Setting up Active Directory Federation Services (ADFS)
Setting up and maintaining ADFS is outside the scope of FotoWeb. Therefore, the instructions here are very basic and not necessarily suitable and secure enough for production systems. For more information, see Microsoft Active Directory Federation Services documentation or consult your IT administrator.
For security reasons, do NOT expose the primary ADFS server (port 443) on the open internet! If users need to be able to use ADFS sign-in from outside the internal network of the organization, see Setting up Web Application Proxy.
- An on-premises Active Directory domain
- Windows Server 2022, 2019, or 2016
- At least one server in the organization's domain that serves as ADFS server (may be the same as the domain controller)
- (Optional) At least one server in the organization's domain that serves as CA root server (may be the same as the domain controller and/or ADFS server)
- (Optional) A separate server in the DMZ that serves as a Web Application Proxy
Setting up the ADFS Server
- Go to Server Manager > Manage > Add Roles and Features.
- Select the Active Directory Federation Services role.
- Install the role with default options.
- Open the post-install configuration wizard for ADFS from the notification menu in Server Manager.
- Select Create the first server in a federation server farm.
- When asked for a certificate, either import a certificate from a file or enroll a certificate from your enterprise CA (if available).
- Select a user-friendly display name (this is displayed to the end-user when signing in).
- Specify a service account (You can use a regular user account or a group-managed account, by following the instructions provided by the wizard).
- Finish the wizard.
For more information, see the Microsoft Active Directory Federation Services documentation.
Setting up Web Application Proxy
The ADFS server should not be exposed on the open internet. If users need to be able to use ADFS sign-in from outside the organization's internal network, then the solution is to set up a Web Application Proxy on a separate server in the DMZ.
Note: Web Application Proxy MUST use HTTPS for encrypting credentials in transit. It is strongly recommended to use a certificate signed by a public CA.
Web Application Proxy does not need to be a member of the organization's domain. Not joining the domain can be more secure, but may also make it more difficult to manage the server.
- Even when using FotoWare SaaS with ADFS, it is not normally necessary to use Web Application Proxy. As long as all users are logging in from the internal network of their organization, where they can access the ADFS server directly, this also works with FotoWare SaaS.
- An alternative to Web Application Proxy is to set up a VPN, so users from outside the internal network of their organization can also access the primary ADFS server directly and securely. This approach is not documented here.
- Install the Web Application Proxy role
- Open Server Manager.
- Add the Remote Access role.
- Add the Web Application Proxy role service under Remote Access.
Import TLS certificate to be used by the Web Application Proxy.
The certificate must have a subject name (CN) that matches the service name of the ADFS server (for example,
If you create the certificate in your enterprise root CA on a computer within your domain, and the Web Application Proxy server is not a member of your domain, then you have to export and import the certificate. When enrolling the certificate, make sure to make its private key exportable. Then export the certificate with the private key and copy it to the Web Application Proxy server. Do not make the private key exportable when importing the certificate again. You may want to delete all copies containing the private key, including the original. Such a certificate will not be trusted by any machines outside your domain, so this approach is not recommended.
- Configure Web Application Proxy
- Open the Web Application Proxy Configuration Wizard (you can use the notification icon in Server Manager).
- Enter the name of the ADFS server and credentials for an administrator user on the ADFS server.
- Select the TLS certificate.
- Finish the wizard.