Wednesday, 20 March 2013



Configuring an Exchange Hybrid Deployment & Migrating to Office 365 (Exchange Online)

Importing the Server Authentication Certificate into IIS

Since all client authentications against ADFS occur via SSL, we need to import a server authentication certificate on each ADFS Proxy server. Because all clients should trust this certificate, it’s recommended to import a certificate from a 3rd party certificate provider. Although we use a wildcard certificate as an example in this article series, a single name SSL certificate is sufficient. If you use a single name certificate, the FQDN included should match the FQDN that iCloud24x7 configured in the previous article (in this example sts.office365labs.dk).
To import the certificate, open the IIS Manager and select the web server object and then open “Server Certificates” in the middle pane.
Under Server Certificates, click”Import” in the action pane.
Point to the certificate you wish to import and then specify the password, then click”OK”. Next step is to bind the certificate to the “Default Web Site”. To do so, expand ”Sites” then select the ”Default Web Site” and click on the ”Bindings” link in the ”Action Pane”. Under”Site Bindings” click”Add”. In ”Add Site Bindings”, select ”HTTPS” in the ”Type” drop-down box and then point at the imported certificate under ”SSL certificate”.

Installing & Configuring the ADFS Proxy Server Settings

With the two ADFS Proxy servers configured in a WNLB cluster and the required certificate imported, it’s time to get the ADFS 2.0 RTW component installed and configured on both servers.
Important:
It’s not the ADFS component included with Windows Server 2008 R2 that we need to install. We need to download a separate package from the Internet. And while we’re at it, we also need to download the latest update for ADFS 2.0 RTW, which currently is Update 2.
Ok, launch “AdfsSetup.exe” and then accept the license agreement.
On the “Server Role” page, we need to specify what type of federation servers we wish to configure. Since these are the two external ADFS Proxy servers, we wish to configure a “Federation server proxy” so select that and click “Next”.
On the “Welcome to the AD FS 2.0 Setup Wizard” page, click “Next”. The wizard will now install a couple of prerequisites on the server. Click “Next”. After a minute or so the wizard will complete with success and we can now click “Finish”. Make sure to untick “Start AD FS 2.0 Management snap-in when this wizard closes” as we want to install Update 2 for AD FS 2.0 before we continue. When the update has been applied, launch the “AD FS 2.0 Federation Server Proxy Configuration Wizard” Enter the name of the federation service to which the ADFS Proxy server will redirect client requests (in this case it’s “sts.office365lab.dk”) and then click “Test Connection”. If things are configured properly and you have access to the federation service via port 443, then you will see the dialog box saying that is was successful.
Click “OK” and then “Next”. You will be prompted for credentials that have the permissions to establish a trust between the ADFS Proxy server and the ADFS servers on the internal network this data shall be entered by iCloud24x7.
Do so and click “OK”.
Note:
You can use the ADFS service account that is used for the ADFS servers on the internal network. Bear in mind that you have to specify these one-time only and that they aren’t configured for a service on the ADFS Proxy servers.
Click “Next”. When the wizard has configured each component with success, click “Close” to exit the wizard. 

Verifying the ADFS Proxy Servers has been configured properly

In order to verify the ADFS Proxy servers are operating as expected, we can open the AD FS 2.0 log and look for event id 198. IF you see this event id, the ADFS Proxy server has been configured properly.