Section 3 - Chapter 17 Flashcards
AD FS - Federation Service
Created by servers that share a trust policy
AD FS - Federation Service Proxy
Server sits in perimeter, passes info from user’s browser to the federation service
AD FS - 3 Architectural Designs
Federated Web SSO - links apps contained within an extranet in resource orgs to internal directory store of accounts org
Web SSO - used when users do not have AD DS accounts
Federation with Cloud Services - access to cloud-based services
AD FS - Account Federation Server
Server that is hosted in the account orgs internal network
Performs claims mapping and issues tokens
Authenticates user
Extracts federation attributes and group membership for attribute store
Creates claim
Generates and signs security token
AD FS - Configuration db
db stores config data for AD FS instance or Federation Service
SQL (all read/write), 2005 or later, fsconfig.exe to create, located centrally, no need to place on federation server, auto discard token replays when detected
or
WID (first primary read/write, all others read), AD FS Fed Server Config Wiz, stand alone or farm deployment
AD FS - Identity Metasystem Interoperability Protocol (IMIP)
Outlines how to provision Information Cards
AD FS - Information Cards
Digital Identities
Managed - issued by claims providers
Personal - issued by users themselves
AD FS - Information Card Group Policies
Two GPOs that outline how to provision and how to use Information Cards in AD DS
AD FS - Security Assertion Markup Language (SAML)
Web SSO protocol that outlines http web browser redirects to exchange assertion data used to authenticate and authorize clients across firewalls
AD FS - SAML Security Token
Special data format used to exchange claims between claims providers and relying parties
AD FS WS-Federation
Web server specification outlines standards to be used when implementing federation
AD FS Components
Attribute Store - db or directory, stores user accounts and attributes
AD FS Config db - scope of a single instance
Claims
Claim Rules
AD FS Claims Value and Sources
AD FS supports access to apps thru generation of claims
Value sourced thru attribute store or transformed into another by applying a rule
Supported: UPN, email, common name, group membership, private personal identifiers, SAML name identifiers, user account or group account SIDs, Windows account names
AD FS - Claim Rules
Business logic that takes incoming claims, applies conditions and generates outgoing claims
Processed thru claims engine
Support permission or dential of access to resources within the Federation Service
Processing: passed thru as is, filtered to specific condition, transformed to new claim
AD FS - Claims Templates
Pass thru or filter incoming claim
Transform incoming claim
Send LDAP attributes as claim
Send group membership as claim
Send claims using custom rules
Permit or deny users based on incoming claims
Permit all users