Microsoft Entra ID provides a simple cloud-based sign-in experience to all your resources and apps with strong authentication and real-time, risk-based adaptive access policies to grant access to resources reducing operational costs of managing and maintaining an AD FS environment and increasing IT efficiency.
For more info on why you should upgrade from AD FS to Microsoft Entra ID, visit moving from AD FS to Microsoft Entra ID. See migrate from federation to cloud authentication to understand how to upgrade from AD FS.
https://www.youtube-nocookie.com/embed/D0M-N-RQw0I
This document will provide you with the recommended steps for decommissioning your AD FS servers.
Pre-requisites for decommissioning AD FS servers
Before you begin decommissioning your AD FS Servers, ensure the following items are complete. For more information, see migrating from federation to cloud authentication.
- Install Microsoft Entra Connect Health to provide robust monitoring of your on-premises identity infrastructure.
- Complete the pre-work for single sign-On (SSO).
- Migrate your user authentication to Microsoft Entra ID. With cloud authentication enabled, Microsoft Entra ID is capable of handling the users’ sign-in process securely. Microsoft Entra ID provides you with three options for secure cloud authentication of users:
- Microsoft Entra Password Hash Synchronization (PHS) – Allows your users to sign-in to both on-premises and cloud-based applications using the same passwords. Microsoft Entra Connect synchronizes a hash of a hash of a user’s password from an on-premises Active Directory instance to a cloud-based Microsoft Entra instance. The two layers of hashing ensure your passwords are never exposed or transmitted to cloud systems.
- Microsoft Entra Certificate Based Authentication (CBA) – Enables you to adopt a phishing resistant authentication method and authenticate users with an X.509 certificate against your Public Key Infrastructure (PKI).
- Microsoft Entra pass-through authentication (PTA) – Allows your users to sign-in to both on-premises and cloud-based applications using the same passwords. It installs an agent on your on-premises Active Directory and validates the users’ passwords directly against your on-premises Active Directory.
- PHS & CBA are the preferred options for cloud managed authentication. PTA must be used only in cases where there are regulatory requirements to not synchronize any password information to the cloud.
- User authentication and App Migration can be done in any order, however, it is recommended to complete user authentication migration first.
- Make sure to evaluate the supported and not-supported scenarios for Staged Rollout.
- Migrate all your applications that are currently using AD FS for authentication to Microsoft Entra ID, as it gives you a single control plane for identity and access management to Microsoft Entra ID. Ensure you also migrate your Office 365 applications and joined devices to Microsoft Entra ID.
- Migration assistant can be used for migrating applications from AD FS to Microsoft Entra ID.
- If you don’t find the right SaaS application in the app gallery, they can be requested from https://aka.ms/AzureADAppRequest.
- Ensure to run Microsoft Entra Connect Health for at least one week to observe the usage of apps in Microsoft Entra ID. You should also be able to view user sign-in logs in Microsoft Entra ID.
Steps to decommission your AD FS Servers
This section provides you with the step-by-step process to decommission your AD FS servers.
Before reaching this point, you must verify that there’s no relying party (Replying Part Trusts) with traffic which are still present in the AD FS servers.
Before you begin, check the AD FS event logs and/or Microsoft Entra Connect Health for any sign-in failures or success as that would mean these servers are still being used for something. In case you see sign-in successes or failures, check how to migrate your apps from AD FS or move your authentication to Microsoft Entra ID.
Once the above is verified, you can take the following steps (assuming the AD FS servers aren’t used for anything else now):
Note
After you moved your authentication to Microsoft Entra ID, test your environment for at least one week to verify cloud authentication is running smoothly without any issues.
- Consider taking an optional final backup before decommissioning AD FS servers.
- Remove any AD FS entries from any of the load balancers (internal as well as external) you might have configured in your environment.
- Delete any corresponding DNS entries of the respective farm names for AD FS servers in your environment.
- On the primary AD FS server run
Get-ADFSProperties
and look for CertificateSharingContainer. Keep a note of this DN, as you’ll need to delete it near the end of the installation (after a few reboots and when it isn’t available anymore) - If your AD FS configuration database is using a SQL Server database instance as the store, ensure to delete the database before uninstalling AD FS servers.
- Uninstall the WAP (Proxy) servers.
- Sign in to each WAP server, open the Remote Access Management Console and look for published web applications.
- Remove any related to AD FS servers that aren’t being used anymore.
- When all the published web applications are removed, uninstall WAP with the following command Uninstall-WindowsFeature Web-Application-Proxy,CMAK,RSAT-RemoteAccess.
- Uninstall the AD FS servers.
- Starting with the secondary nodes, uninstall AD FS with Uninstall-WindowsFeature ADFS-Federation,Windows-Internal-Database command. After this run del C:\Windows\WID\data\adfs* command to delete any database files
- Delete AD FS Secure Socket Layer (SSL) certificates from each server storage.
- Re-image AD FS servers with full disk formatting.
- You can now safely delete your AD FS account.
- Remove the content of the CertificateSharingContainer DN using ADSI Edit after uninstallation.
Ref: Active Directory Federation Services (AD FS) decommission guide | Microsoft Learn