ADFS 5.0 - SSO and ExtendedProtectionTokenCheck Problems

MBE 6 Reputation points
2022-11-30T12:08:55.707+00:00

Hi there,

we have the following setup
2 ADFS Server (Windows Server 2019 based)

  • ADFS Running under GMSA with SPN for http/<farm fqdn>
  • farm fqnd is not equivalent to machine names
  • no duplicated spns
    ADFS VIP hangs on an Loadbalancer (we do NOT terminate tls connection aka tls offloading on them!)
  • mostly followed chapter 9 on this deployment guide https://pdfs.loadbalancer.org/Microsoft_ADFS_Deployment_Guide.pdf
    Clients (Windows 10 20h2 based)
  • farm fqdn is in local intranet zone
    Terminalservers (Windows Server 2019 based)
  • farm fqdn is in local intranet zone

Browser is on all client machines Edge Chromium in the most recent version, so our WiaSupportedUserAgents looks like this
MSIE 6.0
MSIE 7.0; Windows NT
MSIE 8.0
MSIE 9.0
MSIE 10.0; Windows NT 6
Windows NT 6.3; Trident/7.0
Windows NT 6.3; Win64; x64; Trident/7.0
Windows NT 6.3; WOW64; Trident/7.0
Windows NT 6.2; Trident/7.0
Windows NT 6.2; Win64; x64; Trident/7.0
Windows NT 6.2; WOW64; Trident/7.0
Windows NT 6.1; Trident/7.0
Windows NT 6.1; Win64; x64; Trident/7.0
Windows NT 6.1; WOW64; Trident/7.0
Windows NT 10.0; WOW64; Trident/7.0
MSIPC
Windows Rights Management Client
=~Windows\s*NT.Edg.

Integrated Windows Authentication is enabled

Ok now this works perfectly fine for our Windows 10 20h2 Clients, Kerberos is used for sso authentication and everything is wokring as expected

But now there is a problem with our Terminal Servers (RDS Farm), sso just dont work on them, prompts for credentials are just repeatedly presented to the users even if they put in the correct credentials, it is stuck at http 401 and we dont know why. FBA is not be prestented to the user in this scenario. On ADFS we see Event from Logon Category with the ID 4625 at the time of the authentication requests

Fehler beim Anmelden eines Kontos.  
  
Antragsteller:  
 Sicherheits-ID: NULL SID  
 Kontoname: -  
 Kontodomäne: -  
 Anmelde-ID: 0x0  
  
Anmeldetyp: 3  
  
Konto, für das die Anmeldung fehlgeschlagen ist:  
 Sicherheits-ID: NULL SID  
 Kontoname:  
 Kontodomäne:  
  
Fehlerinformationen:  
 Fehlerursache: Bei der Anmeldung ist ein Fehler aufgetreten.  
 Status: 0xC000035B  
 Unterstatus:: 0x0  
  
Prozessinformationen:  
 Aufrufprozess-ID: 0x0  
 Aufrufprozessname: -  
  
Netzwerkinformationen:  
 Arbeitsstationsname: -  
 Quellnetzwerkadresse: -  
 Quellport: -  
  
Detaillierte Authentifizierungsinformationen:  
 Anmeldeprozess: Kerberos  
 Authentifizierungspaket: Kerberos  
 Übertragene Dienste: -  
 Paketname (nur NTLM): -  
 Schlüssellänge: 0  
  

Just to mention, any machine included (rds host, windows 10 client, adfs server) have lmcompatibilitylevel 5. So we just did a blind shot and disabled ExtendedProtectionTokenCheck with

Set-ADFSProperties -ExtendedProtectionTokenCheck none

on the ADFS Server. This makes things work on the Server 2019 with edge, too....so we are pretty sure there is no basic misconfguration but we dont get why it does not work WITH extendedprotection and only on windows server 2019. There is no ssl offloading before the adfs server, when we strip it down to a single setup (no loadbalancer) the same behaviour is present...

Any ideas what we need to do to get it run with extended protection enabled(allow)?

Windows Server 2019
Windows Server 2019
A Microsoft server operating system that supports enterprise-level management updated to data storage.
3,448 questions
Active Directory Federation Services
Active Directory Federation Services
An Active Directory technology that provides single-sign-on functionality by securely sharing digital identity and entitlement rights across security and enterprise boundaries.
1,188 questions
0 comments No comments
{count} vote