Hello @Anonymous , Please find below the port, load balancer and DNS requirements:
Port requirements:
For this scenario to work, you need to have TCP port 443 enabled inbound on the firewall. If you want to perform user certificate authentication, TCP port 49443 also needs to be enabled inbound on the firewall as the certauth endpoint on port 443 is not enabled by default (can be configured for port 443). If firewall blocks 49443 or interferes with user certificate authentication traffic, you will see a blank screen or a 500 server error during certificate based authentication.
Load Balancer requirements:
- The load balancer MUST NOT terminate SSL. AD FS supports multiple use cases with certificate authentication which will break when terminating SSL. Terminating SSL at the load balancer is not supported for any use case.
- It is recommended to use a load balancer that supports SNI. In the event it does not, using the 0.0.0.0 fallback binding on your AD FS should provide a workaround.
- It is recommended to use the HTTP (not HTTPS) health probe endpoints to perform load balancer health checks for routing traffic. This avoids any issues relating to SNI. The response to these probe endpoints is an HTTP 200 OK and is served locally with no dependence on back-end services. The HTTP probe can be accessed over HTTP using the path ‘/adfs/probe' http://<ADFS server name>/adfs/probe
http://<ADFS IP address>/adfs/probe - It is NOT recommended to use DNS round robin as a way to load balance. Using this type of load balancing does not provide an automated way to remove a node from the load balancer using health probes.
- It is NOT recommended to use IP based session affinity or sticky sessions for authentication traffic to AD FS within the load balancer. This can cause an overload of certain nodes when using legacy authentication protocol for mail clients to connect to Office 365 mail services (Exchange Online).
DNS Requirements:
- For intranet access, all clients accessing AD FS service within the internal corporate network (intranet) must be able to resolve the AD FS service name to the load balancer for the AD FS servers.
- For extranet access, all clients accessing AD FS service from outside the corporate network (extranet/internet) must be able to resolve the AD FS service name to the load balancer for the AD FS servers.
- For Windows Integrated authentication, you must use a DNS A record (not CNAME) for the federation service name.
- For user certificate authentication on port 443, "certauth.<federation service name>" must be configured in DNS to resolve to the load balancer for AD FS servers.
-----------------------------------------------------------------------------------------------------------
Please "Accept the answer" if the information helped you. This will help us and others in the community as well.