the who, what, why and how of active directory federation services (ad fs)
TRANSCRIPT
THE WHO, WHAT AND WHY OF ACTIVE
DIRECTORY FEDERATION SERVICES (ADFS)
Be Sure To Thank Our Awesome Sponsors!
ABOUT ME
• Co-author, SharePoint 2013 Administrators Pocket Guide• MCT, MCTIP: SharePoint 2010, MCTS: Project Server 2010• 12 years working on the SharePoint platform in a variety of
positions.• 7 years of instructional/training delivery experience.• My blogs:
• http://summit7systems.com/author/jay.simcox/• http://www.sharepointmechanic.com/
• Contact Me:• Email: [email protected]• Twitter: @jaysimcox/@SPHoneyBadger
Senior Consultant/Instructor, Summit 7 Systems/MindsharpHuntsville, AL
Work performed in 31 StatesEmployees in 6 States
100% CSAT Satisfaction 2 Microsoft MVPs 30+ Published Books 1 Office Dog
About Summit 7 Systems
AGENDA
ADFS
Why
What
Who
How
AGENDA
ADFS
Why
What
Who
How
THE FIRST QUESTION YOU SHOULD BE ASKING!Is AD FS the right solution for my requirement?
• Reverse-proxy?• Hybrid?• Access from outside the corporate network?• Access for partners or vendors?• Device or role-based access?• Single sign on (SSO)
IT DEPENDS….
WHO BENEFITS FROM ADFS - I?• Implementing Organizations
– Easily share internal resources with external users.– Create a role based security model.– Possible to reduce overall licensing costs with additional
servers roles like Web Application Proxy (WA-P).• Partner Organizations
– Easy access to external organization resources
WHO BENEFITS FROM ADFS - II?
• IT Staff– Administrators
• No longer have to manage external user accounts or passwords.• Centralized federated partner management.• Extensible architecture allows for adding, modifying or creating
custom claims to support specific business processes.– Developers
• Leveraging Windows Identity Foundation developers can build .NET applications that rely on ADFS instead of an internal authentication mechanism. These are known as “Claims-Aware” applications.
WHO BENEFITS FROM ADFS - III?
• End Users– SSO experience across multiple applications and
platforms.– Reduced need for multiple logons– Simplified password management (single password
across multiple platforms and applications).
WHAT IS ADFS?• Not new, ADFS has been around since Windows
Server 2003 R2.• Windows Server 2012 R2 role.• Allows for the secure sharing of identity
information.• Provides secure authentication to multiple
systems (SharePoint, Dynamics, Exchange, O365, etc…)
• Reduces administrative overhead involved with managing “guest” or external AD account.
WHAT ARE THE BENEFITS OF ADFS?• Allows us to “easily” open applications to external
partners.• Web based Single Sign On (SSO).• Reduced administrative overhead managing guest
accounts and passwords.• Supports the WS-Federation protocol.• Partner or guest user account management by
local resources is not required.
WHAT ARE THE BENEFITS OF ADFS? (CONTD.)
• Claim mapping defines claims in terms that each partner organization understands.
• Claim mappings can be different for each partner organization.
• Can leverage multiple claim types– Identity Claims– Group Claims– Custom Claims– Device Claims
ADFS LIMITATIONS
• Not an overly simple implementation.• No support for on-premises Exchange.• No access to Windows NT token based
applications.– No access to file shares or print servers.– No access to AD resources.– No access to Exchange (on-premises only).– No connections to servers via RDP.– No authentication to “older” web based applications.
HOW DOES ADFS WORK?• Defines how applications acquire identity information about a user.• Designed to specifically overcome limitations in other protocols.• Designed to cross boundaries such as security realms, firewalls and different
platforms.• Takes the burden of authentication off of applications.• Requires configuration of multiple components
– SharePoint Security Token Service (STS)– Token-signing certificate– Identity Provider (IdP)– Identity claim– Realm– SPTrustedIdentityTokenIssuer– Relying party security token service– Identity provider security token service
AUTHENTICATION IN SHAREPOINT• Authentication is NOT Authorization
– Authentication – the process of verifying the identity of a user requesting access to a SharePoint resource.
– Authorization – the process of identifying an authenticated users permission to access the SharePoint resource.
• Authentication protocols– NTLM– Kerberos– Claims-based– Open Authorization 2.0 (OAuth)
• Server to Server Authentication• App authentication
NTLM PROCESS1. The user requests a SharePoint site.2. SharePoint sends a request for Windows
Credentials to the user in the form of a login box asking for a username and password.
3. The end user enters their Windows credentials and submits them to SharePoint.
4. SharePoint validates the users account with AD.5. SharePoint requests and receives the users
group membership from AD.6. SharePoint creates a SharePoint security token
and sends the authorization code and requested web page to the end user.
AD DS
5
1
2
3
6Users
4
KERBEROS PROCESS1. The Client sends an HTTP (GET) request as an anonymous user.2. The WFE responds with a 401.2 (unauthorized: Login failed) and with a
WWW-Authenticate: Negotiate or WWW-Authenticate: Kerberos header.3. The client contacts the KDC on the domain controller requesting a
Kerberos ticket for the SPN (service-principal-name) referenced by the client browser.
4. If the KDC finds a matching SPN it creates and encrypts a ticket and returns it to the client.
5. The client creates the authenticator and returns it with the ticket to the WFE. The WFE decrypts the ticket and determines identity and checks permissions on the SharePoint server to see what access, if any, is to be granted.
6. If access is permitted IIS contacts the SQL server through the Web Application service.
7. The Web Application service requests a ticket for the SQL server from the KDC.
8. If an SPN is found the KDC returns the ticket which the web application uses to impersonate the user.
9. SQL Server checks the ticket from the Web Application service and validates it and sends the data back to the WFE.
10. .NET compiles the .aspx page and sends it to the users browser. Client
12
3
4
5
6
7
8
9
10
AD DS
CLAIMS PROCESS1. The end user hits the SharePoint site generating an
HTTP (GET) request.2. SharePoint redirects the user to the Identity Provider to
get a security token.3. The end user is prompted for credentials by the Identity
Provider.4. The Identity Provider validates the provided credentials
with the authentication provider (in this case AD DS) and if successful provides the client a security token.
5. The Identity Provider sends the end user a SAML security token.
6. The end user submits a new request to SharePoint with the SAML token.
7. The SharePoint STS generates the SharePoint security token, the FedAuth cookie and the requested SharePoint site.
2
6
1
AD DS
4
AD FS
3
5
ClaimClaimClaim
Signature7 7
7
CLAIMS IN A NUTSHELL• Claim: an assertion or statement of something as a fact.• Could be any piece of data or information about a user.• Digitally signed at creation.• Claims must have an attribute to be used with SharePoint• Do not rely on applications for authentication.• Rely on security token services (STSs).• Not just for identities, can also be used for roles and access rights.• Commonly defined with Security Assertion Markup Language
(SAML)
THE TOKEN
WHAT WOULD AN ADFS IMPLEMENTATION LOOK LIKE?
WHAT SHOULD I WORRY ABOUT?• Search• User Profile Service• End user experience• People-Picker• Unique Identifier• Authentication method (username/password,
smart card, RSASecureId).
BEST PRACTICES• Use SAN certificates on the WA-P servers.• Protect your ADFS servers as if they are Domain
Controllers.• High availability should always be a part of the
design. Especially hybrid deployments.
Section Header
Q & A
Be Sure To Thank Our Awesome Sponsors!
THANK YOU FOR ATTENDING!