SAML-based 
claims authentication in SharePoint Server 2016
SAML-based authentication requires
- A Client Computer
- A SharePoint 2016 Server/Farm
- Claim Provider / IP-STS (example: ADFS)
- Identity Provider (example AD, LDAP) which contains the actual accounts and password
Note: 
ADFS and SAML claims are not required if you are using AD DS infrastructure in which the forest and domain trust each other.
ADFS and SAML claims are not required if you are using AD DS infrastructure in which the forest and domain trust each other.
Trust Relationship for 
SAML-based claims authentication process
Steps
- The ADFS 
Server must trust the 
Identity 
Provider for which it 
is issuing SAML 
Security Token. 
 Note:
 In case of AD and ADFS in the same domain; the trust is implicit and therefore trusts the validation security credentials by its domain controllers
 
- ADFS must also trust Security 
Token request for 
locations on the SharePoint 2016 Server
 
- You configure ADFS with the URLs 
of SharePoint 2016 Web Applications as a Relying 
Party and then web 
pages of SharePoint 2016 Server and those URLs will 
now be trusted for SAML 
Security Token requests
 
- The SharePoint 2016 Server must also 
trust ADFS 
Server that 
uses a Token 
Signing Certificate 
to sign the SAML 
Security Token that 
is issues.
 
- To validate the Digital Signature on the Security Tokens issues by ADFS, we configured the SharePoint 2016 Farm with Public Portion of that ADFS Token Signing Certificate
The SAML-based claims 
authentication process
Step 1
Assuming that the 
Client Computer does not 
already have a Claims-based Security 
Token. 
SAML-based claims authentication 
occurs when it makes an initial anonymous request of a secured 
SharePoint 2016 web page
Step 
2
The SharePoint 2016 Server redirects the Client Computer to the ADFS Server to obtain a SAML-based login page for User Credentials (username/password)
The SharePoint 2016 Server redirects the Client Computer to the ADFS Server to obtain a SAML-based login page for User Credentials (username/password)
Step 3
The User provides 
credentials (username / password) and the Client Computer sends them to the 
ADFS Server with a request for a SAML Security Token
Step 4
The ADFS Server validates the sent 
credentials (username/password) with the Identity Provider (Active 
Directory, LDAP etc.)
Step 5
After validating 
the credentials from Identity Provider; the ADFS Server
- Constructs a SAML Security Token,
- Sign the Security Token, and
- Send this Security Token to the Client Computer
Step 6
The Client Computer sends a new request for the SharePoint 2016 Web Page and this time 
it includes the SAML Security 
Token that it(the Client Computer) received from the ADFS Server
Step 7
The Security Token Service on the SharePoint 2016 Server then creates a 
claim-based Security Token 
and stores it with the Distributed Cache Service on the 
SharePoint 2016 Farm. 
Claims (username, password, email 
address or whatever info) in this Security Token are based on the 
Claims in the SAML Security Token from the ADFS Server
The SharePoint 2016 Server then creates and 
sends a Federated 
Authentication or FedAuth Cookie to the Client Computer
This FedAUTH Cookie contains an encrypted key or index to the Security Token. 
If the User is 
authorized to access the requested web page on SharePoint through analysis of 
the claims in the Security Token created by Security Token Service of SharePoint 2016 and Configured Permissions on SharePoint Contents; the SharePoint 2016 Server then sends the 
contents on the requested web page 
on SharePoint. 
For subsequent requests, the Client Computer uses the FedAUTH Cookie for authentication.
For subsequent requests, the Client Computer uses the FedAUTH Cookie for authentication.
Note: 
All above steps are valid for SharePoint 2013 Server as well.
Reference:
Happy SharePointing










 
No comments:
Post a Comment