Add a New Account Partner by Manually Configuring the Trust Policy
Applies To: Windows Server 2008
To add a new account partner in Active Directory Federation Services (AD FS) and manually configure the trust policy, perform the following procedure on a resource federation server.
Membership in Administrators, or equivalent, on the local computer is the minimum required to complete this procedure. Review details about using the appropriate accounts and group memberships at Local and Domain Default Groups (https://go.microsoft.com/fwlink/?LinkId=83477).
To add a new account partner by manually configuring the trust policy
Click Start, point to Administrative Tools, and then click Active Directory Federation Services.
In the console tree, double-click Federation Service, Trust Policy, and Partner Organizations.
Right-click Account Partners, point to New, and then click Account Partner.
On the Welcome to the Add Account Partner Wizard page, click Next.
On the Import Policy File page, click No, and then click Next.
On the Account Partner Details page, do the following, and then click Next
In Display name, type the display name of the account partner.
In Federation Service URI, type the uniform resource identifier (URI) of the account partner Federation Service.
In Federation Service endpoint URL, type the endpoint URL as follows:
With a Federation Service Proxy: If the Federation Service Proxy is installed on servers in a perimeter network of the account domain, use the fully qualified domain name (FQDN) of any federation server proxy.
Without a Federation Service Proxy: If your deployment does not use federation server proxies, use the FQDN of the account partner Federation Service.
On the Account Partner Verification Certificate page, type the path to the verification certificate, or browse to it, and then click Next.
On the Federation Scenario page, do one of the following, and then click Next:
If you are establishing a federated trust with another organization or you do not want to use an existing forest trust, click Federated Web SSO, and then go to step 10.
If you are establishing a federated trust within the same organization when both sides already share a forest trust, click Federated Web SSO with Forest Trust.
On the Federated Web SSO with Forest Trust page, do one of the following, and then click Next:
To accept users in all domains that are trusted by the account partner, click All AD DS domains and forests. Any user that can authenticate to the account partner will be accepted.
To accept user accounts that are located in some of the domains that are trusted by the account partner, click The following AD DS domains and forests. Then, in New, trusted AD DS domain or forest, type the name of a domain or forest, and then click Add. Only users from the specified domains will be accepted.
On the Account Partner Identity Claims page, select one or more identity claims to share with the resource partner, and then click Next:
- If the resource partner requires user principal name (UPN) claims to make authorization decisions, select the UPN Claim check box.
Important
When UPN claims or e-mail claims are used to make authorization decisions, it is essential that each account partner use a unique UPN suffix or e-mail suffix. If two account partners use the same UPN suffix or e-mail suffix, it might not be possible to identify users uniquely. This condition might allow a user from one account partner to receive the permissions that are intended for a user in another account partner. This condition might also introduce a significant security weakness because an administrator can intentionally create user accounts to impersonate users from one of your other account partners.
Note
If you selected the Federated Web SSO with Forest Trust scenario, the UPN Claim option is selected and not configurable because UPN claims are required for this scenario.
- If the resource partner requires e-mail claims to make authorization decisions, select the **E-mail Claim** check box.
- If the resource partner requires common name claims to make authorization decisions, select the **Common Name Claim** check box.
If you selected UPN Claim as an identity claim, on the Accepted UPN Suffixes page, type the accepted suffix, click Add, and then click Next. You may click to accept All UPN suffixes if you selected the Federation Web SSO with Forest Trust option.
If you selected E-mail Claim as an identity claim, on the Accepted E-mail Suffixes page, type the accepted suffix, click Add, and then click Next. You may click to accept All E-mail suffixes if you selected the Federation Web SSO with Forest Trust option.
Note
Common name claims require no additional information.
On the Enable this Account Partner page, if you do not want to enable the account partner now, clear the Enable this account partner check box, and then click Next.
To add the new account partner and close the wizard, click Finish.