Skip to content

Commit 9fd467f

Browse files
authored
Merge pull request #85985 from JeffBley/patch-17
Update direct-federation-adfs.md
2 parents 0b622bb + 4d35f0f commit 9fd467f

File tree

1 file changed

+26
-22
lines changed

1 file changed

+26
-22
lines changed

articles/active-directory/external-identities/direct-federation-adfs.md

Lines changed: 26 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -57,51 +57,55 @@ An AD FS server must already be set up and functioning before you begin this pro
5757
### Add the claim description
5858

5959
1. On your AD FS server, select **Tools** > **AD FS management**.
60-
2. In the navigation pane, select **Service** > **Claim Descriptions**.
61-
3. Under **Actions**, select **Add Claim Description**.
62-
4. In the **Add a Claim Description** window, specify the following values:
60+
1. In the navigation pane, select **Service** > **Claim Descriptions**.
61+
1. Under **Actions**, select **Add Claim Description**.
62+
1. In the **Add a Claim Description** window, specify the following values:
6363

6464
- **Display Name**: Persistent Identifier
6565
- **Claim identifier**: `urn:oasis:names:tc:SAML:2.0:nameid-format:persistent`
6666
- Select the check box for **Publish this claim description in federation metadata as a claim type that this federation service can accept**.
6767
- Select the check box for **Publish this claim description in federation metadata as a claim type that this federation service can send**.
6868

69-
5. Click **Ok**.
69+
1. Click **Ok**.
7070

71-
### Add the relying party trust and claim rules
71+
### Add the relying party trust
7272

7373
1. On the AD FS server, go to **Tools** > **AD FS management**.
74-
2. In the navigation pane, select **Trust Relationships** > **Relying Party Trusts**.
75-
3. Under **Actions**, select **Add Relying Party Trust**.
76-
4. In the add relying party trust wizard for **Select Data Source**, use the option **Import data about the relying party published online or on a local network**. Specify this federation metadata URL- https://nexus.microsoftonline-p.com/federationmetadata/saml20/federationmetadata.xml. Leave other default selections. Select **Close**.
77-
5. The **Edit Claim Rules** wizard opens.
78-
6. In the **Edit Claim Rules** wizard, select **Add Rule**. In **Choose Rule Type**, select **Send LDAP Attributes as Claims**. Select **Next**.
79-
7. In **Configure Claim Rule**, specify the following values:
74+
1. In the navigation pane, select **Relying Party Trusts**.
75+
1. Under **Actions**, select **Add Relying Party Trust**.
76+
1. In the **Add Relying Party Trust** wizard, select **Claims aware**, and then select **Start**.
77+
1. In the **Select Data Source** section, select the check box for **Import data about the relying party published online or on a local network**. Enter this federation metadata URL: `https://nexus.microsoftonline-p.com/federationmetadata/saml20/federationmetadata.xml`. Select **Next**.
78+
1. Leave the other settings in their default options. Continue to select **Next**, and finally select **Close** to close the wizard.
79+
80+
### Create claims rules
81+
82+
1. Right-click the relying party trust you created, and then select **Edit Claim Issuance Policy**.
83+
1. In the **Edit Claim Rules** wizard, select **Add Rule**.
84+
1. In **Claim rule template**, select **Send LDAP Attributes as Claims**.
85+
1. In **Configure Claim Rule**, specify the following values:
8086

8187
- **Claim rule name**: Email claim rule
8288
- **Attribute store**: Active Directory
8389
- **LDAP Attribute**: E-Mail-Addresses
8490
- **Outgoing Claim Type**: E-Mail Address
8591

86-
8. Select **Finish**.
87-
9. The **Edit Claim Rules** window will show the new rule. Click **Apply**.
88-
10. Click **Ok**.
89-
90-
### Create an email transform rule
91-
1. Go to **Edit Claim Rules** and click **Add Rule**. In **Choose Rule Type**, select **Transform an Incoming Claim** and click **Next**.
92-
2. In **Configure Claim Rule**, specify the following values:
92+
1. Select **Finish**.
93+
1. Select **Add Rule**.
94+
1. In **Claim rule template**, select **Transform an Incoming Claim**, and then select **Next**.
95+
1. In **Configure Claim Rule**, specify the following values:
9396

9497
- **Claim rule name**: Email transform rule
9598
- **Incoming claim type**: E-mail Address
9699
- **Outgoing claim type**: Name ID
97100
- **Outgoing name ID format**: Persistent Identifier
98101
- Select **Pass through all claim values**.
99102

100-
3. Click **Finish**.
101-
4. The **Edit Claim Rules** window will show the new rules. Click **Apply**.
102-
5. Click **OK**. The AD FS server is now configured for federation using the SAML 2.0 protocol.
103+
1. Select **Finish**.
104+
1. The **Edit Claim Rules** pane shows the new rules. Select **Apply**.
105+
1. Select **OK**. The AD FS server is now configured for federation using the SAML 2.0 protocol.
106+
107+
## Configure AD FS for WS-Fed federation
103108

104-
## Configure AD FS for WS-Fed federation
105109
Azure AD B2B can be configured to federate with IdPs that use the WS-Fed protocol with the specific requirements listed below. Currently, the two WS-Fed providers have been tested for compatibility with Azure AD include AD FS and Shibboleth. Here, we’ll use Active Directory Federation Services (AD FS) as an example of the WS-Fed IdP. For more information about establishing a relying party trust between a WS-Fed compliant provider with Azure AD, download the Azure AD Identity Provider Compatibility Docs.
106110

107111
To set up federation, the following attributes must be received in the WS-Fed message from the IdP. These attributes can be configured by linking to the online security token service XML file or by entering them manually. Step 12 in [Create a test AD FS instance](https://medium.com/in-the-weeds/create-a-test-active-directory-federation-services-3-0-instance-on-an-azure-virtual-machine-9071d978e8ed) describes how to find the AD FS endpoints or how to generate your metadata URL, for example `https://fs.iga.azure-test.net/federationmetadata/2007-06/federationmetadata.xml`.

0 commit comments

Comments
 (0)