Skip to content

Commit e5c5390

Browse files
authored
Merge pull request #194738 from msmimart/mm-90744
[EXID] WS-Fed AD FS example: Fix RPT steps per GitHub Issue 90744
2 parents cabe929 + 8758ee0 commit e5c5390

File tree

1 file changed

+22
-14
lines changed

1 file changed

+22
-14
lines changed

articles/active-directory/external-identities/direct-federation-adfs.md

Lines changed: 22 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: B2B
88
ms.topic: how-to
9-
ms.date: 04/27/2021
9+
ms.date: 04/14/2022
1010

1111
ms.author: mimart
1212
author: msmimart
@@ -128,32 +128,40 @@ The next section illustrates how to configure the required attributes and claims
128128
### Before you begin
129129
An AD FS server must already be set up and functioning before you begin this procedure. For help with setting up an AD FS server, see [Create a test AD FS 3.0 instance on an Azure virtual machine](https://medium.com/in-the-weeds/create-a-test-active-directory-federation-services-3-0-instance-on-an-azure-virtual-machine-9071d978e8ed).
130130

131+
### Add the relying party trust and claim rules
131132

132-
### Add the relying party trust and claim rules
133-
1. On the AD FS server, go to **Tools** > **AD FS management**.
134-
1. In the navigation pane, select **Trust Relationships** > **Relying Party Trusts**.
135-
1. Under **Actions**, select **Add Relying Party Trust**.
136-
1. In the add relying party trust wizard, for **Select Data Source**, use the option **Import data about the relying party published online or on a local network**. Specify this federation metadata URL: `https://nexus.microsoftonline-p.com/federationmetadata/2007-06/federationmetadata.xml`. Leave other default selections. Select **Close**.
137-
1. The **Edit Claim Rules** wizard opens.
138-
1. In the **Edit Claim Rules** wizard, select **Add Rule**. In **Choose Rule Type**, select **Send Claims Using a Custom Rule**. Select *Next*.
133+
1. On the AD FS server, go to **Tools** > **AD FS management**.
134+
1. In the navigation pane, select **Trust Relationships** > **Relying Party Trusts**.
135+
1. Under **Actions**, select **Add Relying Party Trust**.
136+
1. In the **Select Data Source** section, select **Enter data about the relying party manually**, and then select **Next**.
137+
1. On the **Specify Display Name** page, type a name in **Display name**, under **Notes** type a description for this relying party trust, and then select **Next**.
138+
1. On the **Configure Certificate** page, if you have an optional token encryption certificate, select **Browse** to locate a certificate file, and then select **Next**.
139+
1. On the **Configure URL** page, select the **Enable support for the WS-Federation Passive protocol** check box. Under **Relying party WS-Federation Passive protocol URL**, type the URL for this relying party trust: `https://login.microsoftonline.com/login.srf`
140+
1. Select **Next**.
141+
1. On the **Configure Identifiers** page, specify the relying party trust identifier, including the tenant ID of the service partner’s Azure AD tenant: `https://login.microsoftonline.com/<tenant_ID>/`
142+
1. Select **Add** to add the identifier to the list, and then select **Next**.
143+
1. On the **Choose Access Control Policy** page, select a policy, and then select **Next**.
144+
1. On the **Ready to Add Trust** page, review the settings, and then select **Next** to save your relying party trust information.
145+
1. On the **Finish** page, select **Close**. This action automatically displays the **Edit Claim Rules** dialog box.
146+
1. In the **Edit Claim Rules** wizard, select **Add Rule**. In **Choose Rule Type**, select **Send Claims Using a Custom Rule**. Select *Next*.
139147
1. In **Configure Claim Rule**, specify the following values:
140148

141149
- **Claim rule name**: Issue Immutable ID
142150
- **Custom rule**: `c:[Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname"] => issue(store = "Active Directory", types = ("http://schemas.microsoft.com/LiveID/Federation/2008/05/ImmutableID"), query = "samAccountName={0};objectGUID;{1}", param = regexreplace(c.Value, "(?<domain>[^\\]+)\\(?<user>.+)", "${user}"), param = c.Value);`
143151

144-
1. Select **Finish**.
152+
1. Select **Finish**.
145153
1. The **Edit Claim Rules** window will show the new rule. Click **Apply**.
146-
1. In the same **Edit Claim Rules** wizard, select **Add Rule**. In **Cohose Rule Type**, select **Send LDAP Attributes as Claims**. Select **Next**.
147-
1. In **Configure Claim Rule**, specify the following values:
154+
1. In the same **Edit Claim Rules** wizard, select **Add Rule**. In **Choose Rule Type**, select **Send LDAP Attributes as Claims**. Select **Next**.
155+
1. In **Configure Claim Rule**, specify the following values:
148156

149157
- **Claim rule name**: Email claim rule
150158
- **Attribute store**: Active Directory
151159
- **LDAP Attribute**: E-Mail-Addresses
152-
- **Outgoing Claim Type**: E-Mail Address
160+
- **Outgoing Claim Type**: E-Mail Address
153161

154-
1. Select **Finish**.
162+
1. Select **Finish**.
155163
1. The **Edit Claim Rules** window will show the new rule. Click **Apply**.
156164
1. Click **OK**. The AD FS server is now configured for federation using WS-Fed.
157165

158166
## Next steps
159-
Next, you'll [configure SAML/WS-Fed IdP federation in Azure AD](direct-federation.md#step-3-configure-samlws-fed-idp-federation-in-azure-ad) either in the Azure AD portal or by using PowerShell.
167+
Next, you'll [configure SAML/WS-Fed IdP federation in Azure AD](direct-federation.md#step-3-configure-samlws-fed-idp-federation-in-azure-ad) either in the Azure AD portal or by using the Microsoft Graph API.

0 commit comments

Comments
 (0)