard, select **Claims aware**, and then select **Start**.
77
-
1. In the **Select Data Source** section, select **Enter data about the relying party manually**, and then select **Next**.
78
-
1. On the **Specify Display Name** page, type a name in **Display name**, under **Notes** type a description for this relying party trust, and then select **Next**.
79
-
1. On the **Configure Certificate** page, if you have an optional token encryption certificate, select **Browse** to locate a certificate file, and then select **Next**.
80
-
1. On the **Configure URL** page, select the **Enable support for the WS-Federation Passive protocol** check box. Under **Relying party WS-Federation Passive protocol URL**, type the URL for this relying party trust: `https://login.microsoftonline.com/login.srf`
81
-
1. Select **Next**.
82
-
1. On the **Configure Identifiers** page, specify the relying party trust identifier, including the tenant ID of the service partner’s Azure AD tenant: `https://login.microsoftonline.com/<tenant_ID>/`
83
-
2. Select **Add** to add the identifier to the list, and then select **Next**.
84
-
3. On the **Choose Access Control Policy** page, select a policy, and then select **Next**.
85
-
4. On the **Ready to Add Trust** page, review the settings, and then select **Next** to save your relying party trust information.
86
-
5. On the **Finish** page, select **Close**. This action automatically displays the **Edit Claim Rules** dialog box.
87
-
77
+
1. In the **Select Data Source** section, select the check box for **Import data about the relying party published online or on a local network**. Enter this federation metadata URL: `https://nexus.microsoftonline-p.com/federationmetadata/saml20/federationmetadata.xml`. Select **Next**.
78
+
1. Leave the other settings in their default options. Continue to select **Next**, and finally select **Close** to close the wizard.
88
79
89
80
### Create claims rules
90
81
@@ -137,32 +128,40 @@ The next section illustrates how to configure the required attributes and claims
137
128
### Before you begin
138
129
An AD FS server must already be set up and functioning before you begin this procedure. For help with setting up an AD FS server, see [Create a test AD FS 3.0 instance on an Azure virtual machine](https://medium.com/in-the-weeds/create-a-test-active-directory-federation-services-3-0-instance-on-an-azure-virtual-machine-9071d978e8ed).
139
130
131
+
### Add the relying party trust and claim rules
140
132
141
-
### Add the relying party trust and claim rules
142
-
1. On the AD FS server, go to **Tools** > **AD FS management**.
143
-
1. In the navigation pane, select **Trust Relationships** > **Relying Party Trusts**.
144
-
1. Under **Actions**, select **Add Relying Party Trust**.
145
-
1. In the add relying party trust wizard, for **Select Data Source**, use the option **Import data about the relying party published online or on a local network**. Specify this federation metadata URL: `https://nexus.microsoftonline-p.com/federationmetadata/2007-06/federationmetadata.xml`. Leave other default selections. Select **Close**.
146
-
1. The **Edit Claim Rules** wizard opens.
147
-
1. In the **Edit Claim Rules** wizard, select **Add Rule**. In **Choose Rule Type**, select **Send Claims Using a Custom Rule**. Select *Next*.
133
+
1. On the AD FS server, go to **Tools** > **AD FS management**.
134
+
1. In the navigation pane, select **Trust Relationships** > **Relying Party Trusts**.
135
+
1. Under **Actions**, select **Add Relying Party Trust**.
136
+
1. In the **Select Data Source** section, select **Enter data about the relying party manually**, and then select **Next**.
137
+
1. On the **Specify Display Name** page, type a name in **Display name**, under **Notes** type a description for this relying party trust, and then select **Next**.
138
+
1. On the **Configure Certificate** page, if you have an optional token encryption certificate, select **Browse** to locate a certificate file, and then select **Next**.
139
+
1. On the **Configure URL** page, select the **Enable support for the WS-Federation Passive protocol** check box. Under **Relying party WS-Federation Passive protocol URL**, type the URL for this relying party trust: `https://login.microsoftonline.com/login.srf`
140
+
1. Select **Next**.
141
+
1. On the **Configure Identifiers** page, specify the relying party trust identifier, including the tenant ID of the service partner’s Azure AD tenant: `https://login.microsoftonline.com/<tenant_ID>/`
142
+
1. Select **Add** to add the identifier to the list, and then select **Next**.
143
+
1. On the **Choose Access Control Policy** page, select a policy, and then select **Next**.
144
+
1. On the **Ready to Add Trust** page, review the settings, and then select **Next** to save your relying party trust information.
145
+
1. On the **Finish** page, select **Close**. This action automatically displays the **Edit Claim Rules** dialog box.
146
+
1. In the **Edit Claim Rules** wizard, select **Add Rule**. In **Choose Rule Type**, select **Send Claims Using a Custom Rule**. Select *Next*.
148
147
1. In **Configure Claim Rule**, specify the following values:
1. The **Edit Claim Rules** window will show the new rule. Click **Apply**.
155
-
1. In the same **Edit Claim Rules** wizard, select **Add Rule**. In **Cohose Rule Type**, select **Send LDAP Attributes as Claims**. Select **Next**.
156
-
1. In **Configure Claim Rule**, specify the following values:
154
+
1. In the same **Edit Claim Rules** wizard, select **Add Rule**. In **Choose Rule Type**, select **Send LDAP Attributes as Claims**. Select **Next**.
155
+
1. In **Configure Claim Rule**, specify the following values:
157
156
158
157
-**Claim rule name**: Email claim rule
159
158
-**Attribute store**: Active Directory
160
159
-**LDAP Attribute**: E-Mail-Addresses
161
-
-**Outgoing Claim Type**: E-Mail Address
160
+
-**Outgoing Claim Type**: E-Mail Address
162
161
163
-
1. Select **Finish**.
162
+
1. Select **Finish**.
164
163
1. The **Edit Claim Rules** window will show the new rule. Click **Apply**.
165
164
1. Click **OK**. The AD FS server is now configured for federation using WS-Fed.
166
165
167
166
## Next steps
168
-
Next, you'll [configure SAML/WS-Fed IdP federation in Azure AD](direct-federation.md#step-3-configure-samlws-fed-idp-federation-in-azure-ad) either in the Azure AD portal or by using PowerShell.
167
+
Next, you'll [configure SAML/WS-Fed IdP federation in Azure AD](direct-federation.md#step-3-configure-samlws-fed-idp-federation-in-azure-ad) either in the Azure AD portal or by using the Microsoft Graph API.
0 commit comments