ADFS Implementation
My First ADFS Deployment
What is Active Directory Federation Services?
Why I Deploy ADFS
ADFS Architecture and Components
The Four Key Components
1. Active Directory (Claims Provider)
2. Federation Servers (ADFS Servers)
3. Web Application Proxy (Federation Server Proxy)
4. Relying Parties (Applications)
ADFS Authentication Flow
Planning ADFS Deployment
Sizing and Capacity
SSL Certificate Requirements
DNS Configuration
Service Account (gMSA Recommended)
Installing ADFS
Prerequisites Checklist
First ADFS Server Installation
Adding Additional ADFS Servers to Farm
Using SQL Server for Configuration Database
Post-Installation Configuration
Enable Modern Authentication
Configure Token Lifetime
Enable Extranet Lockout Protection
Configure Device Registration
Configuring Relying Party Trusts
Office 365 / Microsoft 365
Custom SAML Application
Claim Rules
Understanding Claim Flow
Common Claim Rule Patterns
1. Pass Through UPN
2. Send Email as NameID
3. Send AD Groups as Roles
4. Conditional Access Based on Group
5. Multi-Factor Authentication Based on Location
Exporting and Backing Up Claim Rules
Multi-Factor Authentication (MFA)
Azure MFA Integration
Certificate-Based Authentication
Web Application Proxy (WAP) Configuration
Installing WAP
Publishing Applications Through WAP
Monitoring and Troubleshooting
Health Checks
Event Logs
Common Issues and Solutions
1. Users Can't Authenticate
2. Token Signing Certificate Issues
3. Slow Authentication
Performance Monitoring
Backup and Recovery
Backup ADFS Configuration
Restore ADFS Configuration
High Availability and Disaster Recovery
Load Balancing Configuration
Disaster Recovery Plan
Security Best Practices
1. Secure Service Account
2. Restrict ADFS Admin Access
3. Enable Auditing
4. Implement IP Whitelisting (if applicable)
Real-World Integration Scenarios
Scenario 1: Salesforce SAML SSO
Scenario 2: AWS Console Access
Conclusion
Further Reading
Last updated