The Who, What, Why and How of Active Directory Federation Services (AD FS)

JaySimcox 1,934 views 35 slides Sep 21, 2015
Slide 1
Slide 1 of 35
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35

About This Presentation

slide decks from my session at SharePointalooza 2015


Slide Content

The Who, What and Why of Active Directory Federation Services (ADFS)

Be Sure To Thank Our Awesome Sponsors!

About Me Co-author, SharePoint 2013 Administrators Pocket Guide MCT, MCTIP: SharePoint 2010, MCTS: Project Server 2010 12 years working on the SharePoint platform in a variety of positions. 7 years of instructional/training delivery experience. My blogs: http://summit7systems.com/author/jay.simcox/ http://www.sharepointmechanic.com/ Contact Me: Email: [email protected] Twitter: @ jaysimcox /@ SPHoneyBadger Senior Consultant/Instructor, Summit 7 Systems/Mindsharp Huntsville, AL

Work performed in 31 States Employees in 6 States 100% CSAT Satisfaction 2 Microsoft MVPs 30+ Published Books 1 Office Dog About Summit 7 Systems

Agenda

Agenda

The FIRST Question YOU Should be Asking! Is AD FS the right solution for my requirement?

Reverse-proxy? Hybrid? Access from outside the corporate network? Access for partners or vendors? Device or role-based access? Single sign on (SSO) IT DEPENDS….

Who benefits from ADFS - I? Implementing Organizations Easily share internal resources with external users. Create a role based security model. Possible to reduce overall licensing costs with additional servers roles like Web Application Proxy ( WA-P ). Partner Organizations Easy access to external organization resources

Who benefits from ADFS - II? IT Staff Administrators No longer have to manage external user accounts or passwords. Centralized federated partner management. Extensible architecture allows for adding, modifying or creating custom claims to support specific business processes. Developers Leveraging Windows Identity Foundation developers can build .NET applications that rely on ADFS instead of an internal authentication mechanism. These are known as “Claims-Aware” applications.

Who Benefits from ADFS - III? End Users SSO experience across multiple applications and platforms. Reduced need for multiple logons Simplified password management (single password across multiple platforms and applications).

What IS ADFS? Not new, ADFS has been around since Windows Server 2003 R2. Windows Server 2012 R2 role. Allows for the secure sharing of identity information. Provides secure authentication to multiple systems (SharePoint, Dynamics, Exchange, O365, etc…) Reduces administrative overhead involved with managing “guest” or external AD account.

What are the Benefits of ADFS? Allows us to “easily” open applications to external partners. Web based Single Sign On (SSO). Reduced administrative overhead managing guest accounts and passwords. Supports the WS-Federation protocol. Partner or guest user account management by local resources is not required.

What are the benefits of ADFS? (contd.) Claim mapping defines claims in terms that each partner organization understands. Claim mappings can be different for each partner organization. Can leverage multiple claim types Identity Claims Group Claims Custom Claims Device Claims

ADFS Limitations Not an overly simple implementation. No support for on-premises Exchange. No access to Windows NT token based applications. No access to file shares or print servers. No access to AD resources. No access to Exchange (on-premises only). No connections to servers via RDP. No authentication to “older” web based applications.

How does ADFS work? Defines how applications acquire identity information about a user. Designed to specifically overcome limitations in other protocols. Designed to cross boundaries such as security realms, firewalls and different platforms. Takes the burden of authentication off of applications. Requires configuration of multiple components SharePoint Security Token Service (STS) Token-signing certificate Identity Provider ( IdP ) Identity claim Realm SPTrustedIdentityTokenIssuer Relying party security token service Identity provider security token service

Authentication in SharePoint Authentication is NOT Authorization Authentication – the process of verifying the identity of a user requesting access to a SharePoint resource. Authorization – the process of identifying an authenticated users permission to access the SharePoint resource. Authentication protocols NTLM Kerberos Claims-based Open Authorization 2.0 ( OAuth ) Server to Server Authentication App authentication

NTLM Process The user requests a SharePoint site. SharePoint sends a request for Windows Credentials to the user in the form of a login box asking for a username and password. The end user enters their Windows credentials and submits them to SharePoint. SharePoint validates the users account with AD. SharePoint requests and receives the users group membership from AD. SharePoint creates a SharePoint security token and sends the authorization code and requested web page to the end user.

Kerberos Process The Client sends an HTTP (GET) request as an anonymous user. The WFE responds with a 401.2 (unauthorized: Login failed) and with a WWW-Authenticate: Negotiate or WWW-Authenticate: Kerberos header. The client contacts the KDC on the domain controller requesting a Kerberos ticket for the SPN (service-principal-name) referenced by the client browser. If the KDC finds a matching SPN it creates and encrypts a ticket and returns it to the client. The client creates the authenticator and returns it with the ticket to the WFE. The WFE decrypts the ticket and determines identity and checks permissions on the SharePoint server to see what access, if any, is to be granted. If access is permitted IIS contacts the SQL server through the Web Application service. The Web Application service requests a ticket for the SQL server from the KDC. If an SPN is found the KDC returns the ticket which the web application uses to impersonate the user. SQL Server checks the ticket from the Web Application service and validates it and sends the data back to the WFE. .NET compiles the . aspx page and sends it to the users browser.

Claims Process The end user hits the SharePoint site generating an HTTP (GET) request. SharePoint redirects the user to the Identity Provider to get a security token. The end user is prompted for credentials by the Identity Provider. The Identity Provider validates the provided credentials with the authentication provider (in this case AD DS) and if successful provides the client a security token. The Identity Provider sends the end user a SAML security token. The end user submits a new request to SharePoint with the SAML token. The SharePoint STS generates the SharePoint security token, the FedAuth cookie and the requested SharePoint site.

Claims in A Nutshell Claim: an assertion or statement of something as a fact. Could be any piece of data or information about a user. Digitally signed at creation. Claims must have an attribute to be used with SharePoint Do not rely on applications for authentication. Rely on security token services (STSs). Not just for identities, can also be used for roles and access rights. Commonly defined with Security Assertion Markup Language (SAML)

The Token

What Would an ADFS implementation look like?

What Should I worry About? Search User Profile Service End user experience People-Picker Unique Identifier Authentication method (username/password, smart card, RSASecureId ).

Best Practices Use SAN certificates on the WA-P servers. Protect your ADFS servers as if they are Domain Controllers. High availability should always be a part of the design. Especially hybrid deployments.

Q & A

Be Sure To Thank Our Awesome Sponsors!

Thank You for Attending!