Apr 25 2017 02:23 AM
All of our SharePoint 2013/2016 installations use ADFS as STS together with HNSC. From what I read this is supposed to be best practice and while I don't mind (actually like) the HNSC part, using anything but Windows claims seems to give us a lot of grief.
Anyway, I'm sure you get my point. Is using ADFS for an SP2013 on prem installation really the right way to go ?
Apr 25 2017 07:40 AM
Apr 26 2017 12:39 AM - edited Apr 26 2017 12:39 AM
So you say: Use Windows Claims inside of SharePoint and no ADFS Services as IDP. But use Web Application Proxy for publishing SharePoint as an non-claims aware application ?
Apr 26 2017 09:08 AM
Jun 28 2018 08:28 AM
Hi Trevor,
I was about to use ADFS with SharePoint 2013 to enable SSO with another third party application hosted on ColdFusion and using a custom database, by creating trust between ADFS and STS of that application, let me know if that is the right way to go?
Thanks
Paramdeep Singh
Jun 28 2018 08:41 AM
Aug 17 2018 08:37 PM
HI Trevor,
I have similar situation with one external face hub site using ADFS/SAML. I need to publish an SharePoint 2016 site for external access, and hub site can have single sign-on to SP2016 site. As current SP2016 site is using Kerberos and has lot of SSRS reports, BI an data warehousing connections, it is might not be suitable to use ADFS/SAML as ideneity provider.
Could you please kindly advise whether by using ADFS 3.0 non-claim aware to publish SP2016 site will give me SSO from hub site (SMAL) to SP2016 site (Kerberos)? Thanks.