Hey y’all Mark and Tom here with a series we think you guys will dig. I feel like half of our blog posts are building a lab of some kind. We love our labs in PFE. That’s how most of us learn. Set up a lab, play around with the technology, and get it configured. It’s fun for everyone! Right?! We are starting to get more and more customer requests around people just starting out with ADFS. We thought we’d get everyone starting by walking you through how to setup your very own ADFS Lab.
Initial Setup
First you have to have an AD Forest set up. If you don’t have that check out a blog post by Doug Gabbard. http://blogs.technet.com/b/askpfeplat/archive/2013/01/30/no-excuses-you-need-a-lab-for-active-directory-2012.aspx
We are going to assume you have the following setup before you dive in.
- Active Directory Forest
- ADFS Server running Windows Server 2012
- Domain Joined
- Valid network configuration
Creating a Service Account
ADFS runs on a service account. This will need to be created ahead of time before doing the install.
Some warnings about this service account:
#1: Don’t mess around with or set the Service Principal Names (SPN) on any accounts related to ADFS. The ADFS configuration wizard will automatically configure the correct Service Principal Names (SPN) on this service account so don’t worry about this configuring the SPN.
#2: Ensure that the physical computer name of any of the ADFS servers in the farm don’t match the ADFS service name. If you plan to call your ADFS service name sts.markmorow.com, ensure that none of the servers in the farm have this same actual computer name. If you do this, you immediately have a duplicate SPN scenario, which will prevent Kerberos authentication to this ADFS farm. Here is more information on duplicate SPN’s:
http://blogs.technet.com/b/askpfeplat/archive/2012/03/29/the-411-on-the-kdc-11-events.aspx
For my environment test environment I created an account called ADFS_SVC and my server is called ADFS01Corp.
Getting Certificates
As Jasmin talked about at http://blogs.technet.com/b/askpfeplat/archive/2013/07/22/faq-on-adfs-part-1.aspx we need three certificates on ADFS. But really, we only need to have 1 setup to do the install. We need a Server Communications (SSL) certificate. We got three choices.
1.) You could use an publically signed external cert. Since this is TEST you may not want to pay for one.
2.) You can generate a self-signed cert. This has a great walkthrough on doing that. http://www.sslshopper.com/article-how-to-create-a-self-signed-certificate-in-iis-7.html
3.) You can request a certificate from your internal PKI. You do have an internal PKI set up right??? http://social.technet.microsoft.com/wiki/contents/articles/4797.ad-cs-and-pki-step-by-steps-labs-walkthroughs-howto-and-examples.aspx
I picked #3. I had spent a few hours before and setup a PKI infrastructure in my lab. The walkthroughs are very easy to follow. Don’t be scared.
First we need to request a certificate. We do that by going to the MMC snap-in, adding certificates for the Computer Account, Local Computer, right click Personal, go to All Tasks, Request New Certificate.
We are going to select our Active Directory Enrollment Policy and click Next
If you don’t see Web Server make sure your Web Server template is published and you have rights to it. As we can see here we need some additional configuration information. Click on the blue text.
Our certificate name is going to be STS.yourdomain.com. Obviously configure this to fit your needs. Click ok and finish the cert process.
Installing ADFS
Ok now that we got all our pre-reqs in order let’s do the actually install of ADFS.
You’ll want to start by going to Server Manager and adding the ADFS role. Click Next
It will add any other additional roles and features it needs. Click Add Features and next through these new features until you hit the ADFS Role services.
After you next your way a few default screens you’ll come up to this screen. We’ll come back later to an ADFS Proxy, but for now just leave the Federation Service checked. Hit next a few more times than Finish. Let the install finish.
You should see a yellow exclamation point at the top right to let you know there is additional configuration requirements. Click “Run the AD FS Management snap-in”
You’ll then get the ADFS Snap in to finish configuring. Click “ADFS Federation Server Configuration Wizard”
Since this is our first ADFS Server we are going to select “Create New Federation Service” and hit next.
We’ll be creating a server farm of one. Click next.
ADFS should automatically pick up the Server Certificate. We’ll click next.
Input the service account we created earlier and click Next. The install should start.
All done. We are now setup using the WID database. If you wanted to use a SQL database you would have to do the install from the command line. Check back for Part 2 on how to configure a relaying party and a web app to view claims.
Mark “Next, Next” Morowczynski, Tom “Finish” Moser
Thanks for sharing the info and links.
This is going to be an excellent series Mark and Tom as this is something that the majority of AD professionals will need to know if the don't know it already. One point to mention is that you are not installing ADFS on a domain controller here in 2012. In 2012 R2 the dependency on IIS no longer exists so installing ADFS on a domain controller is not the bad thing it once was. Readers might be reading about 2012 and 2012 R2 now and that is an important distinction.
In case any reader sees comments more on 2012 R2 ADFS simplified deployment here:
technet.microsoft.com/…/hh831502.aspx
@Mike
All good points. We got some other ADFS goodness being worked on as well by some others on the blogging team.
While I tested it, it went excellent. Security loop hole etc. also cleared by my security testing lab. I hope MS will keep the quality up to date for industrial needs in future too . Like always 🙂
Pingback from NeWay Technologies – Weekly Newsletter #73 – December 12, 2013 | NeWay
Pingback from NeWay Technologies – Weekly Newsletter #73 – December 13, 2013 | NeWay
Pingback from How to Build Your ADFS Lab on Server 2012, Part2: Web SSO – Ask Premier Field Engineering (PFE) Platforms – Site Home – TechNet Blogs
Pingback from How to Build Your ADFS Lab on Server 2012 | MS Tech BLOG
Pingback from interesting things i have seen on the internet 30/12/2013 | 503 5.0.0 polite people say HELO
It is incredible how Microsoft assume that all Active directory deployments are using external domain name space, like contoso.com 🙂 There are far more deployments with contoso.local name space.
Mark and Tom here again, continuing our series on ADFS. In this post, we'll show you how to use some
Well then, here we are in part three already! Previously we: Installed ADFS 2012 R2 For Office 365 in
I can only choose my domain controller certificate and not my Web Server certificate in the ADFS wizard. When creating the certificate I used the Web Server template and added a value with common name at subject. What do I need to change to be able to
choose between multiple certificates in the ADFS wizard?
Solved the problem with the certificates. I didn´t know I had to change bindings in IIS before I can choose the certificate I want to use in ADFS setup.
This is a collection of the top Microsoft Support solutions for the most common issues experienced when
Disclaimer: Some concepts have been simplified until I’m ready to cover them in more detail.
How to Build Your ADFS Lab on Server 2012 Part 1 – Ask Premier Field Engineering (PFE) Platforms – Site Home – TechNet Blogs
原文地址:
http://blogs.technet.com/b/askpfeplat/archive/2014/04/21/introduction-to-active-directory-federation
no adfs 3.0 high availability documents from Microsoft ???? published any where
In the previous blog post on comparing sign-in protocols, the goal was to give you a primer on the terminology
This is a collection of the top Microsoft Support solutions for the most common issues experienced when
In the previous blog post on comparing sign-in protocols, the goal was to give you a primer on the terminology
This is a collection of the top Microsoft Support solutions for the most common issues experienced when
This is a collection of the top Microsoft Support solutions for the most common issues experienced when
Within the Cert setup – I thought for an ADFS SSL cert, you need to add the ADFS Cert service name (ie. sts.yourdomain.com) to the Subject Alternate Name AND enterpriseregistration.yourdomain.com to the SAN. ?
For the "Getting Certificates" section, there is another option; in PowerShell, you can use the New-SelfSignedCertificate command. Details at
http://windowsitpro.com/blog/creating-self-signed-certificates-powershell
You might consider consuming three meals per day (breakfast,
lunch and dinner), with two snacks in between.