Celebrate National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

ADFS high availability

Posted on 2013-05-13
1
Medium Priority
?
580 Views
Last Modified: 2013-05-31
I would like to set up ADFS in a highly available manner and have some questions.

1. Is it possible to install the ADFS components on two DCs use NLB to load balance across them (the goal is to do this on just two servers)? The servers that will be able to access ADFS will be locked down so I'm not worried about the security implications of having ADFS on the DC itself.
2. If I do this, do I need to set up some form of SQL clustering/mirroring? I see some references to this in the ADFS documentation and blogs but do not fully understand what is required here.

Thanks!
0
Comment
Question by:Julian123
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 35

Accepted Solution

by:
Seth Simmons earned 2000 total points
ID: 39163627
1) yes
2) no; i guess you could but not required.  only requirement is that sql instance is not on any adfs node

http://technet.microsoft.com/en-us/library/dd807062%28v=ws.10%29.aspx
0

Featured Post

Does Powershell have you tied up in knots?

Managing Active Directory does not always have to be complicated.  If you are spending more time trying instead of doing, then it's time to look at something else. For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

There are times when we need to generate a report on the inbox rules, where users have set up forwarding externally in their mailbox. In this article, I will be sharing a script I wrote to generate the report in CSV format.
Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

730 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question