top of page
eabaffipalubhols

Configuring Load Balancing and Firewalls for AD FS 2.0 Proxy



If I specify original ADFS server (not proxy) for this link, everything is fine, the correct xml is returned. Actually, for ADFS proxy I get 403 Forbidden for any request to the following listeners (if I hit them in IE) regardless of whether they are allowed for ADFS proxy or not:


I also received this error message: The federation server proxy was not able to retrieve the list of endpoints from the Federation Service at [adfs_server_name]. The error message is 'Error reading the C:\Program Files\Active Directory Federation Services 2.0\PT directory.'.




How to install adfs 2 0 proxy server



After you configure a computer with the prerequisite applications and certificates, you are ready to install the Federation Service Proxy role service of Active Directory Federation Services (AD FS). You can use the following procedure to install the Federation Service Proxy role service. When you install the Federation Service Proxy role service on a computer, that computer becomes a federation server proxy.


After you verify the information on the Confirm installation selections page, select the Restart the destination server automatically if required check box, and then click Install.


Today, while attempting to get them to set up a DMZ for me to install my ADFS proxy server, the consultent attempted to convinve me to just have them open up port 443 directly to the ADFS server, and to not use a proxy at all. He told me that such a configuration was standard practice now.


Depends on what this consultant is doing though.If they handle the firewall in front of the ADFS server with something like TMG, then it is able to perform the role of the proxy and present a webforms auth to an external client instead of just opening a hole directly to 443 on the internal ADFS 2.0 server.


The AD FS 2.0 Proxy is not a requirement for using AD FS; it is an additional feature. The reason you would install an AD FS 2.0 Proxy is you do not want to expose the actual AD FS 2.0 server to the Internet. AD FS 2.0 servers are domain joined resources, while the AD FS 2.0 Proxy does not have that requirement. If all your users and applications are internal to your network, you do not need to use an AD FS 2.0 Proxy. If there is a requirement to expose your federation service to the Internet, it is a best practice to use an AD FS 2.0 Proxy.


In order to understand how the proxy works, it is important to understand the basic traffic flow for a token request. I will be using a simple example where there is a single application (relying party) and a single federation server (claims provider). Below you will see an explanation of the traffic flow for an internal user and for an external user in a WS-Federation Passive flow example.


Configuring DNS is a very important step in this process. Applications, services, and other federation service providers do not know if there is a proxy server, so all redirects to the federation server will have the same DNS name (ex: ) which is also the federation service name. See this article for guidance on selecting a Federation Service Name. It is up to the administrator to configure the internal DNS to point to the IP address of the internal AD FS server or internal AD FS server farm load balancer, and configure the public DNS to point to the IP address of the AD FS 2.0 Proxy Server or AD FS Proxy server farm load balancer. This way, internal users will directly contact the AD FS server, and external users will hit the AD FS 2.0 proxy, which brokers the connection to the AD FS server. If you do not have a split-brain DNS environment, it is acceptable and supported to use the HOSTS file on the proxy server to point to the internal IP address of the AD FS server.


The internal AD FS server can have a certificate issued by your enterprise CA (or public authority), and should have a subject name that is the same as the Federation Service Name/DNS name that it is accessed with. Using Subject Alternative Names (SAN) and wildcards are supported as well. The AD FS 2.0 proxy needs to have an SSL certificate with the same subject name. Typically, you want this certificate to be from a public authority that is trusted and a part of the Microsoft Root Certificate Program . This is important because external users may not inherently trust your internal enterprise CA. This article can step you through replacing the certificates on the AD FS 2.0 server.


The proxy trust token has a configurable lifetime, and is self-maintained by the proxy and the federation service. The only time you need to touch it is if a server is lost or you need to revoke the proxy trust.


In Part 1 we installed the internal AD FS Server, to publish these federation services to the internet, now we also need to install an AD FS Reverse Proxy server in our perimeter network.


Install the Federation Service Proxy Role Service -us/windows-server/identity/ad-fs/deployment/install-the-federation-service-proxy-role-serviceTo install the Federation Service Proxy role service using PowerShell -us/windows-server/identity/ad-fs/deployment/install-the-federation-service-proxy-role-service#to-install-the-federation-service-proxy-role-service-using-powershellInstall-WindowsFeature Web-Application-Proxy -IncludeManagementTools


NOTE: Prior to writing this article I had only found limited documentation provided by Microsoft on a proper upgrade path for this. Since then, it apperas that tools had been included with the Server 2012 installation media which will greatly cutdown on the number of steps needed as well as provide as little downtime as possible. I would highly recommend giving this article a read before proceeding with my article: -to-build-your-adfs-lab-part4-upgrading-to-server-2012-r2.aspx


Resolution: Make sure you update the DNS records of your ADFS deployment to point to your new ADFS server. Both the ADFS proxy and ADFS server must be running the same OS version (in this case, Server 2012 R2).


We like to " migrate" to ADFS 3.0 so I configured ADFS 3.0 on two servers with NLB succesfully and started to configure ADFS proxy.Before we go live and change the DNS we like to set it up and do some testing using host files. which are in place.


User ActionEnsure that the credentials being used to establish a trust between the federation server proxy and the Federation Service are valid and that the Federation Service can be reached.----


Cerificates are in place but no bindings since ADFS 3.0 on server 2012 R2 is not using IIS. The adfs account is in the local admin group of the on-premise server and ADFS service is also running under this account. I can ping all servers as well as de federated service name.


There is a step where you need to enter credentials of a service account you created on the domain to communicate between the proxy and the ADFS server on your internal network. I would verify that the account is unlocked and the password has not expired. If both of those are true, you may need to uninstall the proxy role, reinstall it, and go through the wizard again to configure this account.


All configuration we currently have on our ADFS 2.0 will be the same on the new ADFS 3.0 environment.Only the new on premise and proxy server names for adfs 3.0 are different and we use of course another SQL server with the default database name.


My client has 2 ADFS 2.0 servers, primary and secondary on 2008R2. They built a new datacenter, and want to have the ADFS servers relocated there, and want to go to 3.0 What i need clarity is,If i install server 2012 with ADFS3.0, do i have to upgrade the production active directory schema to support 2012 server? ADPREP/FORESTPREPIf yes, we will not go that route.So then can I download ADFS 2.1, and build 2 new ADSF servers on 2008R2, and install 2.1 on those, promote 1 to primary, then decommission the others. From what im reading, 2.1 is only available on 2012 server


I have a question. We have a client with a Server 2008R2 ADFS 2.0 installed (1 single server). We now want to upgrade to server 2012 ADFS 3.0. Is it possible to leave the 2008R2 intact but turn it off so that there is a cold copy when the new server gives some troubles. So there is Always 1 server from the clients site. When the new server is down we want to able to startup the old one, so that there is minimal user impact.


Firstly, of course, you need to build a Windows Server 2016 server and join it to your domain. Current best practice suggests that ADFS should be sitting on a domain controller, which is something that will complicate a migration like this one, but I will skip around that for now; for the purposes of this article, both the Windows 2012 (ADFS 2.1) server and the Windows 2016 (ADFS 4.0) server are domain members. You will also need the Windows 2016 install media available to be mounted on both the ADFS 2.1 and ADFS 4.0 servers.


Understand that ADFS 4.0 is very different in its requirements from ADFS 2.1; it no longer uses IIS, so this should not be installed as a prerequisite for ADFS on the new server. ADFS 4.0 should be published to the world via a Windows Server Web Application Proxy server, which can work as both a secure/hardened endpoint to publish your ADFS service to the world and also (as the name implies) a reverse proxy for publishing internal servers to the outside world, which gives you the ability to enable SSO for all the services published via the Web Application Proxy fairly painlessly. Windows Web Application Proxy is a component of the Remote Access Windows Server role.


e.g. if my ADFS 2.1 server has a host name of adfs.thingydo and my ADFS federation farm name is adfs.thingydo.itsalwaysmyproblem.com then I will need to edit c:\windows\system32\drivers\etc\hosts on the server to point all traffic for adfs.thingydo.itsalwaysmyproblem.com to the ADFS 4.0 server, and I will probably also need to check and tidy up SPNs when I decommission the ADFS 2.1 server. 2ff7e9595c


0 views0 comments

Recent Posts

See All

Comments


bottom of page