Scenario 1: Federated authentication: TotalAgility on-premise and AD

The following diagram describes claims-based authentication where TotalAgility on-premise uses federated security to authenticate with a local on-premise installation of Windows Server AD FS 2.0.

Claims-based authentication: TotalAgility on-premise and AD

One

The Client logs in to the domain (Windows Server AD) using the credentials (Username and Password) and Windows Server AD gets the Kerberos ticket.

Two

The Client accesses TotalAgility.

Three

Windows Server AD presents the Kerberos ticket to AD FS 2.0 and requests a token.

Four

Windows Server AD finds claims required by TotalAgility and creates a token.

Five

Windows Server AD with AD FS 2.0 provides STS that authenticates the Client and returns the claims token.

Six

Windows Server AD submits the token to TotalAgility (relying party) via the Client.

Seven

TotalAgility uses the token issued by STS and extracts the claims from the token.