Skip to content

Commit 8758ee0

Browse files
committed
fix RPT steps
1 parent e6d9ead commit 8758ee0

File tree

1 file changed

+24
-25
lines changed

1 file changed

+24
-25
lines changed

articles/active-directory/external-identities/direct-federation-adfs.md

Lines changed: 24 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: B2B
88
ms.topic: how-to
9-
ms.date: 04/11/2022
9+
ms.date: 04/14/2022
1010

1111
ms.author: mimart
1212
author: msmimart
@@ -74,17 +74,8 @@ An AD FS server must already be set up and functioning before you begin this pro
7474
1. In the navigation pane, select **Relying Party Trusts**.
7575
1. Under **Actions**, select **Add Relying Party Trust**.
7676
1. In the **Add Relying Party Trust** wizard, select **Claims aware**, and then select **Start**.
77-
1. In the **Select Data Source** section, select **Enter data about the relying party manually**, and then select **Next**.
78-
1. On the **Specify Display Name** page, type a name in **Display name**, under **Notes** type a description for this relying party trust, and then select **Next**.
79-
1. On the **Configure Certificate** page, if you have an optional token encryption certificate, select **Browse** to locate a certificate file, and then select **Next**.
80-
1. On the **Configure URL** page, select the **Enable support for the WS-Federation Passive protocol** check box. Under **Relying party WS-Federation Passive protocol URL**, type the URL for this relying party trust: `https://login.microsoftonline.com/login.srf`
81-
1. Select **Next**.
82-
1. On the **Configure Identifiers** page, specify the relying party trust identifier, including the tenant ID of the service partner’s Azure AD tenant: `https://login.microsoftonline.com/<tenant_ID>/`
83-
2. Select **Add** to add the identifier to the list, and then select **Next**.
84-
3. On the **Choose Access Control Policy** page, select a policy, and then select **Next**.
85-
4. On the **Ready to Add Trust** page, review the settings, and then select **Next** to save your relying party trust information.
86-
5. On the **Finish** page, select **Close**. This action automatically displays the **Edit Claim Rules** dialog box.
87-
77+
1. In the **Select Data Source** section, select the check box for **Import data about the relying party published online or on a local network**. Enter this federation metadata URL: `https://nexus.microsoftonline-p.com/federationmetadata/saml20/federationmetadata.xml`. Select **Next**.
78+
1. Leave the other settings in their default options. Continue to select **Next**, and finally select **Close** to close the wizard.
8879

8980
### Create claims rules
9081

@@ -137,32 +128,40 @@ The next section illustrates how to configure the required attributes and claims
137128
### Before you begin
138129
An AD FS server must already be set up and functioning before you begin this procedure. For help with setting up an AD FS server, see [Create a test AD FS 3.0 instance on an Azure virtual machine](https://medium.com/in-the-weeds/create-a-test-active-directory-federation-services-3-0-instance-on-an-azure-virtual-machine-9071d978e8ed).
139130

131+
### Add the relying party trust and claim rules
140132

141-
### Add the relying party trust and claim rules
142-
1. On the AD FS server, go to **Tools** > **AD FS management**.
143-
1. In the navigation pane, select **Trust Relationships** > **Relying Party Trusts**.
144-
1. Under **Actions**, select **Add Relying Party Trust**.
145-
1. In the add relying party trust wizard, for **Select Data Source**, use the option **Import data about the relying party published online or on a local network**. Specify this federation metadata URL: `https://nexus.microsoftonline-p.com/federationmetadata/2007-06/federationmetadata.xml`. Leave other default selections. Select **Close**.
146-
1. The **Edit Claim Rules** wizard opens.
147-
1. In the **Edit Claim Rules** wizard, select **Add Rule**. In **Choose Rule Type**, select **Send Claims Using a Custom Rule**. Select *Next*.
133+
1. On the AD FS server, go to **Tools** > **AD FS management**.
134+
1. In the navigation pane, select **Trust Relationships** > **Relying Party Trusts**.
135+
1. Under **Actions**, select **Add Relying Party Trust**.
136+
1. In the **Select Data Source** section, select **Enter data about the relying party manually**, and then select **Next**.
137+
1. On the **Specify Display Name** page, type a name in **Display name**, under **Notes** type a description for this relying party trust, and then select **Next**.
138+
1. On the **Configure Certificate** page, if you have an optional token encryption certificate, select **Browse** to locate a certificate file, and then select **Next**.
139+
1. On the **Configure URL** page, select the **Enable support for the WS-Federation Passive protocol** check box. Under **Relying party WS-Federation Passive protocol URL**, type the URL for this relying party trust: `https://login.microsoftonline.com/login.srf`
140+
1. Select **Next**.
141+
1. On the **Configure Identifiers** page, specify the relying party trust identifier, including the tenant ID of the service partner’s Azure AD tenant: `https://login.microsoftonline.com/<tenant_ID>/`
142+
1. Select **Add** to add the identifier to the list, and then select **Next**.
143+
1. On the **Choose Access Control Policy** page, select a policy, and then select **Next**.
144+
1. On the **Ready to Add Trust** page, review the settings, and then select **Next** to save your relying party trust information.
145+
1. On the **Finish** page, select **Close**. This action automatically displays the **Edit Claim Rules** dialog box.
146+
1. In the **Edit Claim Rules** wizard, select **Add Rule**. In **Choose Rule Type**, select **Send Claims Using a Custom Rule**. Select *Next*.
148147
1. In **Configure Claim Rule**, specify the following values:
149148

150149
- **Claim rule name**: Issue Immutable ID
151150
- **Custom rule**: `c:[Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname"] => issue(store = "Active Directory", types = ("http://schemas.microsoft.com/LiveID/Federation/2008/05/ImmutableID"), query = "samAccountName={0};objectGUID;{1}", param = regexreplace(c.Value, "(?<domain>[^\\]+)\\(?<user>.+)", "${user}"), param = c.Value);`
152151

153-
1. Select **Finish**.
152+
1. Select **Finish**.
154153
1. The **Edit Claim Rules** window will show the new rule. Click **Apply**.
155-
1. In the same **Edit Claim Rules** wizard, select **Add Rule**. In **Cohose Rule Type**, select **Send LDAP Attributes as Claims**. Select **Next**.
156-
1. In **Configure Claim Rule**, specify the following values:
154+
1. In the same **Edit Claim Rules** wizard, select **Add Rule**. In **Choose Rule Type**, select **Send LDAP Attributes as Claims**. Select **Next**.
155+
1. In **Configure Claim Rule**, specify the following values:
157156

158157
- **Claim rule name**: Email claim rule
159158
- **Attribute store**: Active Directory
160159
- **LDAP Attribute**: E-Mail-Addresses
161-
- **Outgoing Claim Type**: E-Mail Address
160+
- **Outgoing Claim Type**: E-Mail Address
162161

163-
1. Select **Finish**.
162+
1. Select **Finish**.
164163
1. The **Edit Claim Rules** window will show the new rule. Click **Apply**.
165164
1. Click **OK**. The AD FS server is now configured for federation using WS-Fed.
166165

167166
## Next steps
168-
Next, you'll [configure SAML/WS-Fed IdP federation in Azure AD](direct-federation.md#step-3-configure-samlws-fed-idp-federation-in-azure-ad) either in the Azure AD portal or by using PowerShell.
167+
Next, you'll [configure SAML/WS-Fed IdP federation in Azure AD](direct-federation.md#step-3-configure-samlws-fed-idp-federation-in-azure-ad) either in the Azure AD portal or by using the Microsoft Graph API.

0 commit comments

Comments
 (0)