Skip to content

Commit e21ac6c

Browse files
authored
Merge pull request #213267 from JeffBley/patch-1
Update direct-federation-adfs.md
2 parents aa81246 + d79ee26 commit e21ac6c

File tree

1 file changed

+51
-32
lines changed

1 file changed

+51
-32
lines changed

articles/active-directory/external-identities/direct-federation-adfs.md

Lines changed: 51 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ The next section illustrates how to configure the required attributes and claims
5050

5151
### Before you begin
5252

53-
An AD FS server must already be set up and functioning before you begin this procedure. For help with setting up an AD FS server, see [Create a test AD FS 3.0 instance on an Azure virtual machine](https://medium.com/in-the-weeds/create-a-test-active-directory-federation-services-3-0-instance-on-an-azure-virtual-machine-9071d978e8ed).
53+
An AD FS server must already be set up and functioning before you begin this procedure.
5454

5555
### Add the claim description
5656

@@ -68,12 +68,20 @@ An AD FS server must already be set up and functioning before you begin this pro
6868

6969
### Add the relying party trust
7070

71-
1. On the AD FS server, go to **Tools** > **AD FS management**.
72-
1. In the navigation pane, select **Relying Party Trusts**.
73-
1. Under **Actions**, select **Add Relying Party Trust**.
74-
1. In the **Add Relying Party Trust** wizard, select **Claims aware**, and then select **Start**.
75-
1. In the **Select Data Source** section, select the check box for **Import data about the relying party published online or on a local network**. Enter this federation metadata URL: `https://nexus.microsoftonline-p.com/federationmetadata/saml20/federationmetadata.xml`. Select **Next**.
76-
1. Leave the other settings in their default options. Continue to select **Next**, and finally select **Close** to close the wizard.
71+
1. On the AD FS server, go to **Tools** > **AD FS Management**.
72+
2. In the navigation pane, select **Relying Party Trusts**.
73+
3. Under **Actions**, select **Add Relying Party Trust**.
74+
4. In the **Add Relying Party Trust** wizard, select **Claims aware**, and then select **Start**.
75+
5. In the **Select Data Source** section, select the check box for **Import data about the relying party published online or on a local network**. Enter this federation metadata URL: `https://nexus.microsoftonline-p.com/federationmetadata/saml20/federationmetadata.xml`. Select **Next**.
76+
6. Leave the other settings in their default options. Continue to select **Next**, and finally select **Close** to close the wizard.
77+
7. In **AD FS Management**, under **Relying Party Trusts**, right click the relying party trust you just created and select **Properties**.
78+
8. In the **Monitoring** tab, uncheck the box **Monitor relying party**.
79+
9. In the **Identifiers** tab, enter ``https://login.microsoftonline.com/<tenant ID>/`` in the **Relying party identifier** text box using the tenant ID of the service partner’s Azure AD tenant. Select **Add**.
80+
81+
> [!NOTE]
82+
> Be sure to include a slash (/) after the tenant ID. For example, https://login.microsoftonline.com/094a6247-27d4-489f-a23b-b9672900084d/.
83+
84+
10. Select **OK**.
7785

7886
### Create claims rules
7987

@@ -124,42 +132,53 @@ Required claims for the WS-Fed token issued by the IdP:
124132
The next section illustrates how to configure the required attributes and claims using AD FS as an example of a WS-Fed IdP.
125133

126134
### Before you begin
127-
An AD FS server must already be set up and functioning before you begin this procedure. For help with setting up an AD FS server, see [Create a test AD FS 3.0 instance on an Azure virtual machine](https://medium.com/in-the-weeds/create-a-test-active-directory-federation-services-3-0-instance-on-an-azure-virtual-machine-9071d978e8ed).
135+
An AD FS server must already be set up and functioning before you begin this procedure.
128136

129-
### Add the relying party trust and claim rules
137+
### Add the relying party trust
130138

131139
1. On the AD FS server, go to **Tools** > **AD FS management**.
132-
1. In the navigation pane, select **Trust Relationships** > **Relying Party Trusts**.
133-
1. Under **Actions**, select **Add Relying Party Trust**.
134-
1. In the **Select Data Source** section, select **Enter data about the relying party manually**, and then select **Next**.
135-
1. On the **Specify Display Name** page, type a name in **Display name**, under **Notes** type a description for this relying party trust, and then select **Next**.
136-
1. On the **Configure Certificate** page, if you have an optional token encryption certificate, select **Browse** to locate a certificate file, and then select **Next**.
137-
1. On the **Configure URL** page, select the **Enable support for the WS-Federation Passive protocol** check box. Under **Relying party WS-Federation Passive protocol URL**, type the URL for this relying party trust: `https://login.microsoftonline.com/login.srf`
138-
1. Select **Next**.
139-
1. On the **Configure Identifiers** page, specify the relying party trust identifier, including the tenant ID of the service partner’s Azure AD tenant: `https://login.microsoftonline.com/<tenant_ID>/`
140-
1. Select **Add** to add the identifier to the list, and then select **Next**.
141-
1. On the **Choose Access Control Policy** page, select a policy, and then select **Next**.
142-
1. On the **Ready to Add Trust** page, review the settings, and then select **Next** to save your relying party trust information.
143-
1. On the **Finish** page, select **Close**. This action automatically displays the **Edit Claim Rules** dialog box.
144-
1. In the **Edit Claim Rules** wizard, select **Add Rule**. In **Choose Rule Type**, select **Send Claims Using a Custom Rule**. Select *Next*.
145-
1. In **Configure Claim Rule**, specify the following values:
140+
2. In the navigation pane, select **Trust Relationships** > **Relying Party Trusts**.
141+
3. Under **Actions**, select **Add Relying Party Trust**.
142+
4. In the Add Relying Party Trust wizard, select **Claims aware**, and then select Start.
143+
5. In the **Select Data Source** section, select **Enter data about the relying party manually**, and then select **Next**.
144+
6. In the **Specify Display Name** page, type a name in **Display name**. You may optionally enter a description for this relying party trust in the **Notes** section. Select **Next**.
145+
7. Optionally, in the **Configure Certificate** page, if you have a token encryption certificate, select **Browse** to locate a certificate file. Select **Next**.
146+
8. In the **Configure URL** page, select the **Enable support for the WS-Federation Passive protocol** check box. Under **Relying party WS-Federation Passive protocol URL**, enter the following URL: `https://login.microsoftonline.com/login.srf`
147+
9. Select **Next**.
148+
10. In the **Configure Identifiers** page, enter the following URLs and select **Add**. In the second URL, enter the tenant ID of service partner's Azure AD tenant.
149+
- `urn:federation:MicrosoftOnline`
150+
- `https://login.microsoftonline.com/<tenant ID>/`
151+
152+
> [!NOTE]
153+
> Be sure to include a slash (/) after the tenant ID, for example: https://login.microsoftonline.com/094a6247-27d4-489f-a23b-b9672900084d/.
154+
155+
11. Select **Next**.
156+
12. In the **Choose Access Control Policy** page, select a policy, and then select **Next**.
157+
13. In the **Ready to Add Trust** page, review the settings, and then select **Next** to save your relying party trust information.
158+
14. In the **Finish** page, select **Close**. select Relying Party Trust and click **Edit Claim Issuance Policy**.
146159

147-
- **Claim rule name**: Issue Immutable ID
148-
- **Custom rule**: `c:[Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname"] => issue(store = "Active Directory", types = ("http://schemas.microsoft.com/LiveID/Federation/2008/05/ImmutableID"), query = "samAccountName={0};objectGUID;{1}", param = regexreplace(c.Value, "(?<domain>[^\\]+)\\(?<user>.+)", "${user}"), param = c.Value);`
149160

150-
1. Select **Finish**.
151-
1. The **Edit Claim Rules** window will show the new rule. Click **Apply**.
152-
1. In the same **Edit Claim Rules** wizard, select **Add Rule**. In **Choose Rule Type**, select **Send LDAP Attributes as Claims**. Select **Next**.
153-
1. In **Configure Claim Rule**, specify the following values:
161+
### Create claims rules
154162

163+
1. Select the Relying Party Trust you just created, and then select **Edit Claim Issuance Policy**.
164+
2. Select **Add rule**.
165+
3. Select **Send LDAP Attributes as Claims**, and then select **Next**.
166+
4. In **Configure Claim Rule**, specify the following values:
155167
- **Claim rule name**: Email claim rule
156168
- **Attribute store**: Active Directory
157169
- **LDAP Attribute**: E-Mail-Addresses
158170
- **Outgoing Claim Type**: E-Mail Address
159171

160-
1. Select **Finish**.
161-
1. The **Edit Claim Rules** window will show the new rule. Click **Apply**.
162-
1. Click **OK**. The AD FS server is now configured for federation using WS-Fed.
172+
5. Select **Finish**.
173+
6. In the same **Edit Claim Rules** wizard, select **Add Rule**.
174+
7. Select **Send Claims Using a Custom Rule**, and then select **Next**.
175+
8. In **Configure Claim Rule**, specify the following values:
176+
177+
- **Claim rule name**: Issue Immutable ID
178+
- **Custom rule**: `c:[Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname"] => issue(store = "Active Directory", types = ("http://schemas.microsoft.com/LiveID/Federation/2008/05/ImmutableID"), query = "samAccountName={0};objectGUID;{1}", param = regexreplace(c.Value, "(?<domain>[^\\]+)\\(?<user>.+)", "${user}"), param = c.Value);`
179+
180+
9. Select **Finish**.
181+
10. Select **OK**. The AD FS server is now configured for federation using WS-Fed.
163182

164183
## Next steps
165184
Next, you'll [configure SAML/WS-Fed IdP federation in Azure AD](direct-federation.md#step-3-configure-samlws-fed-idp-federation-in-azure-ad) either in the Azure AD portal or by using the Microsoft Graph API.

0 commit comments

Comments
 (0)