Install IIS alongside ADFS 3.0 - asp.net

I understand ADFS 3.0 has removed the need for IIS and that it's run directly out of HTTP.SYS now.
So does this mean it's not even possible to add IIS back so one could implement a custom FormsAuth (web forms) type integration as you used to be able to do under ADFS 2.0?
Or is it all Shibboleth these days?
Edit: We've been able to successfully deploy our own custom authentication provider in ADFS 3.0 (adjacent to Active Directory) and use it to SSO into Office 365 so this is no longer required. See Implementing Office 365 single sign-on using custom authentication/claims provider in ADFS 3.0 (RE: AADSTS90019)

You can as long as the SSL bindings and routing for anything under /adfs, /federationmetadata remains the same. We've seen cases where this has not happened and resulted in the most painful of troubleshooting.
Thanks //Sam

If you mean can you install IIS on Server 2012 R2 to run apps., yes you can.
If you mean can you customise ADFS aspx pages as you used to be able to do, the answer is no but you can do some stuff with Javascript.

Related

ASP.NET with Windows Azure Active Directory SSO

I already have more than 10 applications developed using ASP.NET. There are different versions for frameworks 2.0, 3.5 and 4. Currently I need to apply single sign on on all of my applications using Windows Azure Active Directory SSO. But I do not know what the code or library should be added to my application to be configured with the Azure SSO. Do I need to re-develop my application or recreate it with different versions? Does anyone know what I should do?
Different .NET frameworks should not be a problem. You should be able to implement SSO for all of these applications, but you will need to add it individually to each one. You will need to add it in the code of the application itself and then register each application to your tenant.
Here is a very good tutorial that shows you step by step how to add SSO to a published web application in Azure using OpenID Connect. You can follow the steps exactly and build their demo version to test it out, or follow their steps at the bottom that show how to implement SSO in your own application.
https://github.com/Azure-Samples/active-directory-dotnet-webapp-openidconnect
Here is the official Microsoft documentation, which also describes how to implement SSO: https://learn.microsoft.com/en-us/azure/active-directory/active-directory-saas-custom-apps
Alternatively, if you want to use a library that is already integrated with Visual Studio, you can go to Project > Add Connected Service > Authentication with Azure Active Directory.
The "SSO" in this case refers to SAML. To do SAML in C#, look into Windows Identity Foundation (WIF), which includes some SAML support.
Note that doing SAML SSO involves more than just dropping in the right kind of username/password field. You need to have additional special pages to handle certain redirects, and have a way to store exchange saml metadata with your Azure AD identity provider. It can be painful.

Open LDAP implementation for SSO in ASP.NET MVC

Kind of weird to ask this question, I have successfully implement SSO for ASP.NET MVC with ADFS 2.0 on Windows Server 2008 R2, now my Web App needs to authenticate to another LDAP implementation which is Open-LDAP which is on non-windows platform basically a domain controller on linux. I am still not clear in my approach as if this is possible to implement SSO other then windows server Active Directory.
Please suggest an approach to implement the solution as the authentication will be on Open-LDAP.
Any reference implementation is highly appreciated.
ADFS can only authenticate against AD.
The next version on Server 2016 will be able to authenticate against Open-LDAP.
In the meantime, your only option is to federate ADFS with another IDP that can do this e.g. shibboleth.

WIF 3.5 + 4.5 compatibility

There seems to be plenty of examples of how to migrate from 3.5 to 4.5 but I'm struggling with a particular scenario.
I have several existing asp.net sites that are using WIF 3.5 to implement federated identity with an adfs 2.0 server.
Single sign in, and passive single sign out (wscleanup1.0) is all working fine.
No we are developing a new asp.net site and seeing as it's a new project we thought we should use WIF 4.5.
Single sign in is still working fine across all these apps. It doesn't matter which one you sign into first all of the others recognise the token and can read the claims.
We are, however, seeing an issue with single sign out.
If I initiate the signout from the site using WIF 4.5 everything works as expected. You're signed out of every app you have used during that session.
If, however, I initiate the signout from one of the sites using WIF 3.5 all of the sites using WIF 3.5 sign out as expected but the site using WIF 4.5 remains logged in.
Is this something that should be possible or are there incompatibilities between the versions which means it will never work?
I read here that the format of the cookie had changed but that's a year old now so I was looking for a more current answer.
Unable to decrypt claims cookie from .NET 4.5 to .NET 3.5

ASP.NET .NET Framework 1.0 and Authentication

I have an older ASP.NET (.NET 1.0) web application that is using Windows authentication. We want to remove the Windows authentication since the AD server for this particular web application needs to be decommission. We want to keep some type of authentication for this older web-application. I am thinking this leaves us with Forms and Passport authentication modes (but not sure of support in a .NET 1.0). I am trying to avoid a major rewrite since the web-application is not being used much anymore (only being used by one user). Any idea of a quick and simple solution to remove Windows authentication to something else for authentication?
If the domain controller is to be decommissioned I take it the entire office will reverted back to a domain-less workgroup environment. I also take it all workstations will be configured to leave the domain prior to destroying the domain controller once and for all.
Since it's only down to one user for a web application that has little value in enhancement, you may be able to get away by creating the very same user account with the same password on the web server. That way when s/he accesses the web app on that server, the Windows authentication mechanism will attempt to negotiate as SERVER\username in the local SAM store instead of relying on the previous DOMAIN\username account.

how to implement Converse.js An XMPP chat client for asp.net 4.0 web site

i just found one nice article about online chatting application with converse.js i read it's documentation and i like it. how ever i just have doubt it is there this chat facility can supported with asp.net 4.0 web site. Here i just want to know about in details is it supported with .net application.
here it's tells XMPP Chat server. Is there any additional cost for purchase it. After that how i setup this server for chat facility. here it's gives advice for identity i have to manually register user with it and i can use with my own web site.
Is there any one have idea how i implement this to my web site. Step By Step
Please help me..
Since you mentioned Asp.net so I am assuming you are talking about windows platform. I am using Openfire for XMPP messaging since last 5-6 years now and it is very easy to use and stable XMPP server. You can install it on your server and then configure Converse.js and XAMPP in conjunction with it to get web client chat feature. I referred this link to configure XAMPP along with Openfire: https://community.igniterealtime.org/docs/DOC-2954
Basic steps:
1. Install Openfire
2. Install XAMPP and configure as given in above link
3. Configure Converse.js in Asp.net application

Resources