0

Referring to 3.1.1.1 [MS-ADFSOD]: User and Relying Party in Different Realms Example | Microsoft Learn after introducing ADFS for authenticating custom users.

3.1.1.1 User and Relying Party in Different Realms Example

  1. The AD FS server authenticates the user, in the case of this example, by contacting Active Directory. The AD FS server then generates the security material that is passed on to the STS that authenticates for the RP and also constructs a cookie that contains information about the user authentication that has occurred. This data is sent to the client along with hidden JavaScript code in an HTTP 200 response.

See [MS-MWBF] section 4.1, step 6, and [MS-MWBF] section 4.3.6 for examples of the HTTP 200 response.

  1. The client executes the hidden JavaScript code, which causes it to send an HTTP POST to the STS that authenticates for the RP. The POST includes the security material generated by the AD FS server. In addition, the client stores the cookie in its cookie cache.

I found the configured WS-Federation Passive Endpoint can control which server the request includes the security material (RequestSecurityTokenResponse from WS-Trust.pdf) generated by the AD FS server was sent to in the above step 9.

WS-Federation Passive Endpoints in AD FS

Get-AdfsRelyingPartyTrust

WSFedEndpoint using Get-AdfsRelyingPartyTrust in PowerShell

After configuring different endpoints, I found its network activity looked like:

SharePoint Online federated with ADFS and proxy

Can Somebody explain how it work and was it what I found or expected?

I cannot verify how it work after I googled and tested.

0

Your Answer

By clicking “Post Your Answer”, you agree to our terms of service and acknowledge you have read our privacy policy.

Start asking to get answers

Find the answer to your question by asking.

Ask question

Explore related questions

See similar questions with these tags.