ADFS 3.0 install WAP Server - pt. 4

adfs30installwap01

To perform SSO with Office 365 outside the LAN, we need to configure the ADFS 3.0 service adding a WAP server placed in the DMZ zone.

The Windows 2012 R2 with WAP role must be configured as standalone server and NOT joined to the domain.

 

Blog series

ADFS 3.0 setup UPN suffix for Office 365 SSO - pt. 1
ADFS 3.0 SSL certificate signing request - pt. 2
ADFS 3.0 install ADFS Server - pt. 3
ADFS 3.0 install WAP Server - pt. 4
ADFS 3.0 federating Office 365 - pt. 5
ADFS 3.0 install Directory Sync tool - pt. 6
ADFS 3.0 deploy Office 365 - pt. 7

 

Configure hosts file

Since the WAP server in the DMZ needs to communicate with the internal ADFS server to perform the authentication against Active Directory, a DNS entry must be configured in the hosts file of the server.

Open the hosts file located in C:\Windows\System32\drivers\etc and add a new entry specifying the IP  address of the ADFS server and the given name of the service.

adfs30installwap02

Ping from WAP server to ADFS server in order to verify the correct DNS resolution.

adfs30installwap03

 

Install WAP role

From the Server Manager click Add roles and features to add the WAP role in the server.

adfs30installwap04

Click Next to start the role configuration.

adfs30installwap05

Select Role-based or feature-based installation option then click Next.

adfs30installwap06

Select the option Select a server from the server pool, highlight the server from the list and click Next.

adfs30installwap07

Select Remote Access role and click Next.

adfs30installwap08

No additional features to add, click Next.

adfs30installwap09

Click Next to continue.

adfs30installwap10

Select the Web Application Proxy role service.

adfs30installwap11

Since the role requires additional tools to be installed, click on Add Features to proceed.

adfs30installwap12

Once the additional features has been added and the Web Application Proxy role service is selected, click Next.

adfs30installwap13

Thick Restart the destination server automatically if required option then click Yes to confirm.

adfs30installwap14

Click Install to proceed with the role installation.

adfs30installwap15

The role is being installed in the server.

adfs30installwap16

Click Close to exit the Wizard.

adfs30installwap17

 

Import the SSL certificate

Since an SSL certificate is required to establish the https connection to WAP server, same certificate installed in ADFS server can be used.

Open the Certificates snap-in console, right click Personal item and select All Tasks > Import options.

adfs30installwap18

Click Next to continue.

adfs30installwap19

In the File name field select the SSL certificate previously exported (see part 2) through the Browse button then click Next.

adfs30installwap20

Type the Password for the private key, select option Include all extended properties then click Next.

adfs30installwap21

Select Place all certificates in the following store option and use Personal as certificate store. Click Next to continue.

adfs30installwap22

To complete the certificate import click on Finish button.

adfs30installwap23

Click OK to close the confirmation window.

adfs30installwap24

Select Certificates > Personal to verify the imported certificate.

adfs30installwap25

 

Configure WAP

After installing the WAP role, the service has to be configured. Click on Open the Web Application Proxy Wizard to begin the setup.

adfs30installwap26

Click Next when the WAP Configuration Wizard starts.

adfs30installwap27

Type the configured name in the Federation service name field (i.e. sts.nolabnoparty.com) and enter the credential of a local administrator account of the server (remember the server is NOT joined to the domain). Click Next when done.

adfs30installwap28

Select the imported SSL certificate to be used by the ADFS proxy.

adfs30installwap29

Click Configure to start the WAP configuration.

adfs30installwap30

The service is being configured.

adfs30installwap31

When the process has been completed, click Close to exit the Wizard.

adfs30installwap32

When you click on Close, automatically the Remote Access Management Console opens.

 

Publish application

To enable WAP, the application must be published from the Remote Access Management Console. In the Tasks pane, click on Publish.

adfs30installwap33

The Publish New Application Wizard window opens. Click Next to begin.

adfs30installwap34

Select the Pass-through option then click Next.

adfs30installwap35

Give a Name to the web application to be published. Type the External URL field, select the External certificate and specify the Backend server URL. Click Next when done.

adfs30installwap36

To publish the web application click on Publish button.

adfs30installwap37

When the application has been published successfully, click Close to exit the Wizard.

adfs30installwap38

The web application shows up in the Published Web Applications list. Close the Remote Access Management Console.

adfs30installwap39

 

Test the connection

To test the authentication process, from a device outside the LAN type the following URL in the browser:

https://adfsname.domain.com/adfs/ls/IdpInitiatedSignon.aspx

In the example, the address https://sts.nolabnoparty.com/adfs/ls/IdpInitiatedSignon.aspx is used in the browser.

Click the Sign in button.

adfs30installwap40

Enter the organizational account credentials and click Sign in button.

adfs30installwap41

If the system shows the You are signed in message, the service is working as expected.

adfs30installwap42

Part 5 will cover the federation process to connect the on-premises Active Directory with Office 365 platform.

firma

One Response

  1. Geoff 22/09/2015