Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

ADFS (Active Directory Federation Service) Advice

Posted on 2013-05-12
3
Medium Priority
?
640 Views
Last Modified: 2014-04-25
Hi guys,

I hope you are all well and can assist.
We are investigating solutions for federated single sign-on.
One of these solutions we are researching is ADFS.
We are very shallow in terms of knowledge on what is required from an ADFS point of view.

One question I have is this.

I am not sure at present, if both the Identity Provider and the Service Provider, need to have the same federated SSO implementations in order for them to have federated SSO capability.

For example, if Company A were to use ADFS with SAML 2.0, and Company B used F5, would they still be able practise federated SSO, or do both ends need to be for example, ADFS?

Are you guys able to shed some light on this?

Any help greatly appreciated.
0
Comment
Question by:Simon336697
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 33

Accepted Solution

by:
Busbar earned 2000 total points
ID: 39161310
the F5 side must be able to redirect the users and consume the ADFS claims, if it can then it will work.
0
 
LVL 1

Author Comment

by:Simon336697
ID: 39163294
Hi busbar.
Thanks so much for your kind response.

When you say it must be able to consume and redirect the users, does that meand that Company B would still have to have an ADFS Server, so that the F5 could redirect the users to this ADFS server?
0
 
LVL 33

Expert Comment

by:Busbar
ID: 39213898
yes
0

Featured Post

Has Powershell sent you back into the Stone Age?

If managing Active Directory using Windows Powershell® is making you feel like you stepped back in time, you are not alone.  For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
How to deal with a specific error when using the Enable-RemoteMailbox cmdlet to create a mailbox in the cloud-based service, for an existing user in an on-premises Active Directory.
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

609 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question