• About Hyper-V.nu
  • Azure Pack Wiki
  • Azure Stack Wiki
  • WS2012R2 Hotfixes
  • Home
  • Marc van Eijk
  • Windows Azure Pack with ADFS and Windows Azure Multi-Factor Authentication – Part 1

Windows Azure Pack with ADFS and Windows Azure Multi-Factor Authentication – Part 1

January 20, 2014 8 Comments Written by Marc van Eijk

 

ADFS Series
Windows Azure Pack with ADFS and Windows Azure Multi-Factor Authentication – Part 1
Windows Azure Pack with ADFS and Windows Azure Multi-Factor Authentication – Part 2
Windows Azure Pack with ADFS and Windows Azure Multi-Factor Authentication – Part 3

The last couple of weeks I have been testing a lot of federation scenarios for Windows Azure Pack. Out of the box Windows Azure Pack provides two authentication sites. A Windows Authentication site for the administration portal and a Tenant Authentication site based on a ASP.NET Membership provider for the tenant management portal. It is also possible to use Active Directory Federations Services (ADFS) for authentication with Windows Azure Pack.

Active Directory Federation Services

This opens the door to numerous interesting scenarios. I have tested Windows Azure Pack scenarios with the default ADFS Active Directory claims, federation to partner organizations, federation to Windows Azure ACS (that Shriram Natarajan also posted in an excellent blog a couple of days ago) and integrate ADFS with Windows Azure Multi-Factor Authentication.

Multi-Factor Authentication

If you ask an average person what password policy he or she is using for the online services they access the answer is quite scary. A single password for different entities. How many have been victim of phishing, identity theft  or know someone who has been. And if we look at an average business and their security policies, well… it’s a mess usually. Unless you are disciplined with complex passwords, a simple username password does not cut it any more. Multi-factor Authentication can address these security issues by adding an additional layer of authentication. Besides the username and the password it is possible to validate the user by a phone call, a text message, a validation app, etc. In the past these functionalities where quite complex to implement, let alone integrate in to existing applications. Microsoft announced General Availability of Windows Azure Multi-Factor Authentication in September 2013. This service in Windows Azure Active Directory takes away the pain of setting up Multi-Factor Authentication yourself and allows for easy integration with existing applications by integrating on premises ADFS servers.

mfa

In this blog I’ll describes the steps to configure the tenant site in Windows Azure Pack to use ADFS for authentication and also add Multi-Factor Authentication by leveraging Windows Azure.

First lets have a look at the end result. A tenant opens the Windows Azure Pack tenant portal and is redirected to the ADFS, or even better the Web Application Proxy (Yep, WAP to WAP). The tenant enters his active directory credentials and is prompted to proceed with Multi-Factor Authentication. After proceeding the tenants is called within a couple of  seconds on his mobile (you can configure other options as well). When asked, the tenant presses # in the call and he is instantly logged in to Windows Azure Pack. No matter if you show this to an IT pro, a customer or your boss, it will bring a smile to their face. Guaranteed!

Prerequisites

Before we start clicking away we need to get some insight in the moving parts and the corresponding prerequisites.

Windows Azure Pack and ADFS are accessible through a browser. In a production or even a lab environment it is a good idea to change the out of the box endpoints to user friendly values. This requires changing the endpoints to HTTPS on port 443 and specifying readable FQDNs. In this blog we will create the DNS records in the internal DNS server. This will also be valid for a configuration that is publically accessible, except for the DNS records that will have to be created in a public DNS zone.

Open DNS manager on the server running DNS in your environment and create a new forward lookup zone. You can create a single zone for all the records or create a zone for each records. The advantage of a single zone is easier management, but the DNS server is authoritive for the complete zone. If you try to resolve a record that is not created in the zone the DNS server will not forward it. You can also create a zone for each record and add a blank A record pointing to the IP that must be resolved. This will generate more administrative overhead but if a record is requested from the matching domain (one level up) then the DNS request is forwarded to the public DNS. For this blog we need the following three A records created.

Example FQDN IP Address of the server running
manage.hyper-v.nu Windows Azure Pack Tenant Site
admin.hyper-v.nu Windows Azure Pack Admin Site
sts.hyper-v.nu ADFS server

The installation of Windows Azure Pack will create self-singed certificates for each site. ADFS requires a certificate in place before you can configure it. All endpoint accept a default web certificate and can cope with wildcard web server certificates. For this blog the following certificate was created by a public Certificate Authority.

Certificate CN Certificate Type
*.hyper-v.nu web server certificate generated by a public Certificate Authority

Windows Azure Pack will create SQL logins for all services. Active Directory Federation Server requires a domain service account for configuration.

Name Permissions
domainSVC_ADFS Default domain user

You have the possibility to create different designs. In the upcoming CloudOS whitepaper series, different designs and choices will be discussed. For this blog all components are installed in the same domain without high availability. The following table describe the virtual machines and their roles for this blog.

Role Requirements
Domain Controller DNS, Global catalog
SQL Server SQL Server 2008 SP3 / 2008 R2 SP2 / 2012 SP1 in mixed authentication mode
Windows Azure Pack Windows Server 2012 R2
AD Federation Services Windows Server 2012 R2

Windows Azure Pack

In a production environment it is recommended to distribute the components o
ver multiple servers and configure high availability. In this blog we will install all Windows Azure Pack components on a single server. All the Windows Azure Pack components and dependencies can be installed using the Web Platform Installer. Download and execute the Web PI on the server that will run Windows Azure Pack and install Windows Azure Pack: Portal and API express.

express

After the installation completes the wizard will open the configuration site on https://localhost:30101. In the configuration page specify the SQL server name, select SQL Server Authentication, enter the SA account and credentials and finally specify a Passphrase. The installation configures the database and the services. The first thing to do after the installation finishes is to logoff and logon again. The administrator is added to the local MgmtSvc Operators group. This will only take effect after logging in again. Before we configure anything else in Windows Azure Pack we will install ADFS.

Active Directory Federation Services

Logon to the server that will run the Active Directory Federation Services role. Import the web server certificate that you will use for the ADFS web service in the Local certificate store. Add the ADFS role in the Add roles/features wizard. When the installation wizard is complete select to run the Post-Deployment Configuration from the Server Manager.

image

In the Welcome screen, select the option to create the first federation server in a federation server farm. Specify an account with Active Directory domain administrator permissions.

The Specify Service Properties tab has a couple of fields that must be configured carefully. First of all select the web server certificate we imported earlier. The Federation Service Name will be populated from the common name of the selected web server certificate. If you selected a web server certificate with a wildcard or subject alternate names you need to edit the Federation Service Name manually to the value that will be used by clients using the federation service. The web server certificate should be valid for the Federation Service Name. The Federation Service Display Name is created as the default claims provider trust to Active Directory. This name is also displayed in the web page when ADFS is configured with Form Authentication. I have not find a way to change this name afterwards, yet.

In the Specify Service Account tab, select the domain service account that was created in the prerequisites (in this example SVC_ADFS). This domain account requires no special permissions or group memberships. A default domain account that is member of the default domain user group is sufficient.

The tab Specify Database allows you to select the type of database that is used for ADFS. You can choose to create a database on the ADFS server using the Windows Internal Database or use create the database on a SQL server. There are a couple of things to note here. In the configuration with the Windows Internal Database it is still possible to create redundancy by adding a an ADFS server to the ADFS farm. The seconds ADFS server will also run a Windows Internal Database. One ADFS server in the farm will run the primary database and the other ADFS servers will replicate the changes to their database. A failover to another server requires manual interaction by marking a secondary server as primary. Another difference is the influence on the limits of ADFS. A Windows Internal Database farm has a limit of five federation servers does not support token replay detection or artifact resolution (part of the Security Assertion Markup Language (SAML) protocol). For this example we will use a SQL server.

After all settings have been entered, verify the selections and complete the wizard. In the next part of this blog series we will configure Windows Azure Pack and ADFS for federation.

Related posts:

  1. VM Usage not updated in Azure Pack
  2. Windows Azure Pack – VM Checkpoints
  3. Get more value out of your Windows Azure Pack environment
  4. VMM 2012 R2 UR7 – Issue NVGRE Gateways

YARPP powered by AdBistro
Powered by

Marc van Eijk
ACS, ADFS, federation, MFA, Multi-Factor Authentication, WAP, Windows Azure, Windows Azure Pack
Bare metal deployment stuck on step 1.2.12
Hyper-V.nu moved to Windows Azure

No Comments Yet

1 Trackback

  1. Microsoft Most Valuable Professional (MVP) – Best Posts of the Week around Windows Server, Exchange, SystemCenter and more – #66 - Dell TechCenter - TechCenter - Dell Community on January 27, 2014 at 21:21
  2. Windows Azure Pack Authentication Part 3.5 – Using ADFS | Steve on Security on April 22, 2014 at 02:21
  3. Windows Azure Pack Authentication Part 3 – Using a Third Party IdP | Steve on Security on April 22, 2014 at 04:50
  4. Windows Azure Pack: Active Directory Authentication – Part 1 | vNext.be on April 28, 2014 at 15:14
  5. Windows Azure Pack: Active Directory Authentication – Part 1 | Christopher's System Center Blog on April 28, 2014 at 15:19
  6. Simple and secure by Design but Business compliant [Benoît SAUTIERE / MVP] on September 21, 2014 at 17:31
  7. Two Factor Authentication using Windows Azure Pack on January 16, 2015 at 16:38
  8. Windows Azure Pack Authentication Part 3 – Using a Third Party IdP | Steve on Security on December 28, 2015 at 21:28

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Powered by



Archives

  • November 2016 (2)
  • October 2016 (8)
  • September 2016 (10)
  • August 2016 (3)
  • June 2016 (2)
  • January 2016 (2)
  • October 2015 (1)
  • September 2015 (1)
  • August 2015 (1)
  • July 2015 (2)
  • June 2015 (2)
  • May 2015 (7)
  • April 2015 (5)
  • March 2015 (4)
  • February 2015 (15)
  • January 2015 (3)
  • December 2014 (8)
  • October 2014 (1)
  • September 2014 (3)
  • August 2014 (6)
  • July 2014 (4)
  • June 2014 (9)
  • May 2014 (5)
  • April 2014 (7)
  • March 2014 (8)
  • February 2014 (8)
  • January 2014 (5)
  • December 2013 (9)
  • November 2013 (8)
  • October 2013 (2)
  • September 2013 (4)
  • August 2013 (3)
  • July 2013 (9)
  • June 2013 (9)
  • May 2013 (2)
  • April 2013 (2)
  • March 2013 (12)
  • February 2013 (11)
  • January 2013 (9)
  • December 2012 (5)
  • November 2012 (2)
  • October 2012 (5)
  • September 2012 (8)
  • August 2012 (4)
  • July 2012 (1)
  • June 2012 (5)
  • May 2012 (7)
  • April 2012 (9)
  • March 2012 (4)
  • February 2012 (1)
  • January 2012 (7)
  • December 2011 (3)
  • November 2011 (7)
  • October 2011 (4)
  • September 2011 (11)
  • August 2011 (10)
  • July 2011 (5)
  • June 2011 (15)
  • May 2011 (17)
  • April 2011 (16)
  • March 2011 (15)
  • February 2011 (11)
  • January 2011 (7)
  • December 2010 (2)
  • November 2010 (1)
  • October 2010 (10)
  • September 2010 (9)
  • August 2010 (1)
  • July 2010 (7)
  • June 2010 (10)
  • May 2010 (1)
  • April 2010 (3)
  • March 2010 (4)
  • February 2010 (6)
  • January 2010 (4)
  • November 2009 (26)
  • August 2009 (1)

Categories

  • Azure Pack Wiki (6)
  • Azure Stack (6)
  • Ben Gelens (20)
  • Darryl van der Peijl (16)
  • Events (43)
  • Hans Vredevoort (314)
  • Hyper-v (232)
  • Ivo Hoefakker (1)
  • Marc van Eijk (52)
  • Mark Scholman (10)
  • Microsoft Ignite (5)
  • Peter Noorderijk (56)
  • Support (4)
  • System Management (91)
  • Tom Klaver (1)
  • Uncategorized (4)
  • Vendor (2)

evolve theme by Theme4Press  •  Powered by WordPress