In Part 1, we reviewed my configuration, updated the certificates, and added the “Claims Provider Trusts” within each ADFS Server. In this post, we’ll configure the “Claims” for each trust, ready for testing authentication.
As part of the work I often get involved with, it tends
to involve Federated Authentication either with On-Premises or Cloud Services.
In the past, I have used Active Directory Federated Services (ADFS) as the middleman
between all kinds of applications and configurations. Most recently, I have
been working with multiple third-party federated platforms, that pass-through
ADFS onto some applications such as SharePoint of Office 365. A common question I often get asked either through
twitter, blog comments, or even email is about multiple Active Directory Forest,
Multiple Active Directory Federated Services configuration, and other
applications. As such, I thought a blog post was to explain this and
walk-through a sample setup.
Over the past few months, I have been working with a client helping them to configure SharePoint 2016 on-premises to Microsoft Active Directory Federated Services (ADFS), specifically to allow federated users to access K2...