+ All Categories
Home > Documents > Federation and Federated Identity: Part 2 Building Federated Identity Solutions with Forefront...

Federation and Federated Identity: Part 2 Building Federated Identity Solutions with Forefront...

Date post: 28-Dec-2015
Category:
Upload: damian-price
View: 222 times
Download: 1 times
Share this document with a friend
Popular Tags:
29
Identity: Part 2 Building Federated Identity Solutions with Forefront Unified Access Gateway (UAG) and ADFS v2 John Craddock Infrastructure and Security Architect XTSeminars Ltd
Transcript

Federation and Federated Identity: Part 2 Building Federated Identity Solutions with Forefront Unified Access Gateway (UAG) and ADFS v2John CraddockInfrastructure and Security Architect XTSeminars Ltd

Agenda

• Federation overview• What is Forefront Unified Access Gateway (UAG)• UAG Trunks• Configuring a Trunk for ADFS v2.0• Adding a claims enabled application to the trunk• Using claims authentication with a Kerberos application through

Kerberos Constrained Delegation (KCD)

Process token

Home realm discovery

Redirected to partner STS requesting ST for partner user

Return ST for consumption by your STS

Return new ST

Working with PartnersYour

ADFS STSYour

Claims-aware app

ActiveDirectory

Partner user

PartnerADFS STS & IP

Redirected to your STS

Authenticate

Send Token

Return cookiesand page

Browse app

Not authenticated

Redirect to your STS

ST

ST

ST

ST

App trusts STS Your STStrusts your

partner’s STS

DEMOEstablishing Trust

ADFS Availability

• The ADFS server is a key component• Requires high availability• Must scale to the authentication demands of your / partner

organisation(s)• Functionality required from the Internet for remote workers

ADFS STS

Deployment Options

Active Directory

Configuration SQL Cluster

Firewall &Load Balancer

Intranet AD FS 2.0 Farm

Perimeter Network ADFS Proxy Farm

Firewall &Load Balancer

Internet

Adding Forefront Unified Access Gateway

ADFS v 2.0

Claims aware application

UAG

Kerberos application

Publishes ADFS server

PublishesApplications

Active Directory

Multipleauthentication

options

Forefront Unified Access Gateway

• Single entry-point for all remote access• Service Pack 1 adds support for ADFS v2.0

DirectAccess

HTTP/HTTPS

Layer3 VPN

Application publishing

Optimizer modules forExchangeSharePointCRM

Reverse proxy forWeb farms

Third party support

RemoteApps viaIntegrated RemoteDesktop Services Gateway

UAG Architecture

Windows Server 2008 R2

Windows Network Load Balancing

Threat Management Gateway (TMG)

Nati

ve IP

v6

6to4

Tere

do

IPH

TTPS

ISAT

AP

DN

S64

NAT

64

IIS

UAG Filter

Internalsite Portal RDSG

SSL

Tunn

el

SSTP

Laye

r 3

IP VPN

RRASWeb Application Publishing

Denial of Service Prevention

Dynamic tunnel endpoints

DirectAccess

Management Console

Session manager

SCOM management pack

Config and array manager

Tracing and logging

User manager

Forefront components

UAG Trunks

Endpoint detection& clean up

downloaded to clientEvaluate Endpoint

Access Settings

Authenticateuser against

authenticationservers

AuthenticationServers

External IP and URL

HTTP or HTTPS

UAG Trunk

Trunk Portal

Add Applications

to Trunk

Creating a Trunk for ADFS v 2.0

• Requires UAG SP1• Define the ADFS STS-IP as a UAG Authentication Server• Requires federation metadata from the ADFS-IP• Define the claim that will be used as the lead value

• Create an HTTPS Trunk• Select the ADFS Authentication server defined previously

• Don’t forget to run Activate Configuration• If things don’t work as expected, an iisreset on the UAG server

may solve it

Configuring the ADFS Server

• On the ADFS server define UAG as a relying party• Requires the UAG federation metadata• Only available via an external URL or via XLM stored in

Program Files\Microsoft Forefront Unified Access Gateway\von\InternalSite\ADFSv2Sites\fed\FederationMetadata\2007-06

• On the ADFS server define the appropriate claims to pass in the token (Issuance Transform Rules)

• On your client computer connect to the ADFS Trunk• You should be logged on via ADFS and see an empty portal

DEMOSetting up the portal

Man in the Middle

• UAG is acting a the man in the middle between the client and the ADFS server• Depending on the client and server versions Channel Binding Token (CBT) will be enforced and

authentication will fail• Disable CBT on the ADFS server

• Configured through the Configuration Editor for the Default Website\adfs\ls or via a script • See TechNet “Forefront UAG and AD FS 2.0 supported

scenarios and prerequisites”

https://adfs.example.com https://adfs.example.com

Terminates HTTPS and then sends to ADFS

server

CTB prevents server accepting credentials from new SSL channel

Adding Claims Aware Applications

• Select the application• Define name and type• Define endpoint policies• Specify the application’s internal address• Specify how SSO credentials are passed to the published App• Define how the application is shown in Trunk portal• Activate the configuration

DEMOAdding a claims application

None Claims Aware Applications

• None claims aware application can be supported via Kerberos Constrained Delegation• Authentication to internal application via Kerberos• Shadow accounts required for external users

Authentication viaSAML security token

UAG

ADFS

Request Kerberos Ticket to

APP1 on behalf of user

Authenticate to APP1 using Kerberos

App1Authentication &Authorization viaKerberos ticket

Domain Controller running KDC

Kerberos Constrained Delegation (KCD)

KDCUAG ServerTom

TGT

K-ST

Data server

Claims Authentication

Request Kerberos tokenwith user’s identity

Request Kerberos STwith user’s identity

K-STImpersonate user

Uses: Kerberos extension Service-for-User-to-Self (S4U2Self)

AD UAG Server Object

• Automatically configured via UAG

• You must supply the Service Principal Name

• Backend application must be Kerberos

Adding a Kerberos Application

• As before• Select the application• Define name and type• Define endpoint policies• Specify the application’s internal address• DON’T specify how SSO credentials are passed to the

published App• Define how the application is shown in Trunk portal

• Select the application and change the authentication to KCD• Specify the SPN and shadow account identifier

• Activate the configuration

DEMOAdding a Kerberos Application

Get Your Certificates Right

• The UAG server will require an HTTPS certificate for the UAG portal and the ADFS server• For example adfsportal.example.com and adfs.example.com• Can use a wild card certificate *.example.com

• Make sure that the UAG server has the root certificate for the ADFS token signing certificate

• Make sure the client has the root certificate for the UAG server certificates

• Make sure all CRL distribution points can be resolved• The client will check the certificates and CRLs for the UAG

client components

Virtual Test Environment

InternetCorporate DNS

Virtual Internet Virtual CorpNet

UAGDNS

forwarderISP

• Virtual ISP provides services for the virtual Internet: DNS, DHCP, CRL distribution point• Routes Internet request to / from the corporate NAT• Allows client to check CRLs for UAG client components

NAT

What Next?

• Build a test lab • Get ADFS working first with a claims aware application• Try the Microsoft ADFS step-by-step guides

• Read the ADFS Design and Deployment guides• Read the UAG guides for ADFS v 2.0• Deploy UAG into your test environment • Publish ADFS v 2.0 and your application• Make sure all certificates and CRLs are available

More on ADFS and Federation

• XTSeminars one-day event:• Federation and Federated Identity (available June 2011)• [email protected] for more information

• Get your local Microsoft subsidiary to run the event!

Consulting Services on Request

[email protected]

John has designed and implemented computing systems ranging from high-speed industrial controllers through to distributed IT systems with a focus on security and high-availability. A key player in many IT projects for industry leaders including Microsoft, the UK Government and multi-nationals that require optimized IT systems. Developed technical training courses that have been published worldwide, co-authored a highly successful book on Microsoft Active Directory Internals, presents regularly at major international conferences including, TechEd, IT Forum and European summits. John can be engaged as a consultant or booked for speaking engagements through XTSeminars. www.xtseminars.co.uk

Stay up to date with TechNet Belux

Register for our newsletters and stay up to date:http://www.technet-newsletters.be

• Technical updates• Event announcements and registration• Top downloads

Join us on Facebookhttp://www.facebook.com/technetbehttp://www.facebook.com/technetbelux

LinkedIn: http://linkd.in/technetbelux/

Twitter: @technetbelux

Download MSDN/TechNet Desktop Gadget

http://bit.ly/msdntngadget

TechDays 2011 On-Demand

• Watch this session on-demand via TechNet Edge http://technet.microsoft.com/fr-be/edge/

http://technet.microsoft.com/nl-be/edge/

• Download to your favorite MP3 or video player• Get access to slides and recommended resources by the speakers

THANK YOU


Recommended