Checklist: Configuring the Account Partner Organization

Updated: June 9, 2011

Applies To: Active Directory Federation Services (AD FS) 2.0

The account partner organization contains the users that will access Web-based applications in the resource partner. Administrators in this organization must use the AD FS 2.0 Management snap-in to create relying party trusts to represent their trust relationships with resource partner organizations. In turn, the resource partner administrator must create claims provider trusts for each account partner organization that they want to trust.

This checklist includes tasks for deploying Active Directory Federation Services (AD FS) 2.0 in the account partner organization. It also includes tasks for configuring the components that are required to establish one-half of a federation partnership.

If you are deploying a Web SSO Design, you do not have to follow this checklist. However, you do have to complete the tasks in this checklist to successfully deploy a Federated Web SSO Design.

Make sure that the administrator in the resource partner organization follows the guidance in Checklist: Configuring the Resource Partner Organization to ensure that all necessary deployment tasks will be completed to successfully create the second half of the federation partnership.

Complete the tasks in this checklist in order. When a reference link takes you to a procedure, return to this topic after you complete the steps in that procedure so that you can proceed with the remaining tasks in this checklist.

Checklist Checklist: Configuring the account partner organization


  Task Reference

If you have an existing AD FS 1.0 or 1.1 deployment in your production environment today, see the link to the right for information about how to migrate settings from your current Federation Service to a new AD FS 2.0 Federation Service. If you are deploying AD FS for the first time in your organization using AD FS 2.0, you can skip this step and continue to the next task in this checklist for information about how to set up a new account partner organization.

Conceptual topic Planning a Migration to AD FS 2.0


Based on your deployment goals, review information about the components that are required to provide users with access to the federated applications.

Conceptual topic Provide Your Active Directory Users Access to Your Claims-Aware Applications and Services

Conceptual topic Provide Your Active Directory Users Access to the Applications and Services of Other Organizations

Conceptual topic Provide Users in Another Organization Access to Your Claims-Aware Applications and Services


Determine which AD FS 2.0 design this account partner organization will be associated with.

Conceptual topic Web SSO Design

Conceptual topic Federated Web SSO Design


Before you begin deploying your AD FS 2.0 servers, review the; 1.) advantages and disadvantages of choosing either Windows Internal Database (WID) or SQL Server to store the AD FS configuration database 2.) AD FS 2.0 deployment topology types and their associated server placement and network layout recommendations.

Conceptual topic Determine Your AD FS 2.0 Deployment Topology

Conceptual topic AD FS 2.0 Deployment Topology Considerations


Review AD FS 2.0 capacity planning guidance to determine the proper number of federation server and federation server proxy servers you should use in your production environment.

Conceptual topic Planning for AD FS 2.0 Server Capacity


To effectively plan and implement the physical topology for the account partner deployment, determine whether your AD FS 2.0 design requires one or more federation servers or federation server proxies.

Checklist topic Checklist: Setting Up a Federation Server

Checklist topic Checklist: Setting Up a Federation Server Proxy


Determine the type of attribute store that you want to add to AD FS 2.0. Then, add the attribute store using the AD FS 2.0 Management snap-in.

Conceptual topic The Role of Attribute Stores

Procedure topic Add an Attribute Store


If you will need to send claims to or consume claims from a resource partner who is using either an AD FS 1.0 or 1.1 Federation Service, see the link to the right for information about how to configure AD FS 2.0 to interoperate with previous versions of AD FS. If the resource partner organization is also using AD FS 2.0 to send or consume claims to your organization, you can skip this step and continue with the next task in this checklist.

Conceptual topic Planning for Interoperability with AD FS 1.x


After you deploy the first federation server in the account partner organization, create a relying party trust relationship using the AD FS 2.0 Management snap-in. You can create a relying party trust by entering data about a resource partner manually or by using a federation metadata URL that the administrator of the resource partner organization provides to you. You can use the federation metadata to retrieve the data for the resource partner automatically.

If the resource partner publishes its federation metadata or can provide a file copy of it for you to use, we recommend that you retrieve the data automatically because it can save time.

Procedure topic Create a Relying Party Trust Manually

Procedure topic Create a Relying Party Trust Using Federation Metadata


Depending on the needs of your organization, create one or more claim rule sets for each relying party trust that is specified in the AD FS 2.0 Management snap-in so that claims will be issued appropriately.

Conceptual topic Checklist: Creating Claim Rules for a Relying Party Trust


A claim description must be created if one does not already exist that will fulfill the needs of your organization. AD FS 2.0 ships with a default set of claim descriptions that are exposed in the AD FS 2.0 Management snap-in.

Procedure topic Add a Claim Description


Determine whether your organization will need to use identity delegation to authorize or constrain a specified account to "act as" or impersonate other users. This is often a requirement when front-end Web applications must interact with back-end Web services.

Conceptual topic When to Use Identity Delegation


Prepare client computers for federation by:

  • Adding the URL for the account partner federation server to the trusted sites list for the client browser.

  • Using Group Policy to push the appropriate Secure Sockets Layer (SSL) certificates to client computers.

Conceptual topic Prepare Client Computers in the Account Partner

Procedure topic Configure Client Computers to Trust the Account Federation Server

Procedure topic Distribute Certificates to Client Computers by Using Group Policy

Community Additions