Appendix C: Documenting Your AD FS Design
Applies To: Windows Server 2008
You can use the following tables to document the various details of your Active Directory Federation Service (AD FS) design. Make sure that the role your organization plays in the federation agreement is clearly understood by all parties:
If your organization is a resource provider, determine the application types and the organization claims for the organization, as well as the incoming claims for each account partner. In addition, if the resource that you are providing is a Windows NT token–based application, determine the resource accounts and groups (also known as shadow accounts or proxy groups) that will be mapped.
If your organization is an account provider or identity provider, determine the account stores and the claim extractions for the organizations, as well as the outgoing claims for each resource partner.
If your organization is both an account provider and a resource provider, document the requirements in the tables in all the following sections.
Deployment goals
Understanding the AD FS functionality that you want to enable can help you select the appropriate goals for your deployment. For each of the areas of functionality in the following table, specify whether or not your scenario requires them.
Functionality | Yes/No |
---|---|
Provide federated access for your hosted applications |
|
Provide federated access for your employees on the corporate network |
|
Provide federated access for your remote employees on the Internet |
|
Provide single-sign-on (SSO) access for customers to your hosted applications |
The following table is an example of documented deployment goals.
Functionality | Yes/No |
---|---|
Provide federated access for your hosted applications |
Yes |
Provide federated access for your employees on the corporate network |
Yes |
Provide federated access for your remote employees on the Internet |
No |
Provide single-sign-on access (SSO) for customers to your hosted applications |
No |
Resource applications
If your organization is hosting an application or multiple applications, use the following table to document the applications and application types that will be part of your AD FS deployment.
Application name | Application type |
---|---|
The following table is an example of documented resource application requirements.
Application name | Application type |
---|---|
Purchasing Portal |
Windows NT token–based |
Ordering Application |
Claims-aware |
Sales Reports Application |
Windows NT token–based |
Account stores
If your organization is hosting account stores, use the following table to document the account stores that will be used to access the applications.
Account store | Account store type (internal, partner, hosted) |
---|---|
The following table is an example of documented account store requirements.
Account store | Account store type (internal, partner, hosted) |
---|---|
Corporate Active Directory |
Internal account store (corporate network access) |
Trey Research Employees |
Federation account partner |
Consolidated Messenger Customers |
Hosted account store |
Organization claims
Organization claims are the normalized set of claims on the federation server. Use the following table to document the organization claims and claim types on your federation server.
Organization claim | Claim type (identity, group, custom) |
---|---|
The following table is an example of documented organization claim requirements.
Organization claim | Claim type (identity, group, custom) |
---|---|
Administrators |
Group |
Purchasers |
Group |
Power Purchaser |
Group |
PurchaseLimit |
Custom |
EmployeeID |
Custom |
Claim extractions
Claim extractions map a user or group in an account store to an organization claim. The account store can be Active Directory Domains Services (AD DS) or Active Directory Lightweight Directory Services (AD LDS). If your organization is an account partner, use the following table to document the Active Directory users or groups for claim extractions and their corresponding organization claims.
Active Directory user or group | Organization claim |
---|---|
The following table is an example of documented claim extraction requirements.
Active Directory user or group | Organization claim |
---|---|
Purchase Administrators |
Administrators (Group) |
Sales Managers (Group) |
Purchasers (Group) |
EmployeeID (Attribute) |
EmployeeID (Custom) |
John Smith (User) |
Power Purchaser (Group) |
Outgoing claims
Organization claims on the federation server of the account partner are mapped to outgoing claims that are sent to the resource federation server. If your organization is an account partner, use the following table to document the organization claims and their corresponding outgoing claims.
Organization claim | Outgoing claim |
---|---|
Note
Organization claims and outgoing claims can have the same names if it is not necessary for the claim names to be different.
The following table is an example of documented outgoing claim requirements.
Organization claim | Outgoing claim |
---|---|
Administrators |
Admins |
Purchasers |
Allowed Purchasers |
Power Purchaser |
Power Purchaser |
PurchaseLimit |
PurchaseLimit |
EmployeeID |
EmployeeID |
Incoming claims
Incoming claims are received by the resource federation server from the account federation server. When incoming claims are received by the resource federation server, they are mapped to organization claims on the resource federation server. If your organization is a resource partner, use the following table to document the incoming claims and their corresponding organization claims.
Incoming claim | Organization claim |
---|---|
The following table is an example of documented incoming claim requirements.
Incoming claim | Organization claim |
---|---|
Admins |
Purchase Admins |
Allowed Purchasers |
Allowed Purchasers |
Power Purchaser |
Power Purchaser |
PurchaseLimit |
PurchaseLimit |
EmployeeID |
Employee Identity |
Note
Incoming claims and organization claims can have the same names if it is not necessary for the claim names to be different.
Windows NT token–based application users and groups
When the resource application is a Windows NT token–based application, the organization claims on the resource federation server must be mapped to either a user or a group in AD DS. If your organization is a resource partner that hosts a Windows NT token–based application, use the following table to document the organization claims and the Active Directory users or groups that the claims must map to.
Organization claim | Active Directory user or group |
---|---|
The following table is an example of documented requirements for users or groups that use a Windows NT token–based application.
Organization claim | Active Directory user or group |
---|---|
Purchase Admins (group) |
Purchase Admins (group) |
Allowed Purchasers (group) |
Purchasers (group) |
Power Purchaser (group) |
Power Purchaser (user) |