

CA issued certificates must be stored & accessed through a CSP Crypto Provider. CA issued certificates are also supported and can be changed using the AD FS Management snap-in By default, AD FS creates a self-signed certificate with 2048 bit keys. Token-signing certificate: This is a standard X509 certificate that is used for securely signing all tokens that the federation server issues.

This certificate can be managed using the AD FS Management console. The service communication certificate can't be a certificate that uses CNG keys. We recommend that you use a server authentication certificate that is issued by a public (third-party) certification authority (CA). This certificate must be trusted by clients of AD FS that use WCF Message Security. Important: if you're using the SSL certificate as the service communication certificate, when the SSL certificate expires, make sure to configure the renewed SSL certificate as your service communication certificate. But you also have the option to configure another certificate as the service communication certificate. By default, the SSL certificate is used as the service communications certificate. Service communication certificate: This certificate enables WCF message security for securing communications between federation servers.

Important: it's strongly recommended to use the same SSL certificate across all nodes of your AD FS farm as well as all Web Application proxies in your AD FS farm. Multiple subject alternative name entries can be present in the certificate, provided one of them matches the federation service name. The identity of the certificate must match the federation service name (for example, fs.).The identity is either a subject alternative name extension of type dNSName or, if there are no subject alternative name entries, the subject name specified as a common name. For this reason, you may want to consider choosing a Subject name on any new CA-issued certificates that best represents the name of your company or organization to partners. The Subject name of this certificate is used to represent the Federation Service name for each instance of AD FS that you deploy.
#0 AD SYSTEM REQUIREMENTS WINDOWS#
This is however required to be the same when supporting Windows Integrated Authentication endpoints through the Web Application Proxy and when Extended Protection Authentication is turned on (default setting). It's strongly recommended to use the same SSL certificate for the Web Application Proxy. When you create your AD FS farm, you'll be prompted to provide the service name for the AD FS service (for example,.
#0 AD SYSTEM REQUIREMENTS REGISTRATION#
When used together with Workplace Join/Device Registration Service, the subject alternative name of the SSL certificate for the AD FS service must contain the value enterpriseregistration that is followed by the User Principal Name (UPN) suffix of your organization, for example,. Doesn't support certificates that use CNG keys. Supports any key size supported by Windows Server 2012 R2 for SSL certificates. However, for a production environment, we recommend that you obtain the certificate from a public CA. You can use a self-signed SSL certificate successfully on federation servers in a test lab environment. It's strongly recommended to use certificates that are issued by a public (third-party) certification authority (CA).

All clients that access any AD FS endpoint must trust this certificate. This certificate must be a publicly trusted* X509 v3 certificate. Secure Sockets Layer (SSL) certificate: This is a standard SSL certificate that is used for securing communications between federation servers and clients. The requirements for certificates vary, depending on whether you're setting up a federation server or a proxy computer, as described in this section.įederation server certificates Certificate type The following are the various requirements that you must conform to when deploying AD FS:Ĭertificates play the most critical role in securing communications between federation servers, Web Application Proxies, claims-aware applications, and Web clients.
