Single Sign-On from Active Directory to a Windows Azure Application
|
|
|
- Alexis Scott
- 10 years ago
- Views:
Transcription
1 Single Sign-On from Active Directory to a Windows Azure Application December 16, 2010 Authors: Vittorio Bertocci, David Mowers Reviewers: Stuart Kwan, Paul Beck Abstract This paper contains step-by-step instructions for using Windows Identity Foundation, Windows Azure, and Active Directory Federation Services (AD FS) 2.0 for achieving SSO across web applications that are deployed both on premises and in the cloud. Previous knowledge of these products is not required for completing the proof of concept (POC) configuration. This document is meant to be an introductory document, and it ties together examples from each component into a single, end-to-end example.
2 This document is provided as-is. Information and views expressed in this document, including URL and other Internet Web site references, may change without notice. You bear the risk of using it. Some examples depicted herein are provided for illustration only and are fictitious. No real association or connection is intended or should be inferred. This document does not provide you with any legal rights to any intellectual property in any Microsoft product. You may copy and use this document for your internal, reference purposes. You may modify this document for your internal, reference purposes Microsoft Corporation. All rights reserved. Microsoft, Active Directory, Visual Studio, SharePoint, Hyper-V, Windows, Windows NT, and Windows Server are trademarks of the Microsoft group of companies. All other trademarks are property of their respective owners.
3 Contents Introduction... 5 Objectives... 5 In This Paper... 5 Scenario... 5 Overview of Web Authentication and Authorization... 6 Beyond Groups and Roles... 6 Solution Approach AD FS 2.0, WIF, and Windows Azure... 7 Technology Overview... 8 AD FS WIF... 9 Creating the On-Premise Infrastructure... 9 Preparing the Server Hosts... 9 Installing Microsoft Visual Studio Creating a Windows Azure Application Install and Configure AD FS 2.0 and the WIF SDK Configure the Windows Azure Application to Use SSO Configure HelloCloudSSO to Use SSL Configure the Endpoint Add SSO to the HelloCloudSSO Application Add a Hosts File Mapping for the Dev Fabric Environment Add an STS Reference to the Application Add a Relying Party Trust to AD FS Configure Claim Rules for the Relying Party Add a Request Validator Use Claims in the Application Test the Configuration Deploy the HelloCloudSSO to the Cloud The Cloud Application Development Cycle Dev Fabric, Staging, and Production Upload the Applications SSL Certificate Change Federation Settings in the Cloud Application Add a Relying Party Trust for the Cloud Environment... 30
4 Upgrade the Federated HelloCloudSSO Application Add a Hosts File Mapping for the Staging Environment Domain Names and URLs Test the Federated HelloCloudSSO Application in the Staging Environment Upgrade and Test in the Production Environment Additional Considerations for Production Development WIF Session Management in Windows Azure Summary Further Reading and Resources... 36
5 Introduction Objectives The purpose of this white paper is to help developers enable single sign-on (SSO) between Active Directory Domain Services (AD DS) and cloud applications running on the Microsoft Windows Azure platform. This paper contains step-by-step instructions for using Windows Identity Foundation, Windows Azure, and Active Directory Federation Services (AD FS) 2.0 for achieving SSO across web applications that are deployed both on premises and in the cloud. Previous knowledge of these products is not required for completing the proof of concept (POC) configuration. This document is meant to be an introductory document, and it ties together examples from each component into a single, end-to-end example. The Further Reading and Resources section lists articles and hands-on labs that offer more detailed coverage of the topics that are presented here. In This Paper Scenario Technology Overview Creating the On-Premise Infrastructure Adding Single Sign-On to the HelloCloudSSO Application Additional Considerations for Production Development Summary Further Reading and Resources Scenario When an application developer is given the task of looking at the cloud for application hosting, he or she must look for a solution that provides SSO for both internal users on the organization s intranet and mobile users who are accessing the application over the Internet. The scenario might look like the following illustration.
6 Figure 1 The SSO challenge cloud version This scenario assumes the following use cases: Corporate users access internal applications while logged in using Active Directory. Corporate users access Windows Azure deployed applications while logged in using Active Directory. Mobile corporate users access Windows Azure deployed applications using Active Directory accounts. Two common challenges for such a scenario are: How to provide the SSO user experience. How to provide information about the user so that the application can make authorization decisions. This paper explains how to address these challenges for the described use cases. Overview of Web Authentication and Authorization Before diving into the architecture of cloud application authentication and authorization, it is useful to review developer best practices for internal web applications. Intranet web applications that are hosted on Internet Information Services (IIS) most commonly use Windows Integrated Authentication. Windows Integrated Authentication specifies that Kerberos version 5 (V5) or NTLM authentication is used to validate the application user identity. When the Windows security system performs this type of authentication, it provides the identity of the user and it also provides the set of groups from both the local server and Active Directory that the user is a member of. Active Directory groups are roughly equivalent to the concept of enterprise roles and are often used as such in application authorization logic. If the internal web application is an ASP.NET application, Active Directory group membership is commonly checked using the ASP.NET IsInRole() method: if ( User.IsInRole("domain\\domaingroup") ) DoRoleProtectedFunction(); For the developer who is writing a new application for the cloud or porting an application to run in the cloud the good news is that the interfaces for evaluating role membership do not change. Later in this paper, we discuss how AD FS 2.0 configuration affects the format of the Active Directory group (role) claims that AD FS 2.0 delivers. Beyond Groups and Roles The claims-based identity model makes it possible for the developer to easily access other information about the user, beyond group memberships. This concept should be familiar to internal application
7 developers because many applications require additional information about users. This information is commonly stored as attribute information. It might be stored in a Lightweight Directory Access Protocol (LDAP) directory, such as Active Directory, or in a Structured Query Language (SQL) database. Therefore, along with accessing group information using IsInRole(), the internal application developer accesses information,such as the following: Employee ID Organizational information, such as Department or Group Job title or level address Building, office, or other geographical location Other than the Microsoft.NET Framework classes that conveniently abstract access to LDAP directories or SQL databases, there are no real standard mechanisms for accessing such information. Claims-based identity changes the playing field and creates a standard way to make this information available to applications. A claim is a simple mechanism that can be used to deliver identity-relevant information about a user, including roles, permissions, rights, and even general information, such as a birth date. Whether the claim comes from an LDAP directory or a SQL database, the claim itself is delivered to the application in the authentication token and is accessed through simple programmatic interfaces. This is a huge benefit for the application developer potentially eliminating hundreds of lines of code. Arguably of more importance is the fact that claims-based identity moves the process of accessing attribute information from the application to administrative operations at the infrastructure level. To get a better idea of the advantages of this approach, consider the following scenario: An existing application retrieves a certain attribute value from an LDAP directory. The organization changes its identity provisioning process and decides to make this attribute available to applications in a SQL database instead. Application developers (possibly, for many applications) are then forced to add many lines of SQL code to access the attribute value. With a claims-based identity infrastructure, such as AD FS 2.0, the application changes are unnecessary. A simple administrator action changes the claim source from LDAP to SQL. We have just discussed several reasons why claims-based authorization is preferable, even in intranet environments. We now consider cloud-based applications and see that, where in the intranet environment a claims-based infrastructure is better than the alternatives, in the cloud it is required. Solution Approach AD FS 2.0, WIF, and Windows Azure After your organization makes the decision to deploy applications to the cloud using Windows Azure, one obvious question is how to take advantage of the identities that are based in Active Directory when the organization is using the cloud application. Ideally, the solution should provide SSO, as well as consistency with regard to authorization information. Fortunately, this goal is easy to achieve using AD FS 2.0) and WIF.
8 Figure 2 SSO using AD FS 2.0 applied to a solution in which the application runs in the cloud and the users come from the existing directory infrastructure In this scenario, the application is hosted in the cloud using Windows Azure, but its users are the accounts that are maintained in on-premises Active Directory. If the application tries to authenticate users directly through Kerberos or NTLM, it fails, because of the networking boundaries that separate it from the domain controller. Adding AD FS 2.0 infrastructure and WIF makes it possible for the application to use claims-based identity and makes it possible to instantly reuse existing accounts, even if the application is deployed in the cloud. A major advantage of the proposed solution is that it also can be extended to other scenarios, including identity federation with identity providers, such as Windows Live ID, and other organizations with federation infrastructure that implements the WS-Federation or Security Assertion Markup Language (SAML) 2.0 industry-standard federation protocols. Developers who are interested in this scenario should review the Access Control Service Samples and Documentation (Labs) ( Technology Overview AD FS 2.0 AD FS 2.0 is a key component in cloud application security. In its role as a security token service (STS), it authenticates users and generates authorization information. It does this by implementing webcompatible protocols, including WS-Federation and SAML 2.0. AD FS 2.0 is an infrastructure component. It is typically managed by information technology (IT) staff and not by developers. Developers should understand enough about AD FS 2.0 that they can communicate requirements for claims that are required by the applications that they are developing.
9 WIF WIF is a developer framework that enhances the.net Framework capabilities. WIF integrates seamlessly with the existing mechanisms that the.net Framework offers for working with identity, the interfaces IPrincipal and IIdentity. WIF extends those interfaces with IClaimsPrincipal and IClaimsIdentity, respectively. IClaimsPrincipal and IClaimsIdentity can still take advantage of existing access control mechanisms, such as IsInRole() and the <authorization> element. Furthermore, they contain additional members that carry the claim collections that are extracted from the incoming authentication token that AD FS 2.0 generates. Figure 3 The WIF claims object model Creating the On-Premise Infrastructure You can implement this scenario on the Microsoft platform by doing the following: Installing AD FS 2.0 on one intranet server Using WIF for securing your Windows Azure Web Role application Establishing the trust relationship between the application and AD FS 2.0 and configuring the appropriate claims The rest of this paper provides guidance about how to perform these three activities. Preparing the Server Hosts To complete this proof of concept, you use two server instances. One server instance is configured as a domain controller for a stand-alone domain. The environment that is described this paper uses the fictitious namespace of Fabrikam. The distinguished name of the domain controller is Fabrikam- DC.fabrikam.com. The second server instance serves multiple roles, including the role of host for the Windows Azure application development environment and for AD FS 2.0. This server is named Fabrikam- ADFS.fabrikam.com. It is referred to throughout this paper as Fabrikam-ADFS. In a production deployment, these three roles would be performed on two different servers and a workstation.
10 Installing Microsoft Visual Studio 2010 This paper assumes that you are using Visual Studio 2010 as your development environment. Install Visual Studio 2010 Professional on your development computer. This can be a separate instance from the AD FS 2.0 server, but for the proof of concept described in this paper it can just as easily be the same computer. Creating a Windows Azure Application Follow steps 1 through 4 at Windows Azure ( to set up the Windows Azure development environment, get an account, and create and test a basic HelloCloud web application. You then integrate this application with the AD FS 2.0 infrastructure that is created in the following steps. Note: This paper refers to both the Visual Studio solution for the Windows Azure application and the Windows Azure service as HelloCloudSSO. Because all Windows Azure service names must be globally unique, you must choose a different Windows Azure service name. You can choose to use HelloCloudSSO as the Visual Studio solution name or have it match your Windows Azure service name. Install and Configure AD FS 2.0 and the WIF SDK The document AD FS 2.0 Federation with a WIF Application Step-by-Step Guide ( walks you through the installation and configuration of a basic AD FS 2.0 environment. Use this guide, and complete all the procedures through step 2 and the portion of step 3 that directs you to install the WIF Software Development Kit (SDK). Configure the Windows Azure Application to Use SSO Now that you have the HelloCloudSSO application and AD FS 2.0 set up, you can integrate the two by establishing a trust. This enables SSO to the application using an Active Directory account. After this step is complete, you modify the application to use WIF to use and display the claim information that is sent in the authenticating token. Before you publish an SSO version of HelloCloudSSO to Windows Azure, you first configure a trust with AD FS 2.0 and then test it locally using the development fabric. The development fabric simply simulates the Windows Azure fabric on the local computer; therefore, it is a useful tool to make sure everything is working right. For more complex web applications, it is a requirement that developers be able to test as they develop using the dev fabric; therefore, this means that they will need to have authentication and authorization working there as well. Configure HelloCloudSSO to Use SSL SSO requires that the web application use HTTPS to securely transport security tokens. It is possible to configure everything to not use HTTPS. However, it is not worth going through the extra steps because you will have to switch eventually. The first step is to create and install a suitable certificate. For the proof-of-concept environment, a selfsigned certificate is the best option. While you are logged on as a system administrator, use the
11 makecert tool (which is available in the Microsoft Windows Software Development Kit ( with the following arguments to create the certificate: makecert -r -pe -n "CN=hellocloudsso.fabrikam.com" -b 01/01/2010 -e 01/01/2036 -eku ss my -sr localmachine -sky exchange -sp "Microsoft RSA SChannel Cryptographic Provider" -sy 12 Note that you can substitute a different Domain Name System (DNS) address for hellocloudsso.fabrikam.com. In Windows Azure language, the way to enable the application to use Secure Sockets Layer (SSL) is to add an HTTPS endpoint. The process to add an HTTPS endpoint is a three-step process: 1. Configure the endpoint. 2. Upload the certificate to the cloud. 3. Configure the SSL certificate, and then point the endpoint to that certificate. To make the dev fabric function correctly, you only have to perform step 1 for now. Configure the Endpoint To configure the endpoint, in Solution Explorer, right-click WebRole1, and then click Properties. Figure 4 Properties In the Properties window, click Certificates, and then click Add Certificate. Provide a friendly name for the certificate, and then click the button. Select the certificate that you created in the previous step.
12 Figure 5 Add an SSL certificate to the HTTPS endpoint Click Endpoints, and then select the HTTPS check box. Select the certificate that you just added to the endpoint in the SSL certificate name drop-down list. Figure 6 Endpoints configuration Click Configuration, and clear the Launch browser for: HTTP endpoint check box. On running or debugging of the application in the dev fabric, the default browser will be launched only for the HTTPS endpoint.
13 Figure 7 Launch browser for HTTPS endpoint configuration At this point you can run the application from Visual Studio. The browser opens to the HTTPS endpoint, for example, Note the port number that is used; you will need this number in a subsequent step. If Internet Explorer is your default browser, it displays a certificate warning because the self-signed certificate that the Windows Azure tool created is not trusted. Add SSO to the HelloCloudSSO Application To add SSO to the HelloCloudSSO application, do the following: Add a hosts file mapping for the dev fabric application URL Add an STS reference to the application Add a relying party trust to AD FS 2.0 Configure claim rules for the application Add a request validator Configure the application to use WIF and display claims Add a Hosts File Mapping for the Dev Fabric Environment To enable consistent access to the HelloCloudSSO application, you create a mapping in the local hosts file to map a friendly application name to the dev fabric localhost IP address. On the development computer, open the /windows/system32/drivers/etc/hosts file, and add the following line using the localhost IP address and the friendly DNS name of the application: Save the hosts file. # name mapping for Windows Azure Dev Fabric hellocloudsso.fabrikam.com
14 Add an STS Reference to the Application In Visual Studio, with the HelloCloudSSO project loaded, right-click the HelloCloudSSO project, and then click Add STS Reference. Figure 8 Add an STS reference in Visual Studio 2010 The Federation Utility wizard (FedUtil) starts. Now, you configure a trust relationship between the HelloCloudSSO application and the AD FS 2.0 server. In the Federation Utility Wizard, provide the path to the application s web.config file and the application URI that was composed using the friendly application name and the dev fabric port number.
15 Figure 9 Federation Utility wizard application configuration To configure the STS, click Next.
16 Figure 10 Federation Utility wizard specify STS Click Use an existing STS, and then provide the URL of the AD FS server in your environment. To locate and validate the URL of the federation metadata document, click Test location. To configure certificate chain validation, click Next.
17 Figure 11 Federation Utility Wizard certificate chain validation Click Disable certificate chain validation, and then click Next.
18 Figure 12 Federation Utility Wizard Security token encryption Click No encryption, and then click Next to complete the Federation Utility Wizard. Add a Relying Party Trust to AD FS If you run the HelloCloudSSO application in the dev fabric environment at this point, it will exhibit a change in behavior. When the application opens, the Windows Security dialog box appears and prompts for credentials. If you enter valid credentials, the following message will appear.
19 Figure 13 The WIF application error when AD FS RP is not configured This error is generated because you have not configured AD FS with a relying party that represents the HelloCloudSSO application in the dev fabric. Note that the URL is for the Integrated authorization page on the AD FS server. The HelloCloudSSO application redirects the browser based on changes to the HelloCloudSSO web.config that you made by adding the STS reference to the HelloCloudSSO project. To add a relying party trust to AD FS 1. In the AD FS 2.0 Management console, click AD FS 2.0, expand Trust Relationships, and then rightclick Relying Party Trusts. To start the Add Relying Party Wizard, click Add Relying Party Trust. 2. On the Welcome page, click Start. 3. On the Select Data Source page, click Import data about the relying party from a file. 4. Click Browse, navigate to the location of the applications federation metadata document, which is typically found in the application project folder: \WebRole1\FederationMetadata\ \FederationMetadata.xml. Select the metadata document, and then click Open.
20 Figure 14 Browse for the metadata file 4. On the Specify Display Name page, in Display name type the following text, and then click Next: HelloCloudSSO Dev Fabric 5. On the Choose Issuance Authorization Rules page, click Permit all users to access this Relying Party, and then click Next. 6. On the Ready to Add Trust page, review the relying party trust settings, and then click Next to save the configuration. 7. On the Finish page, click Close to exit the wizard. This also opens the Edit Claim Rules for HelloCloudSSO Dev Fabric properties page. Leave this dialog box open, and then go to the next procedure. Note: The port number used for dev fabric is not guaranteed to remain the same during different developer sessions. If the port number changes, update the relying party trust information by repeating the previous steps, but use the new port number. Configure Claim Rules for the Relying Party Now configure a few claim rules for the HelloCloudSSO application. Claim rules determine what information about the user, or claims, will be sent to the application after the user is authenticated. You
21 may configure any claim rules that you like, as the application will simply list the claims that are provided. The following claims are a good default set for the application scenario addressed in this document. To configure claim rules for the relying party 1. On the Edit Claim Rules for Federated HelloCloudSSO properties page, on the Issuance Transform Rules tab, click Add Rule to start the Add Transform Claim Rule Wizard. 2. On the Select Rule Template page, under Claim rule template, click Send LDAP Attributes as Claims, and then click Next. This action passes an incoming claim through to the user by means of Windows Integrated Authentication. 3. On the Configure Rule page, in Claim rule name, type the following text: LDAP Attribues. In the Attribute store drop-down list, click Active Directory. In the Mapping of LDAP attributes to outgoing claim types table, click the down arrow in the first column, and then click Token-Groups Unqualified Names. In the second column click the down arrow, click Role, and then click Finish.
22 Figure 15 The Add Transform Claim Rule Wizard 4. Click OK to save the changes to the relying party trust. Note: There are several options for the Token-Groups attribute including the following: Token-Groups as security identifiers (SIDs) Token-Groups that are qualified by domain name Token-Groups that are qualified by long domain name Token-Groups that are unqualified The option you choose will depend on the complexity of your environment and whether you have multiple domains. If you have a single domain, then unqualified group names may be sufficient. For the Windows Azure environment you will probably not use SIDs as there is no convenient way for an application in the cloud to look up SID values and generate a text group name.
23 Add a Request Validator.NET 4.0 has new behavior that, by default, will cause an error condition on a page request that contains a WS-Federation authentication token. For more information, see the Using the Windows Identity Foundation SDK with Visual Studio 2010 RC blog entry ( To correct this error for the proof-of-concept environment, you need to add a request validator to the HelloCloudSSO project. In Visual Studio, right click the WebRole1 project, click Add, and then click New Item. In the Add New Item dialog box, click the Web template, and then click C# Class. In the Name text box, type the following text, and then click Add: SampleRequestValidator.cs In the code file, paste the following: // // // THIS CODE AND INFORMATION IS PROVIDED 'AS IS' WITHOUT WARRANTY OF // ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO // THE IMPLIED WARRANTIES OF MERCHANTABILITY AND/OR FITNESS FOR A // PARTICULAR PURPOSE. // // Copyright (c) Microsoft Corporation. All rights reserved. // // // using System; using System.Web; using System.Web.Util; using Microsoft.IdentityModel.Protocols.WSFederation; /// <summary> /// This SampleRequestValidator validates the wresult parameter of the /// WS-Federation passive protocol by checking for a SignInResponse message /// in the form post. The SignInResponse message contents are verified later by /// the WSFederationPassiveAuthenticationModule or the WIF signin controls. /// </summary> public class SampleRequestValidator : RequestValidator { protected override bool IsValidRequestString( HttpContext context, string value, RequestValidationSource requestvalidationsource, string collectionkey, out int validationfailureindex ) { validationfailureindex = 0;
24 if ( requestvalidationsource == RequestValidationSource.Form && collectionkey.equals( WSFederationConstants.Parameters.Result, StringComparison.Ordinal ) ) { SignInResponseMessage message = WSFederationMessage.CreateFromFormPost( context.request ) as SignInResponseMessage; } if ( message!= null ) { return true; } return base.isvalidrequeststring( context, value, requestvalidationsource, collectionkey, out validationfailureindex ); } } Save the file. Next, add the following to the HelloCloudSSO application s web.config file: <system.web> <httpruntime requestvalidationtype="samplerequestvalidator" /> Save the web.config file. Use Claims in the Application The security token provided by AD FS is not only proof that the user successfully authenticated with Active Directory, but it is also a collection of claims, which are statements about the user made by AD FS 2.0. To view the claim information provided by AD FS use WIF. Start by adding a reference in the WebRole1 project to the.net assembly with the component name Microsoft.IdentityModel. After you have added the reference, set the Copy Local property of the Microsoft.IdentityModel assembly to True.
25 Figure 16 Solution Explorer screen in Visual Studio This ensures that the Microsoft.IdentityModel assembly is deployed with the package later when you deploy the application to the Windows Azure staging or production environments. Next, modify the HelloCloudSSO default.aspx.cs file to include a using statement for the Microsoft.IdentityModel.Claims namespace. using Microsoft.IdentityModel.Claims; Next, add code to the sample application that will display all of the incoming claims. Replace the Page_Load method with the following: protected void Page_Load(object sender, EventArgs e) { ContentPlaceHolder cph = (ContentPlaceHolder) this.master.findcontrol("maincontent"); IClaimsPrincipal claimsprincipal = Page.User as IClaimsPrincipal; IClaimsIdentity claimsidentity = (IClaimsIdentity)claimsPrincipal.Identity;
26 Table claimstable = new Table(); TableRow headerrow = new TableRow(); TableCell claimtypecell = new TableCell(); claimtypecell.text = "Claim Type"; claimtypecell.borderstyle = BorderStyle.Solid; TableCell claimvaluecell = new TableCell(); claimvaluecell.text = "Claim Value"; claimvaluecell.borderstyle = BorderStyle.Solid; headerrow.cells.add(claimtypecell); headerrow.cells.add(claimvaluecell); claimstable.rows.add(headerrow); TableRow newrow; TableCell newclaimtypecell, newclaimvaluecell; foreach (Claim claim in claimsidentity.claims) { newrow = new TableRow(); newclaimtypecell = new TableCell(); newclaimtypecell.text = claim.claimtype; newclaimvaluecell = new TableCell(); newclaimvaluecell.text = claim.value; newrow.cells.add(newclaimtypecell); newrow.cells.add(newclaimvaluecell); } claimstable.rows.add(newrow); } cph.controls.add(claimstable); Test the Configuration Launch the HelloCloudSSO application in the dev fabric. Based on the changes that you have made, the browser is redirected to AD FS for authentication. Depending on the configuration of your systems, you will either be presented with the standard Windows Security dialog box or you will be automatically authenticated using Windows Integrated Authentication. If prompted, provide Active Directory credentials. If your authentication is successful, the browser will be redirected to the HelloCloudSSO application. In the application UI, you will now see all of the claims provided by AD FS 2.0.
27 Figure 17 HelloCloudSSO application displaying claims from AD FS 2.0 using the WIF Note: The most likely reason to be prompted for credentials is because IE does not recognize the URL as being within the intranet authentication zone. For more information, see in the Microsoft Knowledge Base ( Deploy the HelloCloudSSO to the Cloud Now that the application is running successfully in dev fabric using SSO and claims the final step is to deploy the application to the Windows Azure cloud environment. The Cloud Application Development Cycle Dev Fabric, Staging, and Production The typical development cycle of a cloud application will likely include iterations of coding and testing on the dev fabric, the Windows Azure staging environment, and the Windows Azure production environment. To better understand the Windows Azure application life cycle, see Application Life Cycle Management for Windows Azure Applications ( Applications that use AD FS 2.0 have a specific requirement to include configuration of the application URL. In the staging environment, the application URL is dynamically generated when the application is uploaded and cannot be determined beforehand. This creates an issue for AD FS 2.0-integrated applications, because configuration of the application URL must be performed before the application is uploaded.
28 To test the application in the staging environment, and eventually to move it to production, you use a combination of the local hosts file that resolves a friendly name for the application and a self-signed certificate with the same address. The required steps to deploy the federated, claims-based application to the Windows Azure environment are: 1. Create and upload the application SSL certificate to Windows Azure 2. Change the application federation settings to redirect to the correct URL 3. Add a new relying party trust for the production and staging environments 4. Upgrade the Windows Azure service 5. Edit the hosts file Upload the Applications SSL Certificate To instantiate the certificate that will be used for SSL in the cloud environment, it has to be uploaded using the Windows Azure portal. To prepare for this step, use IIS 7 or the Certificates Microsoft Management Console (MMC) to export the certificate (including the private key) you created earlier using the makecert tool. For more information about how to export certificates, see Import or export certificates and private keys ( Open the Windows Azure portal, and then click the HelloCloudSSO service. Scroll down until you see the Certificates section, and then click manage. Complete the wizard to upload the certificate. Figure 18 A phase in the upload of a certificate in PFX format to Windows Azure When the wizard completes, the certificate will be listed for the Hosted Service. Find the Thumbprint and copy the value to the clipboard, as you will need it for the next step.
29 Change Federation Settings in the Cloud Application One of the first steps in this process was to add an STS reference to the HelloCloudSSO application. This action invoked the FedUtil to make certain entries in the application s web.config file that specifies the federation settings. Additionally, this created the federation metadata document for the application that also specifies the application URLs. When the cloud application is moved from running in dev fabric to staging or production, the application s URL changes. Since the application s URL is key to the behavior of the redirects necessary for the WS-Federation Passive authentication profile, it makes sense that the federation configuration in these two files also needs to change when the application URL changes. To make the necessary changes, find the following section in the application s web.config: <microsoft.identitymodel> <service> <audienceuris> <add value=" /> </audienceuris> <federatedauthentication> <wsfederation passiveredirectenabled="true" issuer=" realm=" hellocloudsso.fabrikam.com:449/" requirehttps="true" /> <cookiehandler requiressl="true" /> </federatedauthentication> Examine these entries in your application s configuration file and find the references to the dev fabric application location that contains the port number. To reconfigure the HelloCloudSSO application, comment the references to the dev fabric URL and add new entries with the address of the application without the port number: <microsoft.identitymodel> <service> <audienceuris> <!--<add value=" hellocloudsso.fabrikam.com:449/" />--> <add value=" /> </audienceuris> <federatedauthentication> <!--<wsfederation passiveredirectenabled="true" issuer=" realm=" hellocloudsso.fabrikam.com:449/" requirehttps="true" />--> <wsfederation passiveredirectenabled="true" issuer=" realm=" requirehttps="true" />
30 <cookiehandler requiressl="true" /> </federatedauthentication> Save the application s web.config file. Next, you will edit the application s federation metadata document. Locate the file in the Visual Studio project directory (usually WebRole1\FederationMetadata\ \FederationMetadata.xml). Back up the existing file in case you ever need to reestablish a relying party trust with the dev fabric URLs. Open the file for editing and replace the three occurrences of the dev fabric application URL ( or similar) with the application s address without the port number ( or similar). The edited file should be similar to the following: <?xml version="1.0" encoding="utf-8"?> - <EntityDescriptor ID="_db7b0a56-88d0-4d ab0ae7e9be9" entityid=" xmlns="urn:oasis:names:tc:saml:2.0:metadata"> - <RoleDescriptor xsi:type="fed:applicationservicetype" xmlns:fed=" protocolsupportenumeration=" xmlns:xsi=" - <fed:claimtypesrequested> <auth:claimtype Uri=" Optional="true" xmlns:auth=" /> <auth:claimtype Uri=" Optional="true" xmlns:auth=" /> </fed:claimtypesrequested> - <fed:targetscopes> - <EndpointReference xmlns=" <Address> </EndpointReference> </fed:targetscopes> - <fed:passiverequestorendpoint> - <EndpointReference xmlns=" <Address> </EndpointReference> </fed:passiverequestorendpoint> </RoleDescriptor> </EntityDescriptor> Save the file. Add a Relying Party Trust for the Cloud Environment You need to add a new relying party trust in AD FS that refers to the HelloCloudSSO application in the Windows Azure staging and production environments. This is accomplished by repeating the steps
31 previously performed to create a relying party trust for the dev fabric environment, as detailed in the section Add a Relying Party Trust to AD FS. To recap those steps: 1. Run the Add Relying Party Wizard using the modified version of the FederationMetadata.xml file. 2. Create the claim rules. Upgrade the Federated HelloCloudSSO Application Next, you need to build and publish the HelloCloudSSO configuration files and upgrade the Windows Azure hosted service package through the Windows Azure developer portal. This document will describe upgrading the staging environment, but the process is the same except for the characteristic of the changing URL. Note: If the original HelloCloudSSO Windows Azure Hosted Service did not have an HTTPS endpoint, then you will receive an error message when you try to upgrade the service. If this is the case, simply delete the existing service and create a new one based on the current application configuration files that include the HTTPS endpoint.
32 Figure 19 Application uploaded to the staging environment Make note of the Web Site URL for the application in the staging environment. This URL will be used in the following step. Add a Hosts File Mapping for the Staging Environment The first step is to find the IP address used for the application in the staging environment, by using the application DNS name portion of the URL from the previous step and the ping.exe tool. For example: ping.exe e5eb30f f9a5b213f5fa1a56e.cloudapp.net The specific DNS address is dynamically generated for your application every time it is uploaded to the staging environment. Substitute e5eb30f f9a5b213f5fa1a56e with the address generated for your application PING will resolve the staging application DNS name to an IP address.
33 On the development computer, open the /windows/system32/drivers/etc/hosts file and add the following line using the IP address shown by ping.exe and the friendly DNS name of the application: # name mapping for Windows Azure Staging hellocloudsso.fabrikam.com Comment the name mapping for dev fabric as follows: # name mapping for Windows Azure Dev Fabric # hellocloudsso.fabrikam.com Save the hosts file. Note: Using PING to resolve the DNS address to a specific IP address should work in practice, but it might create problems if Windows Azure later assigns a different IP address to the application. If you encounter errors accessing the application you should repeat the steps here to find out if the applications IP address has changed and then reconfigure the hosts file if it did. Domain Names and URLs It is worth mentioning that URL namespace management is a bit more complex for cloud-based applications then it is for applications on an internal network. For example, this document describes accessing the cloud application using a URL based on the cloudapp.net namespace. But this is almost certainly not how it would be referenced for a real application deployed to the cloud by a business. The article Custom Domain Names in Windows Azure ( ) describes how an organization can map a URL based on their business will resolve to a cloud application. When this kind of approach is taken, the URLs in both the application configuration and AD FS relying party trust configuration will change to reflect the actual URL used to access the application. Test the Federated HelloCloudSSO Application in the Staging Environment Once the application upgrade is completed, open a new browser session and enter the short name for the HelloCloudSSO application that you configured previously. The browser will be redirected to the AD FS 2.0 authentication pages and you will be prompted for credentials to log on using your AD domain account. Once your credentials are entered and verified, the browser will redirect to the cloud application that will once again display the claims issued by AD FS 2.0. Upgrade and Test in the Production Environment Perform the following steps to test the HelloCloudSSO application in the Windows Azure production environment: Upgrade the Windows Azure web application to the production environment, by uploading the application configuration files through the Windows Azure portal. Use ping.exe to resolve the IP address of the HelloCloudSSO application in the Windows Azure production environment. Edit the hosts file on the development computer to add a mapping of the application friendly name to the production environment IP address as is shown in the following example:
34 # name mapping for Windows Azure Dev Fabric # hellocloudsso.fabrikam.com # name mapping for Windows Azure Staging # hellocloudsso.fabrikam.com # name mapping for Windows Azure Production hellocloudsso.fabrikam.com Comment the previous mappings used for the dev fabric and staging environments and save the hosts file. Launch a new browser session and navigate to You will be presented with the authentication dialog box where you can type your Fabrikam credentials. Once validated, you will be redirected to the application in the staging environment that will once again display the claim set from AD FS 2.0. Now that there is a mapping in the hosts file for each environment, you can easily move back and forth between the dev fabric, staging, and production environments by commenting and uncommenting the entries in the hosts file. IP addresses assigned by Windows Azure to your application may change, so make sure that you verify the IP address assigned to your application using ping.exe every time that it is upgraded in the staging and production environments. Although other approaches for managing URLs and trust configurations are possible, we recommend this approach as the Federation trust settings in the application or in AD FS 2.0 do not have to be changed once they are established. Congratulations! You have now completed a proof of concept for federated, claims-based access to a cloud application hosted in the Windows Azure cloud environment. Additional Considerations for Production Development WIF Session Management in Windows Azure WIF handles sessions transparently, without the need for intervention from the developer. Once the authentication token is received and verified, in the default case a WIF HttpModule saves the claims in a cookie and uses it for the duration of the session. The cookie is protected from reading or tampering through the Data Protection API (DPAPI). One of the defining features of Windows Azure is the ease with which an application can be run on multiple virtual machine (VM) instances behind a virtual load balancer. Securing a session cookie through DPAPI may not work as expected if the application runs on multiple instances: if the instance B serving a request is different from the instance A that created the session cookie earlier, different computer keys on A and B will cause the cookie to be unreadable from instance B. One solution would be to use sticky sessions, but that would not yield to the best possible utilization of a load-balanced
35 environment and is not easy to obtain in Windows Azure. Another solution that would be more suitable for the environment is to secure the cookie with the SSL certificate used by the web role. First, add the following configuration for the service certificate to the Microsoft.IdentityModel section of the application s web.config file. Make sure to use the thumbprint value for the certificate used in the Windows Azure environment: <servicecertificate> <certificatereference x509findtype="findbythumbprint" findvalue="4eb108c4e2dc9e3170f01047c83c f5351"/> </servicecertificate> Next, add the following to the web role s global.asax.cs file: public class Global : System.Web.HttpApplication { protected void Application_Start(object sender, EventArgs e)k { FederatedAuthentication.ServiceConfigurationCreated += OnServiceConfigurationCreated; } void OnServiceConfigurationCreated(object sender, ServiceConfigurationCreatedEventArgs e) { // // Use the <servicecertificate> to protect the cookies that are // sent to the client. // List<CookieTransform> sessiontransforms = new List<CookieTransform>(new CookieTransform[] { new DeflateCookieTransform(), new RsaEncryptionCookieTransform(e.ServiceConfiguration.ServiceCertificate), new RsaSignatureCookieTransform(e.ServiceConfiguration.ServiceCertificate) }); SessionSecurityTokenHandler sessionhandler = new SessionSecurityTokenHandler(sessionTransforms.AsReadOnly());... } e.serviceconfiguration.securitytokenhandlers.addorreplace(sessionhandler); } At the very beginning of the lifecycle of the web role application instance, the method OnServiceConfigurationCreated handles the event that starts when WIF reads its configuration. The first line creates a new set of cookie transforms, based on the web role s certificate as indicated by the WIF
36 configuration. The rest of the handler replaces the default session management logic with one that employs the custom transformation. Summary In this document we have shown how to create a proof of concept that integrates the Windows Azure platform for cloud-based web applications, the WIF for claims-based access control, and AD FS 2.0 that provides identity federation. In this document, we have not fully explored SSO for users, but this is a key benefit of integrating the platform components that have been described. Once a user has authenticated to AD FS 2.0 within a browser session, they will not be prompted to authenticate again when they access federated applications whether they are in the local intranet or hosted in the cloud. This is of great benefit to application users; increasing efficiency, improving security, and generally creating a more efficient and more productive workforce. We have also shown that as you extend the federated, claims-based infrastructure to the cloud, no changes to the basic infrastructure are required. Administrators are, therefore, able to master federation and claim management and be assured that those skills will be applicable to the new application scenarios that internal and external developers will be developing in the future. Furthermore, application logic does not require any changes as applications move from internal locations to the cloud. This allows developers to focus on functionality and provides for the ability to reuse authorization codes across many different applications that serve various business functions. Further Reading and Resources This document describes a basic scenario that can be extended to provide additional functionality. Developers should investigate the following topics to understand the full range of capabilities that are available to federated, claims-based, cloud applications on Windows Azure.: Programming Windows Identity Foundation (Dev - Pro) Book ( Windows Identity Foundation home page ( Developing Applications for the Cloud on the Microsoft Windows Azure Platform ( Moving Applications to the Cloud on the Microsoft Windows Azure Platform ( A Guide to Claims based Identity and Access Control (
37 Federated Authentication in a Windows Azure Web Role Application (hands-on lab) ( Security Best Practices For Developing Windows Azure Applications (
CA Nimsoft Service Desk
CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.
Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,
Creating and Deploying Active Directory Rights Management Services Templates Step-by-Step Guide
Creating and Deploying Active Directory Rights Management Services Templates Step-by-Step Guide Microsoft Corporation Published: January 2008 Author: Brian Lich Editor: Carolyn Eller Abstract This step-by-step
AD RMS Step-by-Step Guide
AD RMS Step-by-Step Guide Microsoft Corporation Published: March 2008 Author: Brian Lich Editor: Carolyn Eller Abstract This step-by-step guide provides instructions for setting up a test environment to
O Reilly Media, Inc. 3/2/2007
A Setup Instructions This appendix provides detailed setup instructions for labs and sample code referenced throughout this book. Each lab will specifically indicate which sections of this appendix must
Configuration Guide. SafeNet Authentication Service AD FS Agent
SafeNet Authentication Service AD FS Agent Configuration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document
MicrosoftDynam ics GP 2015. TenantServices Installation and Adm inistration Guide
MicrosoftDynam ics GP 2015 TenantServices Installation and Adm inistration Guide Copyright Copyright 2014 Microsoft Corporation. All rights reserved. Limitation of liability This document is provided as-is.
Installation Guide. SafeNet Authentication Service
SafeNet Authentication Service Installation Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
Secure IIS Web Server with SSL
Secure IIS Web Server with SSL EventTracker v7.x Publication Date: Sep 30, 2014 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract The purpose of this document is to help
Microsoft Office 365 Using SAML Integration Guide
Microsoft Office 365 Using SAML Integration Guide Revision A Copyright 2013 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete and accurate.
EVault Endpoint Protection 7.0 Single Sign-On Configuration
Revision: This manual has been provided for Version 7.0 (July 2014). Software Version: 7.0 2014 EVault Inc. EVault, A Seagate Company, makes no representations or warranties with respect to the contents
HOTPin Integration Guide: Salesforce SSO with Active Directory Federated Services
1 HOTPin Integration Guide: Salesforce SSO with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided
Windows Azure Pack Installation and Initial Configuration
Windows Azure Pack Installation and Initial Configuration Windows Server 2012 R2 Hands-on lab In this lab, you will learn how to install and configure the components of the Windows Azure Pack. To complete
ADFS for. LogMeIn and join.me authentication
ADFS for LogMeIn and join.me authentication ADFS for join.me authentication This step-by-step guide walks you through the process of configuring ADFS for join.me authentication. Set-up Overview 1) Prerequisite:
ADFS Integration Guidelines
ADFS Integration Guidelines Version 1.6 updated March 13 th 2014 Table of contents About This Guide 3 Requirements 3 Part 1 Configure Marcombox in the ADFS Environment 4 Part 2 Add Relying Party in ADFS
Customizing Remote Desktop Web Access by Using Windows SharePoint Services Stepby-Step
Customizing Remote Desktop Web Access by Using Windows SharePoint Services Stepby-Step Guide Microsoft Corporation Published: July 2009 Updated: September 2009 Abstract Remote Desktop Web Access (RD Web
Microsoft Dynamics GP. Workflow Installation Guide Release 10.0
Microsoft Dynamics GP Workflow Installation Guide Release 10.0 Copyright Copyright 2008 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of
Introduction to Directory Services
Introduction to Directory Services Overview This document explains how AirWatch integrates with your organization's existing directory service such as Active Directory, Lotus Domino and Novell e-directory
Configuring ADFS 3.0 to Communicate with WhosOnLocation SAML
Configuring ADFS 3.0 to Communicate with WhosOnLocation SAML --------------------------------------------------------------------------------------------------------------------------- Contents Overview...
VMware Identity Manager Integration with Active Directory Federation Services 2.0
VMware Identity Manager Integration with Active Directory Federation Services 2.0 VMware Identity Manager J ULY 2015 V 2 Table of Contents Active Directory Federation Services... 2 Configuring AD FS Instance
Microsoft Dynamics GP Release
Microsoft Dynamics GP Release Workflow Installation and Upgrade Guide February 17, 2011 Copyright Copyright 2011 Microsoft. All rights reserved. Limitation of liability This document is provided as-is.
Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x
Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x Sverview Trust between SharePoint 2010 and ADFS 2.0 Use article Federated Collaboration with Shibboleth 2.0 and SharePoint 2010 Technologies
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 May 2015 This guide describes how to configure Microsoft Office 365 for use with Dell One Identity Cloud Access Manager
Enabling Kerberos SSO in IBM Cognos Express on Windows Server 2008
Enabling Kerberos SSO in IBM Cognos Express on Windows Server 2008 Nature of Document: Guideline Product(s): IBM Cognos Express Area of Interest: Infrastructure 2 Copyright and Trademarks Licensed Materials
Configure Microsoft Dynamics AX Connector for Mobile Applications
Microsoft Dynamics AX 2012 Configure Microsoft Dynamics AX Connector for Mobile Applications White Paper April 2013 www.microsoft.com/dynamics/ax Send suggestions and comments about this document to [email protected].
Fairsail. Implementer. Single Sign-On with Fairsail and Microsoft Active Directory Federation Services 2.0. Version 1.92 FS-SSO-XXX-IG-201406--R001.
Fairsail Implementer Microsoft Active Directory Federation Services 2.0 Version 1.92 FS-SSO-XXX-IG-201406--R001.92 Fairsail 2014. All rights reserved. This document contains information proprietary to
Deploying Personal Virtual Desktops by Using RemoteApp and Desktop Connection Step-by-Step Guide
c623242f-20f0-40fe-b5c1-8412a094fdc7 Deploying Personal Virtual Desktops by Using RemoteApp and Desktop Connection Step-by-Step Guide Microsoft Corporation Published: June 2009 Updated: April 2010 Abstract
Test Lab Guide: Creating a Windows Azure AD and Windows Server AD Environment using Azure AD Sync
Test Lab Guide: Creating a Windows Azure AD and Windows Server AD Environment using Azure AD Sync Microsoft Corporation Published: December 2014 Author: Mark Grimes Acknowledgements Special thanks to the
Flexible Identity Federation
Flexible Identity Federation Administration guide version 1.0.1 Publication history Date Description Revision 2015.09.24 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
HOTPin Integration Guide: Google Apps with Active Directory Federated Services
HOTPin Integration Guide: Google Apps with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as
Configuring a SQL Server Reporting Services scale-out deployment to run on a Network Load Balancing cluster
Microsoft Dynamics AX Configuring a SQL Server Reporting Services scale-out deployment to run on a Network Load Balancing cluster White Paper A SQL Server Reporting Services (SSRS) scale-out deployment
Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Tableau Server
SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
Deploying Remote Desktop IP Virtualization Step-by-Step Guide
Deploying Remote Desktop IP Virtualization Step-by-Step Guide Microsoft Corporation Updated: April 2010 Published: July 2009 Abstract Remote Desktop IP Virtualization provides administrators the ability
Setup Guide for AD FS 3.0 on the Apprenda Platform
Setup Guide for AD FS 3.0 on the Apprenda Platform Last Updated for Apprenda 6.0.3 The Apprenda Platform leverages Active Directory Federation Services (AD FS) to support identity federation. AD FS and
Setup Guide Access Manager 3.2 SP3
Setup Guide Access Manager 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
PC-Duo Web Console Installation Guide
PC-Duo Web Console Installation Guide Release 12.1 August 2012 Vector Networks, Inc. 541 Tenth Street, Unit 123 Atlanta, GA 30318 (800) 330-5035 http://www.vector-networks.com Copyright 2012 Vector Networks
Egnyte Single Sign-On (SSO) Configuration for Active Directory Federation Services (ADFS)
w w w. e g n y t e. c o m Egnyte Single Sign-On (SSO) Configuration for Active Directory Federation Services (ADFS) To set up ADFS so that your employees can access Egnyte using their ADFS credentials,
Installing Windows Rights Management Services with Service Pack 2 Step-by- Step Guide
Installing Windows Rights Management Services with Service Pack 2 Step-by- Step Guide Microsoft Corporation Published: October 2006 Author: Brian Lich Editor: Carolyn Eller Abstract This step-by-step guide
Integration Guide. Microsoft Active Directory Rights Management Services (AD RMS) Microsoft Windows Server 2008
Integration Guide Microsoft Active Directory Rights Management Services (AD RMS) Microsoft Windows Server 2008 Integration Guide: Microsoft Active Directory Rights Management Services (AD RMS) Imprint
Single sign-on for ASP.Net and SharePoint
Single sign-on for ASP.Net and SharePoint Author: Abhinav Maheshwari, 3Pillar Labs Introduction In most organizations using Microsoft platform, there are more than one ASP.Net applications for internal
System Administration Training Guide. S100 Installation and Site Management
System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5
Introduction to Mobile Access Gateway Installation
Introduction to Mobile Access Gateway Installation This document describes the installation process for the Mobile Access Gateway (MAG), which is an enterprise integration component that provides a secure
Installation and Configuration Guide
Entrust Managed Services PKI Auto-enrollment Server 7.0 Installation and Configuration Guide Document issue: 1.0 Date of Issue: July 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark
AvePoint Meetings 3.2.2 for SharePoint On-Premises. Installation and Configuration Guide
AvePoint Meetings 3.2.2 for SharePoint On-Premises Installation and Configuration Guide Issued August 2015 Table of Contents About AvePoint Meetings for SharePoint... 4 System Requirements... 5 2 System
NETASQ SSO Agent Installation and deployment
NETASQ SSO Agent Installation and deployment Document version: 1.3 Reference: naentno_sso_agent Page 1 / 20 Copyright NETASQ 2013 General information 3 Principle 3 Requirements 3 Active Directory user
TIBCO Spotfire Web Player 6.0. Installation and Configuration Manual
TIBCO Spotfire Web Player 6.0 Installation and Configuration Manual Revision date: 12 November 2013 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED
360 Online authentication
360 Online authentication Version October 2015 This document will help you set up a trust for authentication of 360 Online users between Azure Access Control Service and either Office 365 or Active Directory
ACTIVID APPLIANCE AND MICROSOFT AD FS
ACTIVID APPLIANCE AND MICROSOFT AD FS SAML 2.0 Channel Integration Handbook ActivID Appliance 7.2 July 2013 Released Document Version 1.0 hidglobal.com Table of Contents 1.0 Introduction...3 1.1 Scope
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
Microsoft Dynamics GP 2013. Web Services Installation and Administration Guide
Microsoft Dynamics GP 2013 Web Services Installation and Administration Guide Copyright Copyright 2013 Microsoft Corporation. All rights reserved. Limitation of liability This document is provided as-is.
DEPLOYMENT GUIDE Version 2.1. Deploying F5 with Microsoft SharePoint 2010
DEPLOYMENT GUIDE Version 2.1 Deploying F5 with Microsoft SharePoint 2010 Table of Contents Table of Contents Introducing the F5 Deployment Guide for Microsoft SharePoint 2010 Prerequisites and configuration
MadCap Software. Upgrading Guide. Pulse
MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished
Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines
Ameritas Single Sign-On (SSO) and Enterprise SAML Standard Architectural Implementation, Patterns and Usage Guidelines 1 Background and Overview... 3 Scope... 3 Glossary of Terms... 4 Architecture Components...
TS Gateway Step-By-Step Guide
TS Gateway Step-By-Step Guide Microsoft Corporation Published: December 2007 Modified: July 2008 Abstract Terminal Services Gateway (TS Gateway) is a new role service available to users of the Microsoft
PingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1
PingFederate Salesforce Connector Version 4.1 Quick Connection Guide 2011 Ping Identity Corporation. All rights reserved. PingFederate Salesforce Quick Connection Guide Version 4.1 June, 2011 Ping Identity
WHITE PAPER Citrix Secure Gateway Startup Guide
WHITE PAPER Citrix Secure Gateway Startup Guide www.citrix.com Contents Introduction... 2 What you will need... 2 Preparing the environment for Secure Gateway... 2 Installing a CA using Windows Server
Getting Started with the Ed-Fi ODS and Ed-Fi ODS API
Getting Started with the Ed-Fi ODS and Ed-Fi ODS API Ed-Fi ODS and Ed-Fi ODS API Version 2.0 - Technical Preview October 2014 2014 Ed-Fi Alliance, LLC. All rights reserved. Ed-Fi is a registered trademark
Veeam Backup Enterprise Manager. Version 7.0
Veeam Backup Enterprise Manager Version 7.0 User Guide August, 2013 2013 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may
XenClient Enterprise Synchronizer Installation Guide
XenClient Enterprise Synchronizer Installation Guide Version 5.1.0 March 26, 2014 Table of Contents About this Guide...3 Hardware, Software and Browser Requirements...3 BIOS Settings...4 Adding Hyper-V
Step-by-Step Guide for Microsoft Advanced Group Policy Management 4.0
Step-by-Step Guide for Microsoft Advanced Group Policy Management 4.0 Microsoft Corporation Published: September 2009 Abstract This step-by-step guide describes a sample scenario for installing Microsoft
SAML 2.0 Configurations at SAP NetWeaver AS ABAP and Microsoft ADFS
SAML 2.0 Configurations at SAP NetWeaver AS ABAP and Microsoft ADFS Applies to: SAP Gateway 2.0 Summary This guide describes how you install and configure SAML 2.0 on Microsoft ADFS server and SAP NetWeaver
Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER
Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER Table of Contents Introduction.... 3 Requirements.... 3 Horizon Workspace Components.... 3 SAML 2.0 Standard.... 3 Authentication
Deploying Remote Desktop Web Access with Remote Desktop Connection Broker Step-by- Step Guide
Deploying Remote Desktop Web Access with Remote Desktop Connection Broker Step-by- Step Guide Microsoft Corporation Updated: April 2010 Published: May 2009 Abstract RemoteApp and Desktop Connection provides
Entrust Managed Services PKI. Configuring secure LDAP with Domain Controller digital certificates
Entrust Managed Services Entrust Managed Services PKI Configuring secure LDAP with Domain Controller digital certificates Document issue: 1.0 Date of issue: October 2009 Copyright 2009 Entrust. All rights
Security Assertion Markup Language (SAML) Site Manager Setup
Security Assertion Markup Language (SAML) Site Manager Setup Trademark Notice Blackboard, the Blackboard logos, and the unique trade dress of Blackboard are the trademarks, service marks, trade dress and
AD FS 2.0 Step-by-Step Guide: Federation with Ping Identity PingFederate
AD FS 2.0 Step-by-Step Guide: Federation with Ping Identity PingFederate Ping Identity Corporation and Microsoft Corporation Published: November 2010 Version: 1.0 Author: Dave Martinez, Principal, Martinez
CA NetQoS Performance Center
CA NetQoS Performance Center Install and Configure SSL for Windows Server 2008 Release 6.1 (and service packs) This Documentation, which includes embedded help systems and electronically distributed materials,
Introduction to the EIS Guide
Introduction to the EIS Guide The AirWatch Enterprise Integration Service (EIS) provides organizations the ability to securely integrate with back-end enterprise systems from either the AirWatch SaaS environment
Setup Guide Access Manager Appliance 3.2 SP3
Setup Guide Access Manager Appliance 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS
Customer Tips. Xerox Network Scanning HTTP/HTTPS Configuration using Microsoft IIS. for the user. Purpose. Background
Xerox Multifunction Devices Customer Tips June 5, 2007 This document applies to these Xerox products: X WC Pro 232/238/245/ 255/265/275 for the user Xerox Network Scanning HTTP/HTTPS Configuration using
PingFederate. IWA Integration Kit. User Guide. Version 3.0
PingFederate IWA Integration Kit Version 3.0 User Guide 2012 Ping Identity Corporation. All rights reserved. PingFederate IWA Integration Kit User Guide Version 3.0 April, 2012 Ping Identity Corporation
SafeNet Authentication Service
SafeNet Authentication Service Push OTP Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have
Deploying RSA ClearTrust with the FirePass controller
Deployment Guide Deploying RSA ClearTrust with the FirePass Controller Deploying RSA ClearTrust with the FirePass controller Welcome to the FirePass RSA ClearTrust Deployment Guide. This guide shows you
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
Mobility Manager 9.0. Installation Guide
Mobility Manager 9.0 Installation Guide LANDESK MOBILITY MANAGER Copyright 2002-2012, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or
NSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
Application Notes for Microsoft Office Communicator Clients with Avaya Communication Manager Phones - Issue 1.1
Avaya Solution & Interoperability Test Lab Application Notes for Microsoft Office Communicator Clients with Avaya Communication Manager Phones - Issue 1.1 Abstract These Application Notes describe the
Special thanks to the following people for reviewing and providing invaluable feedback for this document: Joe Davies, Bill Mathers, Andreas Kjellman
Test Lab Guide: Creating a Microsoft Azure Active Directory and Windows Server Active Directory Environment using Microsoft Azure Active Directory Sync Services Microsoft Corporation Published: December
Business Portal for Microsoft Dynamics GP 2010. Field Service Suite
Business Portal for Microsoft Dynamics GP 2010 Field Service Suite Copyright Copyright 2010 Microsoft. All rights reserved. Limitation of liability This document is provided as-is. Information and views
Authoring for System Center 2012 Operations Manager
Authoring for System Center 2012 Operations Manager Microsoft Corporation Published: November 1, 2013 Authors Byron Ricks Applies To System Center 2012 Operations Manager System Center 2012 Service Pack
Kentico CMS 7.0 Windows Azure Deployment Guide
Kentico CMS 7.0 Windows Azure Deployment Guide 2 Kentico CMS 7.0 Windows Azure Deployment Guide Table of Contents Introduction 4... 4 About this guide Installation and deployment 6... 6 Overview... 6 Architecture...
WhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
SURFconext for SharePoint 2010 Setup guide
SURFconext for SharePoint 2010 Setup guide 2AT b.v. May 2012 Author: Beat Nideröst 1 Contents Contents... 2 Introduction... 4 1 Objectives of this guide... 4 2 How to read this guide... 4 Part 1 - Overview
Installing and Configuring vcenter Multi-Hypervisor Manager
Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1 This document supports the version of each product listed and supports all subsequent
Using SAML for Single Sign-On in the SOA Software Platform
Using SAML for Single Sign-On in the SOA Software Platform SOA Software Community Manager: Using SAML on the Platform 1 Policy Manager / Community Manager Using SAML for Single Sign-On in the SOA Software
Single Sign-on (SSO) technologies for the Domino Web Server
Single Sign-on (SSO) technologies for the Domino Web Server Jane Marcus December 7, 2011 2011 IBM Corporation Welcome Participant Passcode: 4297643 2011 IBM Corporation 2 Agenda USA Toll Free (866) 803-2145
Windows Server Update Services 3.0 SP2 Step By Step Guide
Windows Server Update Services 3.0 SP2 Step By Step Guide Microsoft Corporation Author: Anita Taylor Editor: Theresa Haynie Abstract This guide provides detailed instructions for installing Windows Server
Configuring Single Sign-On from the VMware Identity Manager Service to Office 365
Configuring Single Sign-On from the VMware Identity Manager Service to Office 365 VMware Identity Manager JULY 2015 V1 Table of Contents Overview... 2 Passive and Active Authentication Profiles... 2 Adding
Installing Policy Patrol on a separate machine
Policy Patrol 3.0 technical documentation July 23, 2004 Installing Policy Patrol on a separate machine If you have Microsoft Exchange Server 2000 or 2003 it is recommended to install Policy Patrol on the
Synchronizer Installation
Synchronizer Installation Synchronizer Installation Synchronizer Installation This document provides instructions for installing Synchronizer. Synchronizer performs all the administrative tasks for XenClient
Building a Scale-Out SQL Server 2008 Reporting Services Farm
Building a Scale-Out SQL Server 2008 Reporting Services Farm This white paper discusses the steps to configure a scale-out SQL Server 2008 R2 Reporting Services farm environment running on Windows Server
Setup Guide: Server-side synchronization for CRM Online and Exchange Server
Setup Guide: Server-side synchronization for CRM Online and Exchange Server Version 8.0 Microsoft Dynamics CRM 2016 Authors: Elad Ben Yosef, Sumanta Batabyal This document is provided "as-is". Information
AD RMS Windows Server 2008 to Windows Server 2008 R2 Migration and Upgrade Guide... 2 About this guide... 2
Contents AD RMS Windows Server 2008 to Windows Server 2008 R2 Migration and Upgrade Guide... 2 About this guide... 2 Preparing for the migration or upgrade of an AD RMS cluster... 2 Checklist: Preparing
How To Take Advantage Of Active Directory Support In Groupwise 2014
White Paper Collaboration Taking Advantage of Active Directory Support in GroupWise 2014 Flexibility and interoperability have always been hallmarks for Novell. That s why it should be no surprise that
PingFederate. IWA Integration Kit. User Guide. Version 2.6
PingFederate IWA Integration Kit Version 2.6 User Guide 2012 Ping Identity Corporation. All rights reserved. PingFederate IWA Integration Kit User Guide Version 2.6 March, 2012 Ping Identity Corporation
Installation Guide for Pulse on Windows Server 2008R2
MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
Microsoft Dynamics CRM Server 2011 software requirements
Microsoft Dynamics CRM Server 2011 software requirements This section lists the software and application requirements for Microsoft Dynamics CRM Server 2011. Windows Server operating system: Microsoft
SPHOL325: SharePoint Server 2013 Search Connectors and Using BCS
2013 SPHOL325: SharePoint Server 2013 Search Connectors and Using BCS Hands-On Lab Lab Manual This document is provided as-is. Information and views expressed in this document, including URL and other
CA Technologies SiteMinder
CA Technologies SiteMinder Agent for Microsoft SharePoint r12.0 Second Edition This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to
Reference and Troubleshooting: FTP, IIS, and Firewall Information
APPENDIXC Reference and Troubleshooting: FTP, IIS, and Firewall Information Although Cisco VXC Manager automatically installs and configures everything you need for use with respect to FTP, IIS, and the
