Scenario 8: Federated authentication: TotalAgility Azure with Azure ACS and on-premise AD
The following diagram describes claims-based authentication where TotalAgility Azure uses federated security to authenticate with Azure ACS and on-premise AD.
![]() |
The Client accesses TotalAgility, and Windows Server AD learns which STSs it trusts. |
![]() |
The Client accesses Azure ACS, and Azure ACS learns which STSs it trusts. |
![]() |
Windows Server AD with AD FS 2.0 provides STS that authenticates the Client and returns an IdP token for TotalAgility. |
![]() |
Windows Server AD submits the IdP token to Azure ACS via the Client. |
![]() |
Azure ACS validates the IdP token and creates an FP token. |
![]() |
Azure ACS returns the token for TotalAgility. |
![]() |
Azure ACS submits the token to TotalAgility via the Client. |
![]() |
TotalAgility uses the token issued by STS and extracts the claims from the token. |