AD FS SharePoint Configuration
Last updated
Last updated
SAML 2.0 is not supported by SharePoint 2013 or 2016, which support SAML 1.0/1.1 only. See the Microsoft TechNet article for more information.
Configure the relying party in AD FS, which consists of the following elements:
URL or endpoint: The endpoint must follow the WS-Federation Passive protocol.
Relying party trust identifier: This can be in the format urn:<instancename>:<env>
, which will be used later in the SharePoint configuration.
Claim rules: These rules may vary depending on customer requirements and environments. Generally, UPN and email are two common attributes that are passed in the claims.
Token-signing certificate: There are two ways to extract the token-signing certificate:
Extract the certificate from the federation metadata:
From the federation metadata URL, copy the data located between
<X509Data><X509Certificate> </X509Certificate></X509Data>
and paste it in a text editor, then save the file with the .cer
extension. (Example:
ADFSToken.cer
to SharePoint Server.)
Export the certificate from the AD FS management console:
Choose Services > Certificates > Token-Signing, then save the certificate as a DER encoded binary (.cer
) and copy it to SharePoint Server.
To configure AD FS, run the PowerShell snippet below on SharePoint Server:
Once these steps have been successfully completed, go to the SharePoint Central Administration menu and click Application Management. Then, under Web Applications, choose Manage web applications and select the hoozin Web Application that requires AD FS configuration.
Click Authentication Providers and choose Default, then set the following options:
Uncheck Enable Windows Authentication.
Uncheck Enable Forms Based Authentication (FBA).
Check Trusted Identity Provider, then check ADFS Token Issuer. (Note that
ADFS Token Issuer is the name specified when creating the Trusted Identity Provider.)
Save and close, then perform an iisreset.
Hoozin AD LDS needs to be synchronized with the Enterprise accounts. These accounts can be synchronized from the following sources:
Active Directory
CSV
SharePoint List
XML
Source
Destination
mail
userPrincipalName
To get identity claim information, run the following SharePoint PowerShell commands:
Follow the instructions in the section. In the directory synchronization settings the source attribute of the userPrincipalName
destination is the Identifier Claim. In this AD FS–SharePoint configuration, the Identifier Claim is set to email, and the source and destination configuration is as follows:
Internet Explorer: Use Fiddler. See the Microsoft TechNet article.
Chrome: Use the .
Firefox: Use the .
You must have an AD FS token extracted and copied to SharePoint Server. Extract the token-signing certificate using one of the methods in the section above, then run the following SharePoint PowerShell commands to renew the certificate: