ADFS Implementation

Last updated: January 14, 2026

📚 Reference: This guide aligns with AD FS Overviewarrow-up-right

My First ADFS Deployment

I remember my first ADFS project vividly. The organization had just signed contracts with three major SaaS providers, and each vendor was asking for different authentication methods. The CEO wanted "single sign-on like Google has" without understanding the complexity behind it.

After weeks of planning, testing, and late nights troubleshooting claim rules, we launched a working ADFS infrastructure. Users could access Office 365, Salesforce, and our custom web applications with their domain credentials. That project taught me that ADFS isn't just "install and configure" – it's an architecture that requires careful planning and understanding.

What is Active Directory Federation Services?

ADFS is Microsoft's federated identity and access management solution. In my deployments, ADFS serves as the bridge between internal Active Directory and external applications that need to authenticate users.

Why I Deploy ADFS

Single Sign-On (SSO): Users log in once and access multiple applications

  • Office 365 / Microsoft 365

  • Salesforce, ServiceNow, Workday

  • Custom web applications

  • Partner organization resources

Federated Trust: Establish trust relationships without sharing passwords

  • Business partners can access specific resources

  • Customers can access portals

  • Vendors can access ticketing systems

Claims-Based Authentication: Flexible identity assertions

  • Send custom attributes to applications

  • Transform identities based on rules

  • Support multiple identity providers

ADFS Architecture and Components

The Four Key Components

spinner

1. Active Directory (Claims Provider)

The identity store that validates credentials and provides user attributes.

2. Federation Servers (ADFS Servers)

Issue security tokens after authenticating users. In production, I always deploy at least two servers for high availability.

3. Web Application Proxy (Federation Server Proxy)

DMZ-based reverse proxy that protects ADFS servers from direct internet exposure.

4. Relying Parties (Applications)

Applications that trust tokens issued by ADFS.

ADFS Authentication Flow

spinner

Planning ADFS Deployment

Sizing and Capacity

From my experience, here's how I size ADFS farms:

Small Environment (< 1,000 users)

Medium Environment (1,000 - 10,000 users)

Large Environment (> 10,000 users)

SSL Certificate Requirements

ADFS requires proper SSL certificates. Here's what I obtain:

Public Certificate (Required)

  • Subject Name: adfs.company.com

  • Subject Alternative Names (SANs):

    • adfs.company.com

    • enterpriseregistration.company.com (for device registration)

    • certauth.adfs.company.com (for certificate authentication)

  • Issued by: Public CA (DigiCert, Let's Encrypt, etc.)

  • Key Length: 2048-bit minimum (4096-bit preferred)

Token-Signing Certificate (Auto-generated)

  • ADFS generates this automatically

  • Auto-rollover enabled by default

  • Internal use only

DNS Configuration

Installing ADFS

Prerequisites Checklist

Before installation, I verify:

First ADFS Server Installation

Adding Additional ADFS Servers to Farm

Using SQL Server for Configuration Database

For larger deployments, I use SQL Server instead of Windows Internal Database:

Post-Installation Configuration

Enable Modern Authentication

Configure Token Lifetime

Enable Extranet Lockout Protection

Critical for security – I enable this on every deployment:

Configure Device Registration

For Windows 10/11 workplace join:

Configuring Relying Party Trusts

Relying parties are applications that trust ADFS for authentication.

Office 365 / Microsoft 365

Custom SAML Application

Claim Rules

Claims are assertions about users sent to applications.

Understanding Claim Flow

spinner

Common Claim Rule Patterns

1. Pass Through UPN

2. Send Email as NameID

3. Send AD Groups as Roles

4. Conditional Access Based on Group

5. Multi-Factor Authentication Based on Location

Exporting and Backing Up Claim Rules

Multi-Factor Authentication (MFA)

Azure MFA Integration

Certificate-Based Authentication

Web Application Proxy (WAP) Configuration

Installing WAP

Publishing Applications Through WAP

Monitoring and Troubleshooting

Health Checks

Event Logs

Common Issues and Solutions

1. Users Can't Authenticate

2. Token Signing Certificate Issues

3. Slow Authentication

Performance Monitoring

Backup and Recovery

Backup ADFS Configuration

Restore ADFS Configuration

High Availability and Disaster Recovery

Load Balancing Configuration

In my deployments, I use either hardware load balancers or Windows NLB:

F5 / NetScaler / Azure Load Balancer (Preferred)

Windows Network Load Balancing

Disaster Recovery Plan

My standard DR runbook:

Security Best Practices

1. Secure Service Account

2. Restrict ADFS Admin Access

3. Enable Auditing

4. Implement IP Whitelisting (if applicable)

Real-World Integration Scenarios

Scenario 1: Salesforce SAML SSO

Scenario 2: AWS Console Access

Conclusion

ADFS is a powerful federated identity solution that, when properly implemented, provides seamless single sign-on across cloud and on-premises applications. From my experience deploying ADFS in organizations from 100 to 50,000 users, the key to success is:

  • Plan thoroughly: Understand your applications' requirements

  • Design for scale: Start with high availability even if you're small

  • Security first: Enable MFA, extranet lockout, and auditing

  • Monitor proactively: Don't wait for users to report issues

  • Document everything: Claim rules, certificates, integrations

In the next article, we'll explore Public Key Infrastructure (PKI) with Active Directory Certificate Services – the foundation for ADFS certificates and secure communications.


Further Reading

Ready to build enterprise PKI infrastructure? Continue to the next article! →

Last updated