In Part 1, we reviewed my configuration, updated the certificates, and added the “Claims Provider Trusts” within each ADFS Server. In this post, we’ll configure the “Claims” for each trust, ready for testing authentication.
As part of the work I often get involved with, it tends
to involve Federated Authentication either with On-Premises or Cloud Services.
In the past, I have used Active Directory Federated Services (ADFS) as the middleman
between all kinds of applications and configurations. Most recently, I have
been working with multiple third-party federated platforms, that pass-through
ADFS onto some applications such as SharePoint of Office 365. A common question I often get asked either through
twitter, blog comments, or even email is about multiple Active Directory Forest,
Multiple Active Directory Federated Services configuration, and other
applications. As such, I thought a blog post was to explain this and
walk-through a sample setup.
This morning my first Microsoft 365 Community Document went live. It is entitled “Basic Security Set Up for Microsoft 365“. In the document, I walk through some of the reason to set Security, assuming...
Zero Trust is a model that focuses on strict identity verification for any person or device trying to access resources with the corporate network. It does not matter whether the person or device is...
To start, whatever you view of the information that has come to light about zoom over the past couple of weeks, or the potential exploits that can “break” into a Zoom meeting, it still...
Over the past few months, I have been working with a client helping them to configure SharePoint 2016 on-premises to Microsoft Active Directory Federated Services (ADFS), specifically to allow federated users to access K2...