4.1 KiB
ADFS Anbindung
Donnerstag, 19. Juli 2018
13:43
{width="4.895833333333333in" height="3.9791666666666665in"}
fs.bkk-mobil-oil.de
Folgende Powershell Befehle müssen auf einem SharePoint Server ausgeführt werden:
---Anfang---
Add-PSSnapin *sharepoint*
$adfscertPath = "d:\ADFS-Signing-fs-bkk-mobil-oil-de.cer"
$realm = "urn:spt-portal:sp2016"
$signInURL = "https://fs.bkk-mobil-oil.de/adfs/ls"
//"https://portal-spt.bkk-mobiloil.de/adfs/ls/"
$adfscert = New-Object System.Security.Cryptography.X509Certificates.X509Certificate2($adfsCertPath)
New-SPTrustedRootAuthority -Name "ADFS Token Signing Cert" -Certificate $adfscert
(Pause)
$emailClaimMap = New-SPClaimTypeMapping -IncomingClaimType "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress" -IncomingClaimTypeDisplayName "EmailAddress" -SameAsIncoming
$upnClaimMap = New-SPClaimTypeMapping -IncomingClaimType "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn" -IncomingClaimTypeDisplayName "UPN" -SameAsIncoming
$roleClaimMap = New-SPClaimTypeMapping -IncomingClaimType "http://schemas.microsoft.com/ws/2008/06/identity/claims/role" -IncomingClaimTypeDisplayName "Role" -SameAsIncoming
$sidClaimMap = New-SPClaimTypeMapping -IncomingClaimType "http://schemas.microsoft.com/ws/2008/06/identity/claims/primarysid" -IncomingClaimTypeDisplayName "SID" -SameAsIncoming
$ap = New-SPTrustedIdentityTokenIssuer -Name "ADFS3" -Description "ADFS provider3" -realm $realm -ImportTrustCertificate $adfscert -ClaimsMappings $emailClaimMap,$upnClaimMap,$roleClaimMap,$sidClaimMap -SignInUrl $signInURL -IdentifierClaim $emailClaimmap.InputClaimType
----Ende--
Danach müssen noch die Benutzer auf die Site berechtigt werden!
Script dafür:
$wa = get-spwebapplication https://portal-spt.bkk-mobiloil.de
Convert-SPWebApplication -Identity $wa -From CLAIMS-WINDOWS -To CLAIMS-TRUSTED-DEFAULT -TrustedProvider $ap -RetainPermissions
Informationen zum ADFS:
get-SPTrustedIdentitytokenissuer "ADFS"
Delete the Trusted Identity Provider per Powershell:
Remove-SPClaimProvider "Name"
Remove-SPTrustedIdentityTokenIssuer "Name"
Infos:
http://www.christianloth.de/sharepoint-2013-how-to-install-and-configure-adfs-3-0/
Überprüfen des ADFS Servers:
https://fs.bkk-mobil-oil.de/adfs/ls/IdpInitiatedSignon.aspx
https://portal-spt.bkk-mobiloil.de/adfs/ls/IdpInitiatedSignon.aspx
fs.bkk-mobil-oil.de
https://bkkadfs001.mobiloil.de/adfs/ls/IdpInitiatedSignon.aspx
Richtig gut erklärt : ADFS2.0
https://samlman.wordpress.com/2015/02/28/configuring-sharepoint-2010-and-adfs-v2-end-to-end/
Configure ADFS 3.0 with Sharepoint 2013 for Claim authentication