Search not working in federated SAML authentication SharePoint site

 Situation:

Created a web application and chosen “Default zone” for Trusted Identify Provider authentication “iTrust” – (SAML Authentication)

Note: Trusted Identity Provider Authentication enables federated users in this Web application. This authentication is Claims token based and the user is redirected to a login form for authentication.

 

Issue:

Site is working fine but “Search” didn’t work. When checked for the reason, found that the default zone should be windows authentication which makes ‘Search” work.

Resolution:

-         -  Need to create standard default zone windows authentication (Though this is not required – as the site created is for federated authenticated external users with SAML authentication).

-          - Then extend the windows default zone application into Trusted Identity provider “Extranet/Any available zone” site.

 

Step1: Default zone windows authentication web application

-         -- Create a new webapplication and provide the port number and host header you would like

(Ex: Port Number:301, Host Header: auth.extranet.niddk.nih.gov)

-       --   Select SSL and unselect “Anonymous” access (This is based on my requirement)

-         -- Now the url would read like (https://auth.extranet.niddk.nih.gov:301)

-          -- Select windows authentication

-          -- Default zone will be already selected, and it will be in “read” mode. You cannot change the zone, since this is the new webapplication. Very first time all webapplications will be created in “Default” zone

-          -- Click “Create”

-          -- Now webapplication with default zone on windows authentication is created.

-          Then create empty root site collection and that’s is for the 1st step

 

Step2: Extend the web application in different zone with federated authentication

-          -- Select the web application from the CA and click “Extend” from the top ribbon

-         -- Now provide the default port number (80/443) and provide the host header

(Example: Port Number: 443, Host Header: auth.extranet.niddk.nih.gov)

-          -- If you see – Host Header for both default zone and other zone is same. Only differentiating factor is the port number

-          -- Select “Trusted Identity Provider”, my case “iTrust” and unselect “Windows Authentication”.

-        --   After you unselect “Windows Authentication”, you will see an alert “If Windows authentication is not selected on any Zone of this Web application, crawling for this Web application will be disabled”.

-          Above alert message is fully correct – Windows authentication should be enabled for default zone and not for any other zone. In my case I have created windows authentication for “Intranet zone” and created Federated iTrust with default zone. But “Search” is not working.

-          This is not an issue here, as we have already created a web application(step1) with default zone and windows authentication. It will take care of crawling for – its own webapplication, extended web application, site collections created on default web application and site collections created on extended web application (Whether the site collection is path based/host named – doesn’t matter)

-        --   Once the web application is extended, go to front end server, open IIS

-          -- Select the default windows authentication website(with port number in our case- to differentiate from iTrust site, you can even give different host header name) from IIS and select Bindings to add the extended site.

-          -- Select https, port number: <<>>, host header which you gave while creating web application, check “Require Server Name Indication” and select SSL certificate

-          -- Reset IIS

-          -- Now select extended web application and add Bindings

-          -- https, Port number:443, host header and check “Require Server Name Indication” and select SSL certificate

--    --   IIS reset

Comments

Popular posts from this blog

Power BI Refresh Issue: unable to convert the value '' from the source data type 'VT_BSTR' to the expected data type 'VT_I8.

Run Powershell script on Remote Computer/Server

SPDActivities - DP.SharePoint.Workflow - Workflow failed to run