SlideShare a Scribd company logo
1 of 44
ADFS
Active Directory Federation
Services
What is ADFS?
 AD FS provides simplified, secured identity federation
and Web single sign-on (SSO) capabilities for end
users who want to access applications within an AD
FS-secured enterprise, in federation partner
organizations, or in the cloud.
ADFS Features
 Manage Risk with Conditional Access Control
• AD FS provides a rich level of authorization that controls who has
access to what applications. This can be based on
• User attributes (UPN, email, security group membership,
authentication strength, etc.)
• Device attributes (whether the device is workplace joined)
• Request attributes (network location, IP address, or user agent)
• Flexible per-application access policy based on user data, device
data, or network location.
ADFS Features
 Manage Risk with Additional Multi-Factor Authentication for
Sensitive Applications
• AD FS allows you to control policies to potentially require multi-
factor authentication on a per application basis.
• AD FS provides extensibility points for any multi-factor vendor to
integrate deeply for a secure and seamless multi-factor
experience for end users
ADFS Features
 Device Workplace Join
By using Workplace Join, information workers can join their personal devices with
their company's workplace computers.
When you join your personal device to your workplace, it becomes a known device
and provides seamless second factor authentication to workplace resources and
applications.
Windows 8.1 and iOS 6.0+, and Android 4.0+ devices can be joined by using
Workplace Join.
 Configure Additional Authentication Methods for AD FS
Support for third-party and custom built authentication methods when
configuring multi-factor authentication.
ADFS Features
 Customization of web themes
• Unified customization of the AD FS service (the changes are made once and
then automatically propagated to the rest of the AD FS federation servers in a
given farm)
 Simplified deployment experience
• Remote installation and configuration through Server Manager.
• Scaling Out Easily
• SQL Server merge replication support when deploying AD FS across
globally dispersed datacenters.
• Group Managed Service Account support.
Key concepts Identity Provider (IP)
Active
Directory
Security Token Service (STS)
User / Subject /Principal Requests token for AppX
Issues Security Token
crafted for Appx
Relying party (RP)/
Resource provider
Issuer IP-STS
Trusts the Security Token
from the issuer
The Security Token
Contains claims about the user
For example:
• Name
• Group membership
• User Principal Name (UPN)
• Email address of user
• Email address of manager
• Phone number
• Other attribute values
Security Token “Authenticates”
user to the application
ST
Signed by issuer
AppX
Key Concepts
An essential tool
Fiddler as a man in the middle
 Fiddler can intercept HTTPS traffic
 Creates a certificate that represents the destination website
 Browser will display certificate as invalid unless added to certificate store
 If you add it to the store make sure you remove it after testing
How Works?
AD FS STS
Claims-aware app Active Directory
Browse app
Not authenticated
Redirected to STS
Authenticate
Our user
Query for user attributes
Return security token
Return cookies
and page
Send Token
App trusts STS
First redirect to STS
Decoded redirect URL:
https://adfs.example.com/adfs/ls/?
wa=wsignin1.0&
wtrealm=https://site1.example.com/Federation/&
wctx=rm=0&id=passive&ru=%2fFederation%2f&
wct=2011-04-15T15:12:28Z
%2f decodes to /
Web page returned after
authentication
 The SAML data is always signed, it can be encrypted if required
MSISSelectionPersistent: identifies authenticating IP-STS
Located through Home Realm Discovery (HRD)
MSISAuth…: authenticated session cookies
MSISAuthenticated: time when the authentication took place
MSISSignOut: Keeps track of all RPs to which the session has authenticated
MSISLoopDetectionCookie: Prevents multiple authentication request due to configuration error
Time-out default: 6 request for authentication to same RP within a short space of time
AD FS cookies
Allows browser session to remain authenticated to web application
Web app cookies
Main token types
JSON Web Tokens (JWT)
Simple Web Token
(Microsoft, Google, Yahoo)
AD FS architecture
Active Directory
Firewall &
Load Balancer
Perimeter network
Web Application Proxy
farm
Firewall &
Load Balancer
Internet
Intranet
AD FS farm
Configuration
database
The WAP stores/retrieves it
configuration on/from AD FS
Remote user CorpNet users
Forms
Authentication
DNS requirements
 CNAME entries must be added for the device registration service
 enterpriseregistration.<upn suffix> CNAME sts.example.com
 A CNAME entry will be required for each of the upn suffixes used in the AD
Perimeter network
WAP farm
Intranet
AD FS farm
sts.example.com sts.example.com
sts.example.com
resolves to external
WAP VIP
sts.example.com
resolves to the AD FS VIP
Add host file records
If the intranet DNS
cannot be used by the
WAP
Installation prerequisites
 Decide on the configuration database
 Install the SSL certificate into local computer store on each farm node
 Enable the creation of Group Managed Service Accounts
 Not required, but recommended
 Active Directory Windows 2008 or later
 Server 2003 functional level or later
Two options for the
configuration database
 Windows Internal Database (WID)
 Each farm member holds a copy
 Maximum of five farm members
 The first server in the farm is referred to as the primary federation server
 Has read/write copy of the configuration database
 Subsequent servers added to the farm are called secondary federation servers
 Read only copy to the configuration database
 Changes updated every 5 minutes from the primary federation server
 SQL
 You must add appropriate SQL redundancy to avoid a single-point of failure
SQL database
 SQL 2008 or newer
 No theoretical limit to farm size
 Provides AD FS functionality not available with WID
 SAML artifact resolution
 RP retrieves token from claims provider
 SAML/WS-Federation token replay detection
 Protects both WS-Federation passive profile and the SAML WebSSO profile
 Resource server detect replay of token from account server
Load-balancing & firewall settings
 NLB or a hardware load-balancer can be used with the proxy and AD FS farms
 NLB cannot be used for AD FS if it is running on a domain controller
 Firewall
 Port 443 must be enabled
 Must allow port 49443 if certificate authentication is to be used
AD FS farm SSL certificate
 The subject name and subject alternative name must match the farm url
 sts.example.com or *.example.com
 For workplace join a subject alternative name (SAN) of enterpriseregistration.<upn suffix> is
required
 A SAN for each upn suffix in the AD must be added
 Recommendations:
 Use the same certificate on all nodes of the farm
 Use the same certificate on the WAP farm nodes
 Obtain the certificate from a public CA
Group Managed Service Account
(gMSA)
 The AD FS service account can be a gMSA
 A gMSA can be run across multiple servers
 The password (120 characters) for a gMSA is maintained by the Key
Distribution Service (KDS) running on a Windows Server 2012 domain
controller
 The password is calculated using the KDS Root Key, the current time and the gMSA SID
 The KDS Root Key must be created using PowerShell
 At least one 2012 DC is required
 Recommended a minimum of 2 DCs
Create the KDS Root Key
 Before any gMSA accounts can be created the KDS Root Key must be
generated using PowerShell
 Add-KdsRootKey –EffectiveImmediately
 There is an enforced delay of 10 hours before a gMSA can be created after
running the command
 This is to “guarantee” that the key has propagated to all 2012 DCs
 For lab work the delay can be overridden using
 Add-KdsRootKey –EffectiveTime (get-date).addhours(-10)
Creating a gMSA
 Can be created with PowerShell
 Let the ADFS wizard do it for you
 Updates the PrincipalsAllowedToRetrieveManagedPassword property with the DN of the server
node being installed
 Sets the service principal name
Adding additional farm members
Adding additional farm members
Reasons for deployment
AD
RP1
Your
AD FS
Your
users
AD
RP1
Your
ADFS
Your
users
Partner or
3rd party STS
Trust
Trust
Trust
External
users
Your
claims-aware
applications
Identity
store
Your
claims-aware
applications
Claims-aware applications may be
hosted on-premises or in the cloud
AD
Your
AD FS
Your
users
Partner or 3rd party services
(claims-aware)
Trust
STS
Reasons for deployment (continued)
Resource STS
RP2
Trusts
RP1 RP4
Trusts
RP3
Resource STSs apply
application authorization rules
STS owned, managed and run by business unit
Process token
Home realm discovery
Redirected to partner STS requesting ST for partner user
Return ST for consumption by your STS
Return new ST
Working with partners Your AD FS STS
Your Claims-aware app
Active
Directory
Partner
user
Partner
AD FS STS & IP
Redirected to your STS
Authenticate
Send Token
Return cookies
and page
Browse app
Not authenticated
Redirect to your STS
App trusts STS Your STS
trusts your
partner’s STS
Validating the install
 Access the federation metadata
 https://sts.example.com/FederationMetadata/2007-06/FederationMetadata.xml
 If the browser does not show the page as XML, switch to compatibility view
 Try the IdP initiated sign on
 https://sts.example.com/adfs/ls/IdpinitiatedSignOn.aspx
Web Application Proxy
Web
application
ADFS
Claims-aware
web application
Web application
with Windows
Authentication
AD FS
preauthentication
Kerberos
constrained
delegation
Publish
applications and
services to the
Internet
WAP
Users are authenticated
and authorized before
gaining access to the
corporate network
Pass-through
KCD
Kerberos Constrained Delegation
Firewall
WAP
DC
Web application using Windows
Authentication (Kerberos)
The SPN for the
application must be
registered on the
service account running
the application
The WAP computer account must
be configured for constrained
delegation with protocol transition
to the SPN of the web application
AD FS
preauthentication
required
Network Topology
Backend Server
Backend Server
AD FS
Backend Server
Config.
Store
Web Application
Proxy
DMZ
AD FS Proxy
Firewall
Load
Balancer
Load
Balancer
Firewall
Active Directory
Domain
Controller
Client
(browser,
Office client
or modern
app)
Corporate Network
Internet
HTTP/S
HTTP/S
AuthN
Config. API
over HTTPS
AuthN
Web UI
Claims, KCD,
OAuth, MSOFBA,
or pass-through
Obtain KCD
ticket for IWA
AuthN
WAP Reverse Proxy Functionalities
 Network Isolation: even in pass-through, even post pre-auth,
backend is never exposed directly
 Basic DOS: throttling, queuing, session establishing, before
routing to backend
 URL Translation: HTTP header level translation enables
publishing non-FQDN URLs, and HTTPSHTTP
 Selective Publishing: per internal application endpoint
 AD FS Proxy services: FS, MFA, DRS
 Web Protocols Only: HTTP, HTTPS
WAP Pre-Authentication Functionalities
 Rich Policy: user + device identity, application identity,
network location
 MFA Options: smartcards, phone factor, soft password lockout
 Multiple Authentication Methods: KCD, claims, OAuth, MSO-
FBA, …
 SSO: Avoid requesting credentials again, after first pre-auth
 Via a dedicated security token of AD FS
WAP requirements
 One or two network cards
 In some scenarios DirectAccess and/or VPN can be supported on the same server
 See http://technet.microsoft.com/en-us/library/dn383647.aspx
 Install the AD FS SSL certificate on each WAP node
 A certificate will be required for each published application
 To use KCD the WAP must be domain joined
Installing the Web Application Proxy
Running the wizard
 The same method is used to add one or more nodes
Simplify Single Sign-On with ADFS

More Related Content

What's hot

Azure AD connect- Deep Dive Webinar PPT
Azure AD connect- Deep Dive Webinar PPTAzure AD connect- Deep Dive Webinar PPT
Azure AD connect- Deep Dive Webinar PPTRadhakrishnan Govindan
 
Community call: Develop multi tenant apps with the Microsoft identity platform
Community call: Develop multi tenant apps with the Microsoft identity platformCommunity call: Develop multi tenant apps with the Microsoft identity platform
Community call: Develop multi tenant apps with the Microsoft identity platformMicrosoft 365 Developer
 
Identity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityIdentity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityAmazon Web Services
 
Building Big Data Applications using Spark, Hive, HBase and Kafka
Building Big Data Applications using Spark, Hive, HBase and KafkaBuilding Big Data Applications using Spark, Hive, HBase and Kafka
Building Big Data Applications using Spark, Hive, HBase and KafkaAshish Thapliyal
 
Veeam Backup for Office 365
Veeam Backup for Office 365Veeam Backup for Office 365
Veeam Backup for Office 365Ingram Micro
 
Azure Identity and access management
Azure   Identity and access managementAzure   Identity and access management
Azure Identity and access managementDinusha Kumarasiri
 
Azure Cloud Governance
Azure Cloud GovernanceAzure Cloud Governance
Azure Cloud GovernanceJonathan Wade
 
AWS Connectivity, VPC Design and Security Pro Tips
AWS Connectivity, VPC Design and Security Pro TipsAWS Connectivity, VPC Design and Security Pro Tips
AWS Connectivity, VPC Design and Security Pro TipsShiva Narayanaswamy
 
Azure conditional access
Azure conditional accessAzure conditional access
Azure conditional accessTad Yoke
 
Amazon SageMaker Deep Dive for Builders
Amazon SageMaker Deep Dive for BuildersAmazon SageMaker Deep Dive for Builders
Amazon SageMaker Deep Dive for BuildersAmazon Web Services
 
Azure AD Presentation - @ BITPro - Ajay
Azure AD Presentation - @ BITPro - AjayAzure AD Presentation - @ BITPro - Ajay
Azure AD Presentation - @ BITPro - AjayAnoop Nair
 
The Path to IAM Maturity
The Path to IAM MaturityThe Path to IAM Maturity
The Path to IAM MaturityJerod Brennen
 
Taking conditional access to the next level
Taking conditional access to the next levelTaking conditional access to the next level
Taking conditional access to the next levelRonny de Jong
 
Amundsen: From discovering to security data
Amundsen: From discovering to security dataAmundsen: From discovering to security data
Amundsen: From discovering to security datamarkgrover
 

What's hot (20)

Azure AD connect- Deep Dive Webinar PPT
Azure AD connect- Deep Dive Webinar PPTAzure AD connect- Deep Dive Webinar PPT
Azure AD connect- Deep Dive Webinar PPT
 
Community call: Develop multi tenant apps with the Microsoft identity platform
Community call: Develop multi tenant apps with the Microsoft identity platformCommunity call: Develop multi tenant apps with the Microsoft identity platform
Community call: Develop multi tenant apps with the Microsoft identity platform
 
Identity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityIdentity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS Security
 
Azure Hybid
Azure HybidAzure Hybid
Azure Hybid
 
Building Big Data Applications using Spark, Hive, HBase and Kafka
Building Big Data Applications using Spark, Hive, HBase and KafkaBuilding Big Data Applications using Spark, Hive, HBase and Kafka
Building Big Data Applications using Spark, Hive, HBase and Kafka
 
Veeam Backup for Office 365
Veeam Backup for Office 365Veeam Backup for Office 365
Veeam Backup for Office 365
 
Azure Identity and access management
Azure   Identity and access managementAzure   Identity and access management
Azure Identity and access management
 
Azure Cloud Governance
Azure Cloud GovernanceAzure Cloud Governance
Azure Cloud Governance
 
AWS Connectivity, VPC Design and Security Pro Tips
AWS Connectivity, VPC Design and Security Pro TipsAWS Connectivity, VPC Design and Security Pro Tips
AWS Connectivity, VPC Design and Security Pro Tips
 
Azure conditional access
Azure conditional accessAzure conditional access
Azure conditional access
 
Amazon SageMaker Deep Dive for Builders
Amazon SageMaker Deep Dive for BuildersAmazon SageMaker Deep Dive for Builders
Amazon SageMaker Deep Dive for Builders
 
Understanding Azure AD
Understanding Azure ADUnderstanding Azure AD
Understanding Azure AD
 
Azure AD Presentation - @ BITPro - Ajay
Azure AD Presentation - @ BITPro - AjayAzure AD Presentation - @ BITPro - Ajay
Azure AD Presentation - @ BITPro - Ajay
 
The Path to IAM Maturity
The Path to IAM MaturityThe Path to IAM Maturity
The Path to IAM Maturity
 
Lakehouse in Azure
Lakehouse in AzureLakehouse in Azure
Lakehouse in Azure
 
AWS Security Checklist
AWS Security ChecklistAWS Security Checklist
AWS Security Checklist
 
Taking conditional access to the next level
Taking conditional access to the next levelTaking conditional access to the next level
Taking conditional access to the next level
 
MCSA 70-412 Chapter 06
MCSA 70-412 Chapter 06MCSA 70-412 Chapter 06
MCSA 70-412 Chapter 06
 
Architecting a datalake
Architecting a datalakeArchitecting a datalake
Architecting a datalake
 
Amundsen: From discovering to security data
Amundsen: From discovering to security dataAmundsen: From discovering to security data
Amundsen: From discovering to security data
 

Similar to Simplify Single Sign-On with ADFS

Developing and deploying Identity-enabled applications for the cloud
Developing and deploying Identity-enabled applications for the cloudDeveloping and deploying Identity-enabled applications for the cloud
Developing and deploying Identity-enabled applications for the cloudMaarten Balliauw
 
O365con14 - moving from on-premises to online, the road to follow
O365con14 - moving from on-premises to online, the road to followO365con14 - moving from on-premises to online, the road to follow
O365con14 - moving from on-premises to online, the road to followNCCOMMS
 
ITPROCEED_TransformTheDatacenter_ten most common mistakes when deploying adfs...
ITPROCEED_TransformTheDatacenter_ten most common mistakes when deploying adfs...ITPROCEED_TransformTheDatacenter_ten most common mistakes when deploying adfs...
ITPROCEED_TransformTheDatacenter_ten most common mistakes when deploying adfs...ITProceed
 
Azure Community Tour 2019 - AZUGDK
Azure Community Tour 2019 - AZUGDKAzure Community Tour 2019 - AZUGDK
Azure Community Tour 2019 - AZUGDKPeter Selch Dahl
 
Windows server 2003_r2
Windows server 2003_r2Windows server 2003_r2
Windows server 2003_r2tameemyousaf
 
Technet System Center Mobile Device Manager Presentation
Technet System Center Mobile Device Manager PresentationTechnet System Center Mobile Device Manager Presentation
Technet System Center Mobile Device Manager Presentationjasonlan
 
WSO2Con 2011: Introduction to Stratos
WSO2Con 2011: Introduction to StratosWSO2Con 2011: Introduction to Stratos
WSO2Con 2011: Introduction to StratosAfkham Azeez
 
WSO2con 2011: Introduction to Stratos
WSO2con 2011:  Introduction to StratosWSO2con 2011:  Introduction to Stratos
WSO2con 2011: Introduction to StratosAfkham Azeez
 
(BIZ303) Active Directory in the AWS Cloud | AWS re:Invent 2014
(BIZ303) Active Directory in the AWS Cloud | AWS re:Invent 2014(BIZ303) Active Directory in the AWS Cloud | AWS re:Invent 2014
(BIZ303) Active Directory in the AWS Cloud | AWS re:Invent 2014Amazon Web Services
 
Análisis de riesgos en Azure y protección de la información
Análisis de riesgos en Azure y protección de la informaciónAnálisis de riesgos en Azure y protección de la información
Análisis de riesgos en Azure y protección de la informaciónPlain Concepts
 
AD FS Workshop | Part 1 | Quick Overview
AD FS Workshop | Part 1 | Quick OverviewAD FS Workshop | Part 1 | Quick Overview
AD FS Workshop | Part 1 | Quick OverviewGranikos GmbH & Co. KG
 
AWS_IoT_Device_Management_Workshop.pptx
AWS_IoT_Device_Management_Workshop.pptxAWS_IoT_Device_Management_Workshop.pptx
AWS_IoT_Device_Management_Workshop.pptxhawkheadtrolley
 
Azure Global Bootcamp 2017 Azure AD Deployment
Azure Global Bootcamp 2017 Azure AD DeploymentAzure Global Bootcamp 2017 Azure AD Deployment
Azure Global Bootcamp 2017 Azure AD DeploymentAnthony Clendenen
 
Amazon Web Services: Overview of Security Processes
Amazon Web Services: Overview of Security ProcessesAmazon Web Services: Overview of Security Processes
Amazon Web Services: Overview of Security Processeswhite paper
 
Becoming a Microsoft Specialist in Microsoft Azure Infrastructure
Becoming a Microsoft Specialist in Microsoft Azure InfrastructureBecoming a Microsoft Specialist in Microsoft Azure Infrastructure
Becoming a Microsoft Specialist in Microsoft Azure InfrastructureSyed Irtaza Ali
 
CTU June 2011 - Windows Azure App Fabric
CTU June 2011 - Windows Azure App FabricCTU June 2011 - Windows Azure App Fabric
CTU June 2011 - Windows Azure App FabricSpiffy
 
0505 Windows Server 2008 一日精華營 PartI
0505 Windows Server 2008 一日精華營 PartI0505 Windows Server 2008 一日精華營 PartI
0505 Windows Server 2008 一日精華營 PartITimothy Chen
 
Azure PTA vs ADFS vs Desktop SSO
Azure PTA vs ADFS vs Desktop SSOAzure PTA vs ADFS vs Desktop SSO
Azure PTA vs ADFS vs Desktop SSOCoLaboraDK
 
Colabora.dk - Azure PTA vs ADFS vs Desktop SSO
Colabora.dk - Azure PTA vs ADFS vs Desktop SSOColabora.dk - Azure PTA vs ADFS vs Desktop SSO
Colabora.dk - Azure PTA vs ADFS vs Desktop SSOPeter Selch Dahl
 

Similar to Simplify Single Sign-On with ADFS (20)

Developing and deploying Identity-enabled applications for the cloud
Developing and deploying Identity-enabled applications for the cloudDeveloping and deploying Identity-enabled applications for the cloud
Developing and deploying Identity-enabled applications for the cloud
 
O365con14 - moving from on-premises to online, the road to follow
O365con14 - moving from on-premises to online, the road to followO365con14 - moving from on-premises to online, the road to follow
O365con14 - moving from on-premises to online, the road to follow
 
ITPROCEED_TransformTheDatacenter_ten most common mistakes when deploying adfs...
ITPROCEED_TransformTheDatacenter_ten most common mistakes when deploying adfs...ITPROCEED_TransformTheDatacenter_ten most common mistakes when deploying adfs...
ITPROCEED_TransformTheDatacenter_ten most common mistakes when deploying adfs...
 
IdP, SAML, OAuth
IdP, SAML, OAuthIdP, SAML, OAuth
IdP, SAML, OAuth
 
Azure Community Tour 2019 - AZUGDK
Azure Community Tour 2019 - AZUGDKAzure Community Tour 2019 - AZUGDK
Azure Community Tour 2019 - AZUGDK
 
Windows server 2003_r2
Windows server 2003_r2Windows server 2003_r2
Windows server 2003_r2
 
Technet System Center Mobile Device Manager Presentation
Technet System Center Mobile Device Manager PresentationTechnet System Center Mobile Device Manager Presentation
Technet System Center Mobile Device Manager Presentation
 
WSO2Con 2011: Introduction to Stratos
WSO2Con 2011: Introduction to StratosWSO2Con 2011: Introduction to Stratos
WSO2Con 2011: Introduction to Stratos
 
WSO2con 2011: Introduction to Stratos
WSO2con 2011:  Introduction to StratosWSO2con 2011:  Introduction to Stratos
WSO2con 2011: Introduction to Stratos
 
(BIZ303) Active Directory in the AWS Cloud | AWS re:Invent 2014
(BIZ303) Active Directory in the AWS Cloud | AWS re:Invent 2014(BIZ303) Active Directory in the AWS Cloud | AWS re:Invent 2014
(BIZ303) Active Directory in the AWS Cloud | AWS re:Invent 2014
 
Análisis de riesgos en Azure y protección de la información
Análisis de riesgos en Azure y protección de la informaciónAnálisis de riesgos en Azure y protección de la información
Análisis de riesgos en Azure y protección de la información
 
AD FS Workshop | Part 1 | Quick Overview
AD FS Workshop | Part 1 | Quick OverviewAD FS Workshop | Part 1 | Quick Overview
AD FS Workshop | Part 1 | Quick Overview
 
AWS_IoT_Device_Management_Workshop.pptx
AWS_IoT_Device_Management_Workshop.pptxAWS_IoT_Device_Management_Workshop.pptx
AWS_IoT_Device_Management_Workshop.pptx
 
Azure Global Bootcamp 2017 Azure AD Deployment
Azure Global Bootcamp 2017 Azure AD DeploymentAzure Global Bootcamp 2017 Azure AD Deployment
Azure Global Bootcamp 2017 Azure AD Deployment
 
Amazon Web Services: Overview of Security Processes
Amazon Web Services: Overview of Security ProcessesAmazon Web Services: Overview of Security Processes
Amazon Web Services: Overview of Security Processes
 
Becoming a Microsoft Specialist in Microsoft Azure Infrastructure
Becoming a Microsoft Specialist in Microsoft Azure InfrastructureBecoming a Microsoft Specialist in Microsoft Azure Infrastructure
Becoming a Microsoft Specialist in Microsoft Azure Infrastructure
 
CTU June 2011 - Windows Azure App Fabric
CTU June 2011 - Windows Azure App FabricCTU June 2011 - Windows Azure App Fabric
CTU June 2011 - Windows Azure App Fabric
 
0505 Windows Server 2008 一日精華營 PartI
0505 Windows Server 2008 一日精華營 PartI0505 Windows Server 2008 一日精華營 PartI
0505 Windows Server 2008 一日精華營 PartI
 
Azure PTA vs ADFS vs Desktop SSO
Azure PTA vs ADFS vs Desktop SSOAzure PTA vs ADFS vs Desktop SSO
Azure PTA vs ADFS vs Desktop SSO
 
Colabora.dk - Azure PTA vs ADFS vs Desktop SSO
Colabora.dk - Azure PTA vs ADFS vs Desktop SSOColabora.dk - Azure PTA vs ADFS vs Desktop SSO
Colabora.dk - Azure PTA vs ADFS vs Desktop SSO
 

Recently uploaded

SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtimeandrehoraa
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceBrainSell Technologies
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...Technogeeks
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfStefano Stabellini
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....kzayra69
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 

Recently uploaded (20)

SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtime
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdf
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 

Simplify Single Sign-On with ADFS

  • 2. What is ADFS?  AD FS provides simplified, secured identity federation and Web single sign-on (SSO) capabilities for end users who want to access applications within an AD FS-secured enterprise, in federation partner organizations, or in the cloud.
  • 3. ADFS Features  Manage Risk with Conditional Access Control • AD FS provides a rich level of authorization that controls who has access to what applications. This can be based on • User attributes (UPN, email, security group membership, authentication strength, etc.) • Device attributes (whether the device is workplace joined) • Request attributes (network location, IP address, or user agent) • Flexible per-application access policy based on user data, device data, or network location.
  • 4. ADFS Features  Manage Risk with Additional Multi-Factor Authentication for Sensitive Applications • AD FS allows you to control policies to potentially require multi- factor authentication on a per application basis. • AD FS provides extensibility points for any multi-factor vendor to integrate deeply for a secure and seamless multi-factor experience for end users
  • 5. ADFS Features  Device Workplace Join By using Workplace Join, information workers can join their personal devices with their company's workplace computers. When you join your personal device to your workplace, it becomes a known device and provides seamless second factor authentication to workplace resources and applications. Windows 8.1 and iOS 6.0+, and Android 4.0+ devices can be joined by using Workplace Join.  Configure Additional Authentication Methods for AD FS Support for third-party and custom built authentication methods when configuring multi-factor authentication.
  • 6. ADFS Features  Customization of web themes • Unified customization of the AD FS service (the changes are made once and then automatically propagated to the rest of the AD FS federation servers in a given farm)  Simplified deployment experience • Remote installation and configuration through Server Manager. • Scaling Out Easily • SQL Server merge replication support when deploying AD FS across globally dispersed datacenters. • Group Managed Service Account support.
  • 7. Key concepts Identity Provider (IP) Active Directory Security Token Service (STS) User / Subject /Principal Requests token for AppX Issues Security Token crafted for Appx Relying party (RP)/ Resource provider Issuer IP-STS Trusts the Security Token from the issuer The Security Token Contains claims about the user For example: • Name • Group membership • User Principal Name (UPN) • Email address of user • Email address of manager • Phone number • Other attribute values Security Token “Authenticates” user to the application ST Signed by issuer AppX
  • 10. Fiddler as a man in the middle  Fiddler can intercept HTTPS traffic  Creates a certificate that represents the destination website  Browser will display certificate as invalid unless added to certificate store  If you add it to the store make sure you remove it after testing
  • 11. How Works? AD FS STS Claims-aware app Active Directory Browse app Not authenticated Redirected to STS Authenticate Our user Query for user attributes Return security token Return cookies and page Send Token App trusts STS
  • 12. First redirect to STS Decoded redirect URL: https://adfs.example.com/adfs/ls/? wa=wsignin1.0& wtrealm=https://site1.example.com/Federation/& wctx=rm=0&id=passive&ru=%2fFederation%2f& wct=2011-04-15T15:12:28Z %2f decodes to /
  • 13. Web page returned after authentication  The SAML data is always signed, it can be encrypted if required
  • 14. MSISSelectionPersistent: identifies authenticating IP-STS Located through Home Realm Discovery (HRD) MSISAuth…: authenticated session cookies MSISAuthenticated: time when the authentication took place MSISSignOut: Keeps track of all RPs to which the session has authenticated MSISLoopDetectionCookie: Prevents multiple authentication request due to configuration error Time-out default: 6 request for authentication to same RP within a short space of time AD FS cookies
  • 15. Allows browser session to remain authenticated to web application Web app cookies
  • 16. Main token types JSON Web Tokens (JWT) Simple Web Token (Microsoft, Google, Yahoo)
  • 17. AD FS architecture Active Directory Firewall & Load Balancer Perimeter network Web Application Proxy farm Firewall & Load Balancer Internet Intranet AD FS farm Configuration database The WAP stores/retrieves it configuration on/from AD FS Remote user CorpNet users Forms Authentication
  • 18. DNS requirements  CNAME entries must be added for the device registration service  enterpriseregistration.<upn suffix> CNAME sts.example.com  A CNAME entry will be required for each of the upn suffixes used in the AD Perimeter network WAP farm Intranet AD FS farm sts.example.com sts.example.com sts.example.com resolves to external WAP VIP sts.example.com resolves to the AD FS VIP Add host file records If the intranet DNS cannot be used by the WAP
  • 19. Installation prerequisites  Decide on the configuration database  Install the SSL certificate into local computer store on each farm node  Enable the creation of Group Managed Service Accounts  Not required, but recommended  Active Directory Windows 2008 or later  Server 2003 functional level or later
  • 20. Two options for the configuration database  Windows Internal Database (WID)  Each farm member holds a copy  Maximum of five farm members  The first server in the farm is referred to as the primary federation server  Has read/write copy of the configuration database  Subsequent servers added to the farm are called secondary federation servers  Read only copy to the configuration database  Changes updated every 5 minutes from the primary federation server  SQL  You must add appropriate SQL redundancy to avoid a single-point of failure
  • 21. SQL database  SQL 2008 or newer  No theoretical limit to farm size  Provides AD FS functionality not available with WID  SAML artifact resolution  RP retrieves token from claims provider  SAML/WS-Federation token replay detection  Protects both WS-Federation passive profile and the SAML WebSSO profile  Resource server detect replay of token from account server
  • 22. Load-balancing & firewall settings  NLB or a hardware load-balancer can be used with the proxy and AD FS farms  NLB cannot be used for AD FS if it is running on a domain controller  Firewall  Port 443 must be enabled  Must allow port 49443 if certificate authentication is to be used
  • 23. AD FS farm SSL certificate  The subject name and subject alternative name must match the farm url  sts.example.com or *.example.com  For workplace join a subject alternative name (SAN) of enterpriseregistration.<upn suffix> is required  A SAN for each upn suffix in the AD must be added  Recommendations:  Use the same certificate on all nodes of the farm  Use the same certificate on the WAP farm nodes  Obtain the certificate from a public CA
  • 24. Group Managed Service Account (gMSA)  The AD FS service account can be a gMSA  A gMSA can be run across multiple servers  The password (120 characters) for a gMSA is maintained by the Key Distribution Service (KDS) running on a Windows Server 2012 domain controller  The password is calculated using the KDS Root Key, the current time and the gMSA SID  The KDS Root Key must be created using PowerShell  At least one 2012 DC is required  Recommended a minimum of 2 DCs
  • 25. Create the KDS Root Key  Before any gMSA accounts can be created the KDS Root Key must be generated using PowerShell  Add-KdsRootKey –EffectiveImmediately  There is an enforced delay of 10 hours before a gMSA can be created after running the command  This is to “guarantee” that the key has propagated to all 2012 DCs  For lab work the delay can be overridden using  Add-KdsRootKey –EffectiveTime (get-date).addhours(-10)
  • 26. Creating a gMSA  Can be created with PowerShell  Let the ADFS wizard do it for you  Updates the PrincipalsAllowedToRetrieveManagedPassword property with the DN of the server node being installed  Sets the service principal name
  • 27.
  • 30. Reasons for deployment AD RP1 Your AD FS Your users AD RP1 Your ADFS Your users Partner or 3rd party STS Trust Trust Trust External users Your claims-aware applications Identity store Your claims-aware applications Claims-aware applications may be hosted on-premises or in the cloud
  • 31. AD Your AD FS Your users Partner or 3rd party services (claims-aware) Trust STS Reasons for deployment (continued)
  • 32. Resource STS RP2 Trusts RP1 RP4 Trusts RP3 Resource STSs apply application authorization rules STS owned, managed and run by business unit
  • 33. Process token Home realm discovery Redirected to partner STS requesting ST for partner user Return ST for consumption by your STS Return new ST Working with partners Your AD FS STS Your Claims-aware app Active Directory Partner user Partner AD FS STS & IP Redirected to your STS Authenticate Send Token Return cookies and page Browse app Not authenticated Redirect to your STS App trusts STS Your STS trusts your partner’s STS
  • 34. Validating the install  Access the federation metadata  https://sts.example.com/FederationMetadata/2007-06/FederationMetadata.xml  If the browser does not show the page as XML, switch to compatibility view  Try the IdP initiated sign on  https://sts.example.com/adfs/ls/IdpinitiatedSignOn.aspx
  • 35.
  • 36. Web Application Proxy Web application ADFS Claims-aware web application Web application with Windows Authentication AD FS preauthentication Kerberos constrained delegation Publish applications and services to the Internet WAP Users are authenticated and authorized before gaining access to the corporate network Pass-through KCD
  • 37. Kerberos Constrained Delegation Firewall WAP DC Web application using Windows Authentication (Kerberos) The SPN for the application must be registered on the service account running the application The WAP computer account must be configured for constrained delegation with protocol transition to the SPN of the web application AD FS preauthentication required
  • 38. Network Topology Backend Server Backend Server AD FS Backend Server Config. Store Web Application Proxy DMZ AD FS Proxy Firewall Load Balancer Load Balancer Firewall Active Directory Domain Controller Client (browser, Office client or modern app) Corporate Network Internet HTTP/S HTTP/S AuthN Config. API over HTTPS AuthN Web UI Claims, KCD, OAuth, MSOFBA, or pass-through Obtain KCD ticket for IWA AuthN
  • 39. WAP Reverse Proxy Functionalities  Network Isolation: even in pass-through, even post pre-auth, backend is never exposed directly  Basic DOS: throttling, queuing, session establishing, before routing to backend  URL Translation: HTTP header level translation enables publishing non-FQDN URLs, and HTTPSHTTP  Selective Publishing: per internal application endpoint  AD FS Proxy services: FS, MFA, DRS  Web Protocols Only: HTTP, HTTPS
  • 40. WAP Pre-Authentication Functionalities  Rich Policy: user + device identity, application identity, network location  MFA Options: smartcards, phone factor, soft password lockout  Multiple Authentication Methods: KCD, claims, OAuth, MSO- FBA, …  SSO: Avoid requesting credentials again, after first pre-auth  Via a dedicated security token of AD FS
  • 41. WAP requirements  One or two network cards  In some scenarios DirectAccess and/or VPN can be supported on the same server  See http://technet.microsoft.com/en-us/library/dn383647.aspx  Install the AD FS SSL certificate on each WAP node  A certificate will be required for each published application  To use KCD the WAP must be domain joined
  • 42. Installing the Web Application Proxy
  • 43. Running the wizard  The same method is used to add one or more nodes