Enable-AdfsClaimsProviderTrust
Enables a claims provider trust in the Federation Service.
Syntax
Enable-AdfsClaimsProviderTrust
-TargetClaimsProviderTrust <ClaimsProviderTrust>
[-PassThru]
[-WhatIf]
[-Confirm]
[<CommonParameters>]
Enable-AdfsClaimsProviderTrust
-TargetCertificate <X509Certificate2>
[-PassThru]
[-WhatIf]
[-Confirm]
[<CommonParameters>]
Enable-AdfsClaimsProviderTrust
-TargetIdentifier <String>
[-PassThru]
[-WhatIf]
[-Confirm]
[<CommonParameters>]
Enable-AdfsClaimsProviderTrust
-TargetName <String>
[-PassThru]
[-WhatIf]
[-Confirm]
[<CommonParameters>]
Description
The Enable-AdfsClaimsProviderTrust cmdlet enables a claims provider trust in the Federation Service.
Examples
Example 1: Enable a claims provider trust
PS C:\> Enable-AdfsClaimsProviderTrust -TargetName "Fabrikam claims provider"
This command enables a claims provider trust with the name Fabrikam claims provider.
Parameters
-Confirm
Prompts you for confirmation before running the cmdlet.
Type: | SwitchParameter |
Aliases: | cf |
Position: | Named |
Default value: | False |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-PassThru
Returns an object representing the item with which you are working. By default, this cmdlet does not generate any output.
Type: | SwitchParameter |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-TargetCertificate
Specifies the token-signing certificate of the claims provider trust to enable.
Type: | X509Certificate2 |
Position: | Named |
Default value: | None |
Required: | True |
Accept pipeline input: | True |
Accept wildcard characters: | False |
-TargetClaimsProviderTrust
Specifies a ClaimsProviderTrust object. The cmdlet enables the claims provider trust that you specify. To obtain a ClaimsProviderTrust object, use the Get-AdfsClaimsProviderTrust cmdlet.
Type: | ClaimsProviderTrust |
Position: | Named |
Default value: | None |
Required: | True |
Accept pipeline input: | True |
Accept wildcard characters: | False |
-TargetIdentifier
Specifies the identifier of the claims provider trust to enable.
Type: | String |
Position: | Named |
Default value: | None |
Required: | True |
Accept pipeline input: | True |
Accept wildcard characters: | False |
-TargetName
Specifies the name of the claims provider trust to enable.
Type: | String |
Position: | Named |
Default value: | None |
Required: | True |
Accept pipeline input: | True |
Accept wildcard characters: | False |
-WhatIf
Shows what would happen if the cmdlet runs. The cmdlet is not run.
Type: | SwitchParameter |
Aliases: | wi |
Position: | Named |
Default value: | False |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
Inputs
System.Security.Cryptography.X509Certificates.X509Certificate.X509Certificate2
X509Certificate2 objects are received by the TargetCertificate parameter.
Microsoft.IdentityServer.PowerShell.Resources.ClaimsProviderTrust
ClaimsProviderTrust objects are received by the TargetClaimsProviderTrust parameter.
String objects are received by the TargetIdentifier and TargetName parameters.
Outputs
Microsoft.IdentityServer.PowerShell.Resources.ClaimsProviderTrust
Returns the disabled ClaimsProviderTrust object when the PassThru parameter is specified. By default, this cmdlet does not generate any output.
Notes
- A relying party in Active Directory Federation Services (AD FS) is an organization in which web servers that host one or more web-based applications reside. Tokens and Information Cards that originate from a claims provider can then be presented and ultimately accessed by the web-based resources that are located in the relying party organization. When AD FS is configured in the role of the relying party, it acts as a partner that trusts a claims provider to authenticate users. Therefore, the relying party accesses the claims that are packaged in security tokens that come from users in the claims provider. In other words, a relying party is the organization whose web servers are protected by the resource-side federation server. The federation server in the relying party uses the security tokens that the claims provider produces to issue tokens to the web servers that are located in the relying party.