Skip to content

A walk through how to configure Azure AD External Identities with Direct Federation

Notifications You must be signed in to change notification settings

briandenicola/azure-ad-external-identities

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Overview

Azure AD External Identities with Direct Federation is new feature of Azure AD that allows users from any external SAML2.0 or WS-Fed Identity provider into an Azure AD tenant as guest users.

This repo is a walk though on how to setup Azure AD External Identities with an ADFS environment

Limitations

  • The sign in user's domain (somebody@domain.com) and authentication URL (https://sts.domain.com) must match or the authentication URL matches a list of allowed providers such as OKTA
  • The external domain has not already been associated with another Azure AD tenant. If it has then Azure AD B2B federation can be utilized instead.

Pre-requisties

  • An Azure AD tenant
  • An Azure Subscription which will host the ADFS server.
    • Could also be an AWS Account or GCP Project
  • Ownership of or access to a public DNS domain.
    • This domain will be used as the Authication URL and will be associated with the ADFS server
    • Will be referenced as adfsdomain in the documentation

Notes

Steps

  1. Create ADFS VM and Intial ADFS Install
  2. Configure ADFS Claims
  3. Confiugre Azure AD

About

A walk through how to configure Azure AD External Identities with Direct Federation

Topics

Resources

Stars

Watchers

Forks