Skip to Content.
Sympa Menu

technical-discuss - [InC-Technical] RE: ADFS InCommon Federated Services Help

Subject: InCommon Technical Discussions

List archive

[InC-Technical] RE: ADFS InCommon Federated Services Help


Chronological Thread 
  • From: Eric Goodman <>
  • To: Eric C Kool-Brown <>, "" <>, "" <>
  • Subject: [InC-Technical] RE: ADFS InCommon Federated Services Help
  • Date: Wed, 7 Feb 2018 17:17:45 +0000
  • Accept-language: en-US
  • Authentication-results: spf=none (sender IP is ) ;
  • Ironport-phdr: 9a23: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
  • Spamdiagnosticmetadata: NSPM
  • Spamdiagnosticoutput: 1:99

Thanks for all of this detail, Eric. Good info!

In this context you describe below, is ADFS acting as a Proxy? I.e., will
IdPs see authentication requests coming from "UW ADFS" or from specific UW
services? That's been an issue for UC in (non-ADFS) proxy type situations
before.

--- Eric


-----Original Message-----
From:


[mailto:]
On Behalf Of Eric C Kool-Brown
Sent: Wednesday, February 07, 2018 9:08 AM
To:
;


Subject: [InC-Technical] RE: ADFS InCommon Federated Services Help

I think I left off one bit of perhaps relevant info regarding the second use
case of ADFS as the IdP. The ADFS metadata (as a service provider) would need
to be added to the InCommon aggregate in order to be trusted by the other
InCommon IdPs. I suppose that ADFS could also have IdP metadata added so it
could be a full federation partner as well. Does anyone on the list know of a
federation member that has done either of these things?

Thanks,

Eric

> -----Original Message-----
> From:
>
>
> [
> ]
> On Behalf Of Eric C
> Kool-Brown
> Sent: Wednesday, February 07, 2018 8:44 AM
> To:
> ;
>
>
> Subject: [InC-Technical] RE: ADFS InCommon Federated Services Help
>
> Hi Alex,
>
> There are two ways to configure ADFS for federation with InCommon. The
> route we take at the UW is to configure ADFS to use our Shibboleth IdP
> as the ADFS "Claims Trust Provider." ADFS used to be unable to consume
> the InCommon metadata aggregate so in the past I used a special
> metadata URL for our Shib. The latest version of ADFS has added the
> ability to consume an aggregate, but it is fairly finicky to get working.
>
> The other way would be to have ADFS be the IdP (its default
> configuration) but again have it consume the InCommon metadata
> aggregate. You could then use the default ADFS "Home Realm Discovery"
> UI to select one of the InCommon IdPs. I've not gone down this road
> because we send all of our ADFS relying parties to our Shib for authN.
>
> ADFS does some things in an opposite fashion from what the SAML design
> specifies. In particular, with SAML configuring federation is up to
> the service providers. They provide a discovery (WAYF) page that
> allows users to select an IdP. ADFS instead provides IdP discovery for
> all relying parties. This can be overridden within ADFS to specify an
> IdP per relying party. This is the route we've taken by configuring all of
> our RPs to go to Shib for authN.
>
> I've done some ADFS blogging which might be helpful:
> http://blogs.uw.edu/kool/.
>
> I also have a wiki on ADFS here at the UW. I believe it uses federated
> authN, but let me know if that's not the case:
> https://wiki.cac.washington.edu/x/5EMrAw.
>
> This document is a great guide to configuring ADFS to use Shib as the IdP:
> http://download.microsoft.com/documents/France/Interop/2010/Using_AD
> FS2_0_For_Interoperable_SAML_2_0-Based_Federated_SSO.docx. It is
> somewhat dated as ADFS now has more configurability and capabilities,
> but it is still accurate.
>
> Also, feel free to ask any other questions you may have.
>
> Cheers,
>
>     Eric Kool-Brown,
>
>     Software Engineer
>     University of Washington - IT Infrastructure
>
>
> > -------- Forwarded Message --------
> > Subject: ADFS InCommon Federated Services Help
> > Date: Mon, 29 Jan 2018 21:15:32 -0700
> > From: Alexandre Adao
> > <>
> > To:
> >
> > <>
> >
> >
> >
> > Hello, I am a novice in InCommon and Microsoft ADFS. I would like to
> > know the procedures on how to configure MS ADFS for InCommon. Any
> > information or assistance will be gratefully appreciated.
> >
> > ​Thanks,​
> >
> > --
> > ​Alex Adao​
> >
> > =============================================
> > Alexandre Magno Adão
> > Director of Information Security
> > Morgan State University (CGW 300k)
> > Office of  Information Technology (OIT)
> > 443-885-4415 Office
> > 443-803-3154 Cell
> > <http://www.morgan.edu>



Archive powered by MHonArc 2.6.19.

Top of Page