Federation Services were originally introduced in Windows Server 2003 R2. F provides an identity access solution, and AD Federation Services provides authenticated access to users inside (and outside) an organization to publicly (via the Internet) accessible applications. Federation Services provides an identity management solution that interoperates with WS-* Web Services Architecture–enabled security products. WS-Federation Passive Requestor Profile (WS-F PRP) also makes it possible for federation to work with solutions that do not use the Microsoft standard of identity management. The WS-Federation specification defines an integrated model for federating identity, authentication, and authorization across different trust realms and protocols. This specification defines how the WS-Federation model is applied to passive requestors such as Web browsers that support the HTTP protocol. WS-Federation Passive Requestor Profile was created in conjunction with some pretty large companies, including IBM, BEA Systems, Microsoft, VeriSign, and RSA Security.
What Is Federation?
As we described earlier in this chapter, federation is a technology solution that makes it possible for two entities to collaborate in a variety of ways. When servers are deployed in multiple organizations for federation, it is possible for corporations to share resources and account management in a trusted manner. Earlier in this chapter, we were discussing Active Directory Rights Management Server. This is just one way companies can take advantage of FS. With ADFS, partners can include external third parties, other departments, or subsidiaries in the same organization.
Why and When to Use Federation
Federation can be used in multiple ways. One product that has been using federation for quite some time is Microsoft Communication Server (previously, Live Communication Server 2005, now rebranded as Office Communication Server 2007). Federation is slightly different in this model, where two companies can federate their environments for the purposes of sharing presence information. This makes it possible for two companies to securely communicate via IM, Live Meeting, Voice, and Video. It also makes it possible to add “presence awareness” to many applications, including the Office suite, as well as Office SharePoint Server. If you want to know more about OCS and how federation works for presence, we recommend How to Cheat at Administering Office Communication Server 2007, also by Elsevier.
A little closer to home, Federation Services can also be used in a variety of ways. Let’s take an extranet solution where a company in the financial service business shares information with its partners. The company hosts a Windows SharePoint Services (WSS) site in their DMZ for the purposes of sharing revenue information with investment companies that sell their products. Prior to Active Directory Federation Services, these partners would be required to use a customer ID and password in order to access this data. For years, technology companies have been touting the ability to provide and use single sign-on (SSO) solutions. These worked great inside an organization, where you may have several different systems (Active Directory, IBM Tivoli, and Solaris), but tend to fail once you get outside the enterprise walls.
With AD FS, this company can federate their DMZ domain (or, their internal AD) with their partner Active Directory infrastructures. Now, rather than creating a username and password for employees at these partners, they can simply add the users (or groups) to the appropriate security groups in their own Active Directory (see Figure 1). It is also important to note that AD FS requires either Windows Server 2008 Enterprise edition or Datacenter edition.
Figure 1. The Active Directory Federation Services Structure
Configuring ADFS
In this exercise, we are going to create the account side of the ADFS structure. The resource is the other half of the ADFS configuration, which is the provider of the service that will be provided to an account domain. To put it in real-world terms, the resource would provide the extranet application to the partner company (the account domain).
Configuring Federation Services
>> | |
2. | Scroll down to Role Summary, and then click Add Roles. | >>
3. | When the Before You Begin page opens, click Next. | <><><>>>>
4. | On the Select Server Roles page, select Active Directory Federation Services (see Figure 2) from the list and click Next. Figure 2. Selecting the Role | <><><>>>>
5. | <><><>>>> |
6. | <><><>>>> |
7. | Figure 3. Creating a Self-Signed Token-Signing Certificate | <><><>>>>
8. | <><><>>>> |
9. | Click Next on the Select Trust Policy page. | <><><>>>>
10. | If prompted, click Next on the Web Server (IIS) page. | <><><>>>>
11. | If prompted, click Next on the Select Role Services page. | <><><>>>>
12. | On the Confirm Installation Selections page, click Install. | <><><>>>>
13. | When the installation is complete, click Close. | <><><>>>>
The next step in configuring AD FS is to configure IIS to require SSL certificates on the Federation server:
Next, we need to configure a resource for use with AD FS. In this case, we are going to use the same domain controller to double as a Web server. What we will be doing is installing the AD FS Web Agent, essentially adding an additional role to the server, as part of the AD FS architecture. This will allow us to use our federated services within a Web application.
Choose Start | Administrative Tools | Server Manager. Scroll down to Role Summary, and then click Add Roles. | <><><>>>>|
2. | When the Before You Begin page opens, click Active Directory Federation Services. |
3. | Scroll down to Role Services and click Add Role Services. |
4. | Figure 6. Setting Services |
5. | Figure 7. Confirming the Installation |
6. | When installation is complete, click Close. |
Now we need to configure the trust policy which would be responsible for federation with the resource domain.
Expand Account Stores. | |
2. | Right-click Active Directory, and then click New | Group Claim Extraction. |
3. | Figure 11. The Create A New Group Claim Extraction Window |
4. | |
5. | Click Find Now. |
6. | Select Domain Admins from the list of groups by double-clicking. |
7. | Click OK. |
8. |
Finally, we will work to create the partner information of our resource partner, which is prepguides.ads.
We’re almost at the end of our account partner configuration. The last thing we need to do is create an outgoing claim mapping. This is part of a claim set. On the resource side, we would create an identical incoming claim mapping.
Expand Resource Partners. | |
2. | Right-click your resource partner, and then choose New | Outgoing Group Claim Mapping. |
3. | Select the claim we created earlier, enter PrepGuide Mapping, and then click OK. |
No comments:
Post a Comment