You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/direct-federation-adfs.md
+51-32Lines changed: 51 additions & 32 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,7 +50,7 @@ The next section illustrates how to configure the required attributes and claims
50
50
51
51
### Before you begin
52
52
53
-
An AD FS server must already be set up and functioning before you begin this procedure. For help with setting up an AD FS server, see [Create a test AD FS 3.0 instance on an Azure virtual machine](https://medium.com/in-the-weeds/create-a-test-active-directory-federation-services-3-0-instance-on-an-azure-virtual-machine-9071d978e8ed).
53
+
An AD FS server must already be set up and functioning before you begin this procedure.
54
54
55
55
### Add the claim description
56
56
@@ -68,12 +68,20 @@ An AD FS server must already be set up and functioning before you begin this pro
68
68
69
69
### Add the relying party trust
70
70
71
-
1. On the AD FS server, go to **Tools** > **AD FS management**.
72
-
1. In the navigation pane, select **Relying Party Trusts**.
73
-
1. Under **Actions**, select **Add Relying Party Trust**.
74
-
1. In the **Add Relying Party Trust** wizard, select **Claims aware**, and then select **Start**.
75
-
1. In the **Select Data Source** section, select the check box for **Import data about the relying party published online or on a local network**. Enter this federation metadata URL: `https://nexus.microsoftonline-p.com/federationmetadata/saml20/federationmetadata.xml`. Select **Next**.
76
-
1. Leave the other settings in their default options. Continue to select **Next**, and finally select **Close** to close the wizard.
71
+
1. On the AD FS server, go to **Tools** > **AD FS Management**.
72
+
2. In the navigation pane, select **Relying Party Trusts**.
73
+
3. Under **Actions**, select **Add Relying Party Trust**.
74
+
4. In the **Add Relying Party Trust** wizard, select **Claims aware**, and then select **Start**.
75
+
5. In the **Select Data Source** section, select the check box for **Import data about the relying party published online or on a local network**. Enter this federation metadata URL: `https://nexus.microsoftonline-p.com/federationmetadata/saml20/federationmetadata.xml`. Select **Next**.
76
+
6. Leave the other settings in their default options. Continue to select **Next**, and finally select **Close** to close the wizard.
77
+
7. In **AD FS Management**, under **Relying Party Trusts**, right click the relying party trust you just created and select **Properties**.
78
+
8. In the **Monitoring** tab, uncheck the box **Monitor relying party**.
79
+
9. In the **Identifiers** tab, enter ``https://login.microsoftonline.com/<tenant ID>/`` in the **Relying party identifier** text box using the tenant ID of the service partner’s Azure AD tenant. Select **Add**.
80
+
81
+
> [!NOTE]
82
+
> Be sure to include a slash (/) after the tenant ID. For example, https://login.microsoftonline.com/094a6247-27d4-489f-a23b-b9672900084d/.
83
+
84
+
10. Select **OK**.
77
85
78
86
### Create claims rules
79
87
@@ -124,42 +132,53 @@ Required claims for the WS-Fed token issued by the IdP:
124
132
The next section illustrates how to configure the required attributes and claims using AD FS as an example of a WS-Fed IdP.
125
133
126
134
### Before you begin
127
-
An AD FS server must already be set up and functioning before you begin this procedure. For help with setting up an AD FS server, see [Create a test AD FS 3.0 instance on an Azure virtual machine](https://medium.com/in-the-weeds/create-a-test-active-directory-federation-services-3-0-instance-on-an-azure-virtual-machine-9071d978e8ed).
135
+
An AD FS server must already be set up and functioning before you begin this procedure.
128
136
129
-
### Add the relying party trust and claim rules
137
+
### Add the relying party trust
130
138
131
139
1. On the AD FS server, go to **Tools** > **AD FS management**.
132
-
1. In the navigation pane, select **Trust Relationships** > **Relying Party Trusts**.
133
-
1. Under **Actions**, select **Add Relying Party Trust**.
134
-
1. In the **Select Data Source** section, select **Enter data about the relying party manually**, and then select **Next**.
135
-
1. On the **Specify Display Name** page, type a name in **Display name**, under **Notes** type a description for this relying party trust, and then select **Next**.
136
-
1. On the **Configure Certificate** page, if you have an optional token encryption certificate, select **Browse** to locate a certificate file, and then select **Next**.
137
-
1. On the **Configure URL** page, select the **Enable support for the WS-Federation Passive protocol** check box. Under **Relying party WS-Federation Passive protocol URL**, type the URL for this relying party trust: `https://login.microsoftonline.com/login.srf`
138
-
1. Select **Next**.
139
-
1. On the **Configure Identifiers** page, specify the relying party trust identifier, including the tenant ID of the service partner’s Azure AD tenant: `https://login.microsoftonline.com/<tenant_ID>/`
140
-
1. Select **Add** to add the identifier to the list, and then select **Next**.
141
-
1. On the **Choose Access Control Policy** page, select a policy, and then select **Next**.
142
-
1. On the **Ready to Add Trust** page, review the settings, and then select **Next** to save your relying party trust information.
143
-
1. On the **Finish** page, select **Close**. This action automatically displays the **Edit Claim Rules** dialog box.
144
-
1. In the **Edit Claim Rules** wizard, select **Add Rule**. In **Choose Rule Type**, select **Send Claims Using a Custom Rule**. Select *Next*.
145
-
1. In **Configure Claim Rule**, specify the following values:
140
+
2. In the navigation pane, select **Trust Relationships** > **Relying Party Trusts**.
141
+
3. Under **Actions**, select **Add Relying Party Trust**.
142
+
4. In the Add Relying Party Trust wizard, select **Claims aware**, and then select Start.
143
+
5. In the **Select Data Source** section, select **Enter data about the relying party manually**, and then select **Next**.
144
+
6. In the **Specify Display Name** page, type a name in **Display name**. You may optionally enter a description for this relying party trust in the **Notes** section. Select **Next**.
145
+
7. Optionally, in the **Configure Certificate** page, if you have a token encryption certificate, select **Browse** to locate a certificate file. Select **Next**.
146
+
8. In the **Configure URL** page, select the **Enable support for the WS-Federation Passive protocol** check box. Under **Relying party WS-Federation Passive protocol URL**, enter the following URL: `https://login.microsoftonline.com/login.srf`
147
+
9. Select **Next**.
148
+
10. In the **Configure Identifiers** page, enter the following URLs and select **Add**. In the second URL, enter the tenant ID of service partner's Azure AD tenant.
149
+
-`urn:federation:MicrosoftOnline`
150
+
-`https://login.microsoftonline.com/<tenant ID>/`
151
+
152
+
> [!NOTE]
153
+
> Be sure to include a slash (/) after the tenant ID, for example: https://login.microsoftonline.com/094a6247-27d4-489f-a23b-b9672900084d/.
154
+
155
+
11. Select **Next**.
156
+
12. In the **Choose Access Control Policy** page, select a policy, and then select **Next**.
157
+
13. In the **Ready to Add Trust** page, review the settings, and then select **Next** to save your relying party trust information.
158
+
14. In the **Finish** page, select **Close**. select Relying Party Trust and click **Edit Claim Issuance Policy**.
10. Select **OK**. The AD FS server is now configured for federation using WS-Fed.
163
182
164
183
## Next steps
165
184
Next, you'll [configure SAML/WS-Fed IdP federation in Azure AD](direct-federation.md#step-3-configure-samlws-fed-idp-federation-in-azure-ad) either in the Azure AD portal or by using the Microsoft Graph API.
0 commit comments