Solved

ADFS 3.0 with a One-Way Forest Trust

Posted on 2016-10-05
1
294 Views
Last Modified: 2016-10-10
Dear Experts,

I am hoping for some advice if the below setup is possible. In short ADFS 3.0 is to be used for SSO for a 3rd party internal application across two forests where a one-way trust exists (Forest A trusts Forest B), accounts in both forests require SSO access.

Environment Summary:
Forest A trusts Forest B via a one-way AD trust
Forest B DOES NOT trust Forest A
ADFS host is a member of Forest A
ADFS service account is a member of Forest B
No external access to the ADFS farm is provided or required (No WAP)
3rd party internal application is using SAML 2.0

Scenario:
Users from “Forest B” can authenticate and logon to the 3rd Party application without issue, Users from “Forest A” get IE authentication prompts. When changing the service account used by ADFS to an account in “Forest A” users from “Forest A” can logon successfully but then users from “Forest B” cannot, this is understandable as the service account in “Forest A” has no access to Forest B. However, I can’t understand why this setup would not work when the service account is setup with an account from “Forest B” as that account has access via the trust to Forest A.

Any help is appreciated.
0
Comment
Question by:Box57l
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 4

Accepted Solution

by:
Belal Khallad earned 500 total points
ID: 41831235
Hello there,

The below reference, explain the process and the configuration required to get ADFS to work in a one way trust scenario.
https://blog.rhysgoodwin.com/windows-admin/adfs-2-0-in-a-forest-trust-environment/
0

Featured Post

Free NetCrunch network monitor licenses!

Only on Experts-Exchange: Sign-up for a free-trial and we'll send you your permanent license!

Here is what you get: 30 Nodes | Unlimited Sensors | No Time Restrictions | Absolutely FREE!

Act now. This offer ends July 14, 2017.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A company’s centralized system that manages user data, security, and distributed resources is often a focus of criminal attention. Active Directory (AD) is no exception. In truth, it’s even more likely to be targeted due to the number of companies …
Group policies can be applied selectively to specific devices with the help of groups. Utilising this, it is possible to phase-in group policies, over a period of time, by randomly adding non-members user or computers at a set interval, to a group f…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question