Your SlideShare is downloading. ×
  • Like
T28   implementing adfs and hybrid share point
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Now you can save presentations on your phone or tablet

Available for both IPhone and Android

Text the download link to your phone

Standard text messaging rates apply

T28 implementing adfs and hybrid share point

  • 222 views
Published

European SharePoint Conference 2014 in Barcelona. …

European SharePoint Conference 2014 in Barcelona.

Presentation Description:
In this session we look at modern forms of authentication . We’ll cover Windows Server Active Directory Federation Services (ADFS) concepts and look at federation with SharePoint. There are a number of difficulties that you’ll need to overcome implementing SAML claims with SP, for example people picker, user profile import, problematic use of some SharePoint apps. We’ll also cover the infrastructure side like making it work with host named site collections, reverse proxy servers and other user directories. Moving to the cloud we’ll look at the authentication architecture of the standards employed; like OAUTH, WS-* and OpenID Connect.

Presentation Benefit
Get a better understanding of Windows Server Active Directory Federation Services (ADFS) concepts and SAML claims connection with SharePoint.

You will learn...

Understand authentication architecture and standards employed.
ADFS concepts
How to implement SAML claims

Published in Software , Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
222
On SlideShare
0
From Embeds
0
Number of Embeds
2

Actions

Shares
Downloads
11
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide
  • welcome. Click slide
  • Takethe Picture
  • Hands up IT-pro or IT-dev, BI/Business (great) , ADFS 2.0 or 3.0, Is it a great first day -?
  • Subject: anythingthatneeds to be identified (authenticated) aka. principal/userAuthentication (AuthN): The processofestablishingidentity, preferably mutual. This requiresproof, usually in the form ofcredentials. Authorization (AuthZ): Determining, and granting or denyingaccess to resources for subjectImpersonation: A service canact as theuserwhileperforming an action onthe same server the service is hostedonDelegation: A service canact as theuserwhileperforming an action hostedonanother server Profile store: Service/appprofileinformationwith an immutable ID for eachsubject
  • There are a variety of specifications associated with web services. These specifications are in varying degrees of maturity and are maintained or supported by various standards bodies and entities. These variety of specifications are the basic web services framework established by first-generation standards represented by WSDL, SOAP, and UDDI.[1] Specifications may complement, overlap, and compete with each other. Web service specifications are occasionally referred to collectively as "WS-*", though there is not a single managed set of specifications that this consistently refers to, nor a recognized owning body across them all.“WS-“is a prefix used to indicate specifications associated with Web Services and there exist many WS* standards including WS-Addressing, WS-Discovery, WS-Federation, WS-Policy, WS-Security, and WS-Trust.[2] This page includes many of the specifications that might be considered a part of "WS-*".
  • OpenID is an open standard that allows users to be authenticated by certain co-operating sites (known as Relying Parties or RP) using a third party service, eliminating the need for webmasters to provide their own ad hoc systems and allowing users to consolidate their digital identities.[1]
  • OAuth began in November 2006 when Blaine Cook was developing the TwitterOpenID implementation. Meanwhile, Ma.gnolia needed a solution to allow its members with OpenIDs to authorize Dashboard Widgets to access their service. Cook, Chris Messina and Larry Halff from Magnolia met with David Recordon to discuss using OpenID with the Twitter and Ma.gnolia APIs to delegate authentication. They concluded that there were no open standards for API access delegation.OAuth 2.0 is the next evolution of the OAuth protocol and is not backwards compatible with OAuth 1.0. OAuth 2.0 focuses on client developer simplicity while providing specific authorization flows for web applications, desktop applications, mobile phones, and living room devices. The specification and associated RFCs are developed by the IETF OAuth WG;[4] the main framework was published in October 2012. (It was expected to be finalized by the end of 2010, according to Eran Hammer.[5] However, due to discordant views about the evolution of OAuth, Hammer left the working group.[6])Facebook's new Graph API only supports OAuth 2.0.[7]Google supports OAuth 2.0 as the recommended authentication mechanism for all of its APIs.[8] As of 2011 Microsoft[9] has added OAuth 2.0 experimental support to their APIs.The OAuth 2.0 Framework[10] and Bearer Token Usage[11] were published in October 2012. Other documents are still being worked on within the OAuth working group.
  • Anonymous • Not technicallyclientauthentication • Basic • Part of HTTP 1.0 spec • Ubiquitous support • Server knowstheusername/password • NTLM/Kerberos (WIA) • Cannottraversefirewalls or proxies • Forms basedAuthN • Authenticationhappensindependentof transfer protocol • Authenticationimplemented in theapplication • Occursafter IIS authentication
  • From wikipediaEducation[edit]Wheeler was born in Birmingham and gained a scholarship at Trinity College, Cambridge to read the Cambridge Mathematical Tripos, graduating in 1948.[14] He completed the world's first[citation needed] PhD in computer science in 1951.[15]Career[edit]Wheeler's contributions to the field included work on the EDSAC[16] and the Burrows–Wheeler transform. Along with Maurice Wilkes and Stanley Gill he is credited with the invention of the subroutine (which they referred to as the closed subroutine), a predecessor of the infamous goto statement;[5] as a result, the jump to subroutine instruction is often called Wheeler Jump. He was responsible for the implementation of the CAP computer, the first to be based on security capabilities. In cryptography, he was the designer of WAKE and the co-designer of the TEA and XTEA encryption algorithms together with Roger Needham.Wheeler married Joyce Blackler in August 1957, who herself used EDSAC for her own mathematical investigations as a research student from 1955. He became a Fellow of Darwin College, Cambridge in 1964 and formally retired in 1994, although he continued to be an active member of the University of CambridgeComputer Laboratory until his death. In 1994 he was inducted as a Fellow of the Association for Computing Machinery. In 2003 he was a Computer History Museum Fellow Award recipient. The Computer Laboratory at the University of Cambridge annually holds the "Wheeler Lecture", a series of distinguished lectures named after him.[17]Wheeler is often quoted as saying "All problems in computer science can be solved by another level of indirection."[18] Another quotation attributed to him is "Compatibility means deliberately repeating other people's mistakes
  • • • • Abstractionlayer (indirection) A claim is an authoritative statement about a subjectmade by an entity A claimcan be anything (not just securityinformation) thatcan be associatedwith a subject • • • • • • • • XML or binary fragments constructedaccording to somesecurity standard Digitallysigned • • • • • • Name Age Group membershipRole SAML (Security AssertionMarkup Language) JWT (JSON Web Token) SWT (Simple Web Token) • Usuallyimplementedwith digital certificates A claim is alwaysassociatedwiththeentitythatissued it Thereareseveralclaim standards Claimsarestored and transmitted in security tokens Thereareseveral token formats Claimsbasedidentityrequires a trust modelClaims-based identity is a common way for applications to acquire the identity information they need about users inside their organization, in other organizations, and on the Internet.[1] It also provides a consistent approach for applications running on-premises or in the cloud.The key strength of claims-based identity is that it abstracts the individual elements of identity and access control into two parts; a single, general notion of claims and the concept of an issuer or an authority.[2]A claim is a statement that one subject, such as a person or organization, makes about itself or another subject. For example the statement can be about a name, group, buying preference, ethnicity, privilege, association or capability. The subject making the claim or claims is the provider. Claims are packaged into one or more tokens that are then issued by an issuer (provider), commonly known as a Security Token Service (STS).[2]
  • Claims-based identity is a common way for applications to acquire the identity information they need about users inside their organization, in other organizations, and on the Internet.[1] It also provides a consistent approach for applications running on-premises or in the cloud.The key strength of claims-based identity is that it abstracts the individual elements of identity and access control into two parts; a single, general notion of claims and the concept of an issuer or an authority.[2]A claim is a statement that one subject, such as a person or organization, makes about itself or another subject. For example the statement can be about a name, group, buying preference, ethnicity, privilege, association or capability. The subject making the claim or claims is the provider. Claims are packaged into one or more tokens that are then issued by an issuer (provider), commonly known as a Security Token Service (STS).[2]
  • SAML-Basedclaimsauthenticationprocess for SharePoint 2013Security AssertionMarkup Languagehttp://en.wikipedia.org/wiki/Saml
  • WHY ADFSNatural candidate for SharePointSupports the necessary standardsIntegration with Active DirectoryOften used as a go-betweenPowerful capabilitiesFree with Windows Server licenseSolutions on the market:CA SiteMinderShibollethOracle Access ManagerIBM Tivoli Access ManagerActive Directory Federation ServicesCustom solutions using WIF
  • Edge FireWall –not recommended.
  • Adminenabled e-mail for thatcertificateapprover e-mail.RP=Relaying Party
  • Consideraddroles and featurespic, server manager dashboard
  • Apearwithout KDR, set -spn
  • DNS onthe AD DS, A record, not C-name
  • https://fs3.vaerpn.com/federationmetadata/2007-06/federationmetadata.xmlhttps://fs3.vaerpn.com/adfs/ls/IDPInitiatedSignon.aspx
  • Animation: Copy to file, export

Transcript

  • 1. Implementing ADFS and Hybrid SharePoint Thorbjørn Værp
  • 2. About me Thorbjørn Værp Principal Consultant Puzzlepart Kristiansand, Norway www.Sharepoint13.net | @vaerpn Celebrating 21 years IT-pro, 11 of them in SP MCT | XVC #ESPC14
  • 3. Agenda • History • Claims-based authentication • ADFS & SharePoint 2013
  • 4. HISTORY
  • 5. A Web service is a method of communications between two electronic devices over a network. It is a software function provided at a network address over the web with the service always on as in the concept of utility computing.
  • 6. An open standard for authentication Similar architecture to WS-* OpenID authentication used by PayPal, Google, VeriSign, Twitter +
  • 7. An open standard for authorization Method for clients to access server resources on behalf of a resource owner Oauth has no signing or encryption (it relies only on ssl for opacity) Wide adoption, Facebook, Microsoft, Two version, 1.0 & 2.0 –no backwards compability.
  • 8. Traditional authentication mechanisms • Anonymous • Basic • NTLM / Kerberos (WIA) • Forms based AuthN
  • 9. The problem with authentication • Current technologies do not work well on the Internet (NTLM, Kerberos etc.) – Basic is the only authentication mechanism that was part of the HTTP (1.0), all the others are bolted on • Several and different user stores (AD, LDAP, eDir) • Relies on your particular platform • Authentication had to be handled and understood by the developers, whose time is better spent developing the application • Each new authentication scheme required chaning the code
  • 10. Claims-based identity
  • 11. What is claims-based identity? • Abstraction layer (indirection) • A claim is an authoritative statement about a subject made by an entity • A claim can be anything (not just security information) that can be associated with a subject – Name | Age | Group membership | Role • A claim is always associated with the entity that issued it • There are several claim standards • Claims are stored and transmitted in security tokens
  • 12. What is claims based identity? – XML or binary fragments constructed according to some security standard – Digitally signed • There are several token formats • SAML (Security Assertion Markup Language) JWT (JSON Web Token) SWT (Simple Web Token) • Claims based identity requires a trust model – Usually implemented with digital certificates
  • 13. Claims in SharePoint 2013 3 types of claim providers Windows Trusted Provider (SAML) Forms Based AuthN Multiple AuthN providers possible in the same zone Classic mode only via PowerShell
  • 14. Claims in SharePoint 2013 • SP 2013 has its own STS implementation • The SP 2013 Federation Metadata is in JSON, not XML • Both Classic authentication mode (WIA) and claims mode (WIA/FBA/SAML) is supported, but claims is the default • In claims mode every form of AuthN is transformed to a SAML token
  • 15. SAML-based Claims in SP2013
  • 16. Authentication process
  • 17. Authentication process
  • 18. Authentication process
  • 19. Authentication process
  • 20. Authentication process
  • 21. Authentication process
  • 22. Authentication process
  • 23. ADFS & SharePoint 2013
  • 24. Grocery list • 4 Public Certificates + (eg.RapidSSL) • Fs3.vaerpn.com • Sp.vaerpn.com • Tokensign.vaerpn.com • Decrypt.vaerpn.com • Reverse proxy, (WEP, F5, Netscaler, Azure Endpoints,) • Update public DNS • Update internal DNS • ADFS server, one or more • SharePoint 2013
  • 25. Step by Step The Environment • We got AD with a routable domain | vaerpn.com, externaly registered. • Enterprise Admin access AD DS & available admin e-mail • SP 2013 with SQL server • Firewall/ReverseProxy or Azure • One or more Win2012 R2 domain joined servers to add ADFS 3.0 Role What to do: 1.Get those Certificates, 2. Add ADFS Role, 3. Configure ADFS & Certificates 4. Configure Claim Rule, 5: Add RelayingParty Identifier, 6. Create & Connect SP Trusted Identity Provider
  • 26. Repeat until you have 4 certificates adfs.vaerpn.com -> for ADFS service signing.vaerpn.com ->for token signing decrypt.vaerpn.com ->for decrypt (not used by SP but a prereq) sp.vaerpn.com ->for SSL on SharePoint web app (one pr.web app)
  • 27. • Copy this to the SharePoint WFE
  • 28. -> Run this -> Check this
  • 29. Wrap Up History WS-*, OpenID, OpenAuth, David Wheeler "All problems in computer science can be solved by another level of indirection." Claims A claim is an authoritative statement about a subject made by an entity. In claims mode every form of AuthN is transformed to a SAML token ADFS & SharePoint 2013 ADFS 3.0 no IIS. Always use public certificates, plan stuff, Must use PowerShell
  • 30. #ESPC14