You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/direct-federation-adfs.md
+22-14Lines changed: 22 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: B2B
8
8
ms.topic: how-to
9
-
ms.date: 04/27/2021
9
+
ms.date: 04/14/2022
10
10
11
11
ms.author: mimart
12
12
author: msmimart
@@ -128,32 +128,40 @@ The next section illustrates how to configure the required attributes and claims
128
128
### Before you begin
129
129
An AD FS server must already be set up and functioning before you begin this procedure. For help with setting up an AD FS server, see [Create a test AD FS 3.0 instance on an Azure virtual machine](https://medium.com/in-the-weeds/create-a-test-active-directory-federation-services-3-0-instance-on-an-azure-virtual-machine-9071d978e8ed).
130
130
131
+
### Add the relying party trust and claim rules
131
132
132
-
### Add the relying party trust and claim rules
133
-
1. On the AD FS server, go to **Tools** > **AD FS management**.
134
-
1. In the navigation pane, select **Trust Relationships** > **Relying Party Trusts**.
135
-
1. Under **Actions**, select **Add Relying Party Trust**.
136
-
1. In the add relying party trust wizard, for **Select Data Source**, use the option **Import data about the relying party published online or on a local network**. Specify this federation metadata URL: `https://nexus.microsoftonline-p.com/federationmetadata/2007-06/federationmetadata.xml`. Leave other default selections. Select **Close**.
137
-
1. The **Edit Claim Rules** wizard opens.
138
-
1. In the **Edit Claim Rules** wizard, select **Add Rule**. In **Choose Rule Type**, select **Send Claims Using a Custom Rule**. Select *Next*.
133
+
1. On the AD FS server, go to **Tools** > **AD FS management**.
134
+
1. In the navigation pane, select **Trust Relationships** > **Relying Party Trusts**.
135
+
1. Under **Actions**, select **Add Relying Party Trust**.
136
+
1. In the **Select Data Source** section, select **Enter data about the relying party manually**, and then select **Next**.
137
+
1. On the **Specify Display Name** page, type a name in **Display name**, under **Notes** type a description for this relying party trust, and then select **Next**.
138
+
1. On the **Configure Certificate** page, if you have an optional token encryption certificate, select **Browse** to locate a certificate file, and then select **Next**.
139
+
1. On the **Configure URL** page, select the **Enable support for the WS-Federation Passive protocol** check box. Under **Relying party WS-Federation Passive protocol URL**, type the URL for this relying party trust: `https://login.microsoftonline.com/login.srf`
140
+
1. Select **Next**.
141
+
1. On the **Configure Identifiers** page, specify the relying party trust identifier, including the tenant ID of the service partner’s Azure AD tenant: `https://login.microsoftonline.com/<tenant_ID>/`
142
+
1. Select **Add** to add the identifier to the list, and then select **Next**.
143
+
1. On the **Choose Access Control Policy** page, select a policy, and then select **Next**.
144
+
1. On the **Ready to Add Trust** page, review the settings, and then select **Next** to save your relying party trust information.
145
+
1. On the **Finish** page, select **Close**. This action automatically displays the **Edit Claim Rules** dialog box.
146
+
1. In the **Edit Claim Rules** wizard, select **Add Rule**. In **Choose Rule Type**, select **Send Claims Using a Custom Rule**. Select *Next*.
139
147
1. In **Configure Claim Rule**, specify the following values:
1. The **Edit Claim Rules** window will show the new rule. Click **Apply**.
146
-
1. In the same **Edit Claim Rules** wizard, select **Add Rule**. In **Cohose Rule Type**, select **Send LDAP Attributes as Claims**. Select **Next**.
147
-
1. In **Configure Claim Rule**, specify the following values:
154
+
1. In the same **Edit Claim Rules** wizard, select **Add Rule**. In **Choose Rule Type**, select **Send LDAP Attributes as Claims**. Select **Next**.
155
+
1. In **Configure Claim Rule**, specify the following values:
148
156
149
157
-**Claim rule name**: Email claim rule
150
158
-**Attribute store**: Active Directory
151
159
-**LDAP Attribute**: E-Mail-Addresses
152
-
-**Outgoing Claim Type**: E-Mail Address
160
+
-**Outgoing Claim Type**: E-Mail Address
153
161
154
-
1. Select **Finish**.
162
+
1. Select **Finish**.
155
163
1. The **Edit Claim Rules** window will show the new rule. Click **Apply**.
156
164
1. Click **OK**. The AD FS server is now configured for federation using WS-Fed.
157
165
158
166
## Next steps
159
-
Next, you'll [configure SAML/WS-Fed IdP federation in Azure AD](direct-federation.md#step-3-configure-samlws-fed-idp-federation-in-azure-ad) either in the Azure AD portal or by using PowerShell.
167
+
Next, you'll [configure SAML/WS-Fed IdP federation in Azure AD](direct-federation.md#step-3-configure-samlws-fed-idp-federation-in-azure-ad) either in the Azure AD portal or by using the Microsoft Graph API.
0 commit comments