Skip to Content.
Sympa Menu

technical-discuss - [InC-Technical] Re: ADFS InCommon Federated Services Help

Subject: InCommon Technical Discussions

List archive

[InC-Technical] Re: ADFS InCommon Federated Services Help


Chronological Thread 
  • From: "Matthew X. Economou" <>
  • To: <>
  • Cc: <>
  • Subject: [InC-Technical] Re: ADFS InCommon Federated Services Help
  • Date: Thu, 8 Feb 2018 09:58:37 -0500
  • Ironport-phdr: 9a23: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

Dear Alex,

Nick Roy at Internet2 (copied) said that you had some questions about
using AD FS to interoperate with InCommon. I have some experience
running AD FS 2.0 and 3.0, both as a SAML identity provider (IdP, a/k/a
claims provider) and as a SAML service provider (SP, a/k/a relying
party). I'm replying from my personal email in order to underline the
point that this is my personal opinion and not that of my employer or my
clients. All of the usual disclaimers apply. ;)

You wrote:

> Hello, I am a novice in InCommon and Microsoft ADFS. I would like to
> know the procedures on how to configure MS ADFS for InCommon. Any
> information or assistance will be gratefully appreciated.

To put it bluntly, don't.

If you want an InCommon IdP, deploy a Shibboleth or SimpleSAMLphp
instead, and configure that to release the REFEDS R&S attribute bundle
to all SPs (https://refeds.org/category/research-and-scholarship). I
would be happy to share my Shibboleth IdP configuration with you.

If you want an InCommon SP, deploy SimpleSAMLphp in SAML proxy mode,
with SimpleSAMLphp's SP registered as an InCommon SP and with AD FS
treating SimpleSAMLphp as its sole IdP. It isn't possible to disable
the built-in "Active Directory" claims provider trust, so you must set
"ClaimsProviderName" on the relying party trusts, which causes AD FS to
bypass home realm discovery.

AD FS as an InCommon SP (e.g., for SharePoint) will run into the
following problems:

- metadata integrity checks

AD FS 2016 now allows you to create a group of claims provider trusts
using the InCommon metadata aggregate
(https://md.incommon.org/InCommon/InCommon-metadata-idp-only.xml).
However, it cannot validate the XML digital signature of the aggregate.
We all *strongly* encourage you to download the aggregate and verify its
signature per
https://spaces.internet2.edu/display/InCFederation/Metadata+Consumption.
HTTPS does not guarantee the integrity of the metadata aggregate, which
carries the public keys that the federation trust relies upon. Only
verifying the signature on the metadata each time it is downloaded
achieves the required level of trust.

- attribute scope checks

Scoped user identifiers prevent identifier spoofing by rogue IdPs
(https://spaces.internet2.edu/display/InCFederation/2016/05/08/Scoped+Us
er+Identifiers). I don't know how to write SAML attribute (claims)
acceptance transform rules that implement the necessary scope checks for
a claims provider trusts group. I do know how to do this for individual
claims provider trusts, cf.
https://github.com/iay/mdq-server/wiki/Interoperating-with-AD-FS, but
this approach has its own challenges.

- discovery

In the default configuration, where you've consumed the InCommon
metadata aggregate via "Add-AdfsClaimsProviderTrustsGroup", the home
realm discovery (HRD) page will list all 2000+ IdPs by entity ID. This
makes the default HRD page completely unusable. We ended up adapting
the Shibboleth Embedded Discovery Service (EDS) for use with AD FS 3.0
(https://github.com/ibrsp/adfs-web-theme), which might also work with AD
FS 2016.

I hope this helps. Please feel free to ask further questions!

Best wishes,
Matthew

--
"The lyf so short, the craft so longe to lerne."




Archive powered by MHonArc 2.6.19.

Top of Page