March 15, 2011 Active Directory Federation Services 2.0 Overview InCommon Service Provider Training.

Slides:



Advertisements
Similar presentations
Active Directory Federation Services How does it really work?
Advertisements

Office 365 Identity June 2013 Microsoft Office365 4/2/2017
 Jan Alexander Program Manager Microsoft Corporation BB43.
Core identity scenarios Federation and synchronization 2 3 Identity management overview 1 Additional features 4.
MFA Through ADFS University of Washington Customized its ADFS to Enable MFA Eric Kool-Brown Software Engineer, UW IT Identity and Access.
SIM403. Claims Provider Trust Relying Party x Relying Party Trust Claims Provider Trust Your ADFS STS Partner ADFS STS & IP Relying Party Trust Partner.
TF-EMC2 | Lyon - France | February 2011 SAML WORK WITH SHAREPOINT, OWA, … Jean Marie THIA.
Implementing and Administering AD FS
Eric Raff. Usergroup up
Federated sign-in WS-Federation WS-Trust SAML 2.0 Metadata Shibboleth Graph API Synchronize accounts Authentication.
Jax ArcSig 3/22/2011 Keith Tingle. About Me Keith Tingle Lender Processing Services
Every effort has been made to make this seminar as complete and as accurate as possible but no warranty or fitness is implied. The presenter, authors,
SIM205. (On-Premises) Storage Servers Networking O/S Middleware Virtualization Data Applications Runtime You manage Infrastructure (as a Service)
Troubleshooting Federation, AD FS 2.0, and More…
SIM402. Kerberos, NTLM, Basic, Digest, Forms?
Every effort has been made to make this seminar as complete and as accurate as possible but no warranty or fitness is implied. The presenter, authors,
Virtual techdays INDIA │ august 2010 Secure Collaboration: All You Need to Know about Extending Active Directory Rights Management Services (AD RMS)
Edwin Sarmiento Microsoft MVP – Windows Server System Senior Systems Engineer/Database Administrator Fujitsu Asia Pte Ltd
Shibboleth 2.0 IdP Training: Basics and Installation January, 2009.
Shibboleth-intro-dec051 Shibboleth A Technical Overview Tom Scavo NCSA.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
OUC204. Recently Announced… Identity Integration Options 2 3 Identity Management Overview 1.
Timothy Heeney| Microsoft Corporation. Discuss the purpose of Identity Federation Explain how to implement Identity Federation Explain how Identity Federation.
Troubleshooting Federation, AD FS 2.0, and More…
ADFS in the U.T. System U.S. Federations Call - May 18, 2011 Paul Caskey System-wide Information Services.
© FPT SOFTWARE – TRAINING MATERIAL – Internal use 04e-BM/NS/HDCV/FSOFT v2/3 Securing a Microsoft ASP.NET Web Application.
ArcGIS Server and Portal for ArcGIS An Introduction to Security
SSL, Single Sign On, and External Authentication Presented By Jeff Kelley April 12, 2005.
Module 5 Configuring Authentication. Module Overview Lesson 1: Understanding Classic SharePoint Authentication Providers Lesson 2: Understanding Federated.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Four Windows Server 2008 Remote Desktop Services,
SharePoint Security Fundamentals Introduction to Claims-based Security Configuring Claims-based Security Development Opportunities.
Dr. Mustafa Cem Kasapbaşı Security in ASP.NET. Determining Security Requirements Restricted File Types.
Shibboleth at the U of M Christopher A. Bongaarts code-people June 2, 2011.
Slide 1.NET Development for Project 2003 Samples from the Project 2003 SDK Jim Corbin Programmer Writer Office Developer Documentation Microsoft Corporation.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Five Windows Server 2008 Remote Desktop Services,
Paul Andrew. Recently Announced… Identity Integration Options 2 3 Identity Management Overview 1.
Shibboleth Akylbek Zhumabayev September Agenda Introduction Related Standards: SAML, WS-Trust, WS-Federation Overview: Shibboleth, GSI, GridShib.
Module 12 Upgrading from Exchange Server 2003 or Exchange Server 2007 to Exchange Server 2010.
Extending ISA/IAG beyond the limit. AGAT Security suite - introduction AGAT Security suite is a set of unique components that allow extending ISA / IAG.
Shibboleth at the U of M Christopher A. Bongaarts net-people March 10, 2011.
Claims-Based Identity Solution Architect Briefing zoli.herczeg.ro Taken from David Chappel’s work at TechEd Berlin 2009.
Solutions using Microsoft Content Management Server 2002 Connector for SharePoint Technologies Sue Corke Mark Harrison Microsoft UK.
Scenario w/ WS-Federation to SAML 2.0 interop challenge for Danish public sector The following slides illustrates in a basic manner the technical/security.
Security E-Learning Chapter 08. Security Control access to your web site –3 Techinques for Identifying users Giving users access to your site Securing.
Linus Joyeux Valerie Alonso Managing consultantLead consultant blue-infinity (Switzerland) Active Directory Federation Services v2.
Claims-based security with Windows Identity Foundation.
Agenda  Microsoft Directory Synchronization Tool  Active Directory Federation Server  ADFS Proxy  Hybrid Features – LAB.
Business Objects XIr2 Windows NT Authentication Single Sign-on 18 August 2006.
Networks ∙ Services ∙ People Jean Marie THIA GN4-1 Symposium, Vienna A case study GÉANT AuthN / AuthZ 9 march 2016 Solutions Architect -
Microsoft Ignite /20/2017 9:04 PM
Web SSO with Cloud Resources using AD Federation Services
Access Policy - Federation March 23, 2016
Using Your Own Authentication System with ArcGIS Online
Azure Active Directory - Business 2 Consumer
Unit 7 Learning Objectives
Single Sign-On Led by Terrice McClain, Jen Paulin, & Leighton Wingerd
Analyn Policarpio Andrew Jazon Gupaal
Federation made simple
Federation Systems, ADFS, & Shibboleth 2.0
HMA Identity Management Status
Jon Galloway | Tech Evangelist Christopher Harrison | Head Geek
Azure AD Application Proxy
Hybrid Search Planning Implementation.
ACS Functionality.
Created by : Asst. Prof. Ashish Shah
SharePoint Online Hybrid – Configure Outbound Search
Office 365 Identity Management
INTEGRATIONS WITH Single Sign-On
Presentation transcript:

March 15, 2011 Active Directory Federation Services 2.0 Overview InCommon Service Provider Training

6/2/ What is it?  A SAML implementation (both IdP and SP) from Microsoft  A WS-Fed implementation (Passive Requester)  An AD-based single signon system  A server role in Windows Server 2008

Some Terminology…  Security token – This refers to the assertion from the IdP.  Claim – a “claim” is just an attribute from the IdP’s assertion.  Claims Provider – This is just the ADFS term for an IdP.  Relying Party – This is just the ADFS term for an SP (a consumer of claims).  Claim Rules – these are instructions that tell ADFS how to deal with a “claim” or attribute. You can check attributes for compliance with certain policies (like scoped attributes) and you can transform attributes (from Shibb format to ADFS format, for example).  More: 6/2/2015 3

4 What can it do?  Act as an IdP (Claims Provider)  Act as an SP (Relying Party)  Seamlessly integrate with growing list of apps: Sharepoint 2010: – authentication-cheat-sheet-part-2.aspx Microsoft Unified Access Gateway (proxy): – Citrix: – /WI%20for%20ADFS%20FAQ.pdf  Interoperate with other SAML 2.0 solutions (like Shibboleth)

What are the limitations?  Metadata support  Certificate support  WAYF/DS support  Forced Authentication support  Other? 6/2/2015 5

Resources  ADFS Home:  Using ADFS with Shibboleth and InCommon:  More How-To Guides: guides(WS.10).aspxhttp://technet.microsoft.com/en-us/library/adfs2-step-by-step- guides(WS.10).aspx  Claims Rule syntax:  Shibboleth wiki on ADFS interop: 6/2/2015 6

Adding Shibboleth Claims Providers  ADFS can’t deal with a federation metadata file No support for  This can be handled via script/app Uses MS PowerShell to import into ADFS Import one at a time Must force only one encryption cert No other entity can use the same encryption cert  The Microsoft ADFS/InCommon doc has code for a python script Dealing with multiple federations? 6/2/2015 7

How to Integrate Sharepoint  Install ADFS according to documentation  Create a new Relying Party on the ADFS server Configure the RP manually SP-to-ADFS uses the WS-Fed Passive protocol (ADFS to Shibb uses SAML 2) The identifier/entityID is /_trust/ For claims rules, you can just use “Pass-Through” rules (since Shibb- sourced claims will be transformed on the Claims Provider configuration and AD-based logins don’t need to be transformed)  On the Sharepoint server, use PowerShell to add a new Security Token Service (STS): Use the New-SPTrustedIdentityTokenIssuer scriptlet (see link below) Consider adding some custom code to sync SP profiles –Hook the “OnSignedIn” event of the “federatedAuthentication” module –Use SP’s UserProfileManager class  authentication-made-simple/ authentication-made-simple/ 6/2/2015 8

How to Integrate Your Own App  Developer’s machine: Install WIF runtime (KB974405) Install WIF SDK ( c &displaylang=en ) c &displaylang=en  Web Server Install WIF runtime (KB974405) Set your app’s App Pool property for “loadUserProfile” to ‘true’ 6/2/2015 9

How to Integrate Your Own App (cont)  For the app itself (assuming VS2008): Ensure that build target is.NET 3.5 (or greater) Check out (from source control) the app’s web.config file (next step needs to write to it) Right-click web site/project in Solution Explorer, choose ‘Add STS Reference’ –Choose your app’s web.config file –Use your app’s URL as the application URI, making sure to include the trailing slash (Ex. –Choose to “Use an Existing STS” and point to your ADFS server’s metadata /FederationMetadata/ /FederationMetadata.xml –Accept other defaults 6/2/

How to Integrate Your Own App (cont) Edit the attributes/claims that your app requests –Web site: Edit the section of web.config, uncomment needed attributes, then choose ‘Update Federation Metadata’ from the project’s right-click menu in Solution Explorer –Web project: You’ll need to first edit your app’s web.config as described above, then also either manually edit your app’s metadata file, located at /FederationMetadata/ /FederationMetadata.xml or you use can use the VS2008 FedUtil (click Tools->Run Federation Utility tool). If you choose the first option: Look for the section Add new elements as needed Name and Role enabled by default, consider adding these: – 6/2/

How to Integrate Your Own App (cont)  On ADFS Server Add a new Relying Party –Auto-configure from metadata: /app/FederationMetadata/ /FederationMetadata.xml Create ‘Pass-Through’ Claims Rules for new RP. Consider pass- through rules for these claims (as so-named in the ADFS RP Claim Rules GUI) –“Name” is the userID/sAMAccountName/ePPN –“Given Name” is the user’s first name –“Surname” is the user’s last name –“ Address” is the user’s address –“Role” is the user’s role (or eduPersonAffiliation, etc) 12

How to Integrate Your Own App (cont)  App code references: Add reference to Microsoft.IdentityModel (after installing WIF runtime)  App Code: using Microsoft.IdentityModel.Claims; using System.Threading;  In Page.Load() IClaimsIdentity claimsIdentity = ((IClaimsPrincipal)Thread.CurrentPrincipal).Identities[0];  Microsoft Reference: 9AB B-4852-B26E-031A88EDD113http:// 9AB B-4852-B26E-031A88EDD113 13

How to Integrate Your Own App (cont) string GIVENNAME_CLAIM_TYPE = " string SURNAME_CLAIM_TYPE = " string _CLAIM_TYPE = " string ROLE_CLAIM_TYPE = " string UID,FName, LName, Addr, Role = ""; bool AuthOK,roleFound = false; if (claimsIdentity != null) { AuthOK = claimsIdentity.IsAuthenticated; UID = claimsIdentity.Name; foreach (Claim c in claimsIdentity.Claims) { if (c.ClaimType == GIVENNAME_CLAIM_TYPE) FName = c.Value; if (c.ClaimType == SURNAME_CLAIM_TYPE) LName = c.Value; if (c.ClaimType == _CLAIM_TYPE) Addr = c.Value; if (c.ClaimType == ROLE_CLAIM_TYPE) { //role is mutlivalued, so build one semicolon-delimited string if (roleFound) Role += ";" + c.Value; else { Role += c.Value; roleFound = true; } 14

DiscoveryService/WAYF??  ADFS does not support the OASIS DiscoveryService profile  To discover a user’s home institution, ADFS uses a process called “Home Realm Discovery”  This is very customizable, as it is just a.NET page (.aspx) Page is at (by default) c:\inetpub\adfs\ls\HomeRealmDiscovery.* Search-as-you-type Cookie name Multi-Fed Selector 15

Demo  Claims Provider Properties  Claims Provider Claims Rules  Relying Party Properties  Relying Party Claims Rules  Sharepoint Login Custom code to sync SP profiles –Hooks the “OnSignedIn” event of the “federatedAuthentication” module –Uses SP’s UserProfileManager class  Custom app integration 16