Publish and consume SharePoint Service applications
SharePoint 2013 some
service applications can be shared across the server farms. We can publish the
following service applications in a SP 2013 farm,
·
Business Data Connectivity
·
Machine Translation
·
Managed Metadata
·
User Profile
·
Search
·
Secure Store
The farm
that contains the service application and publishes the service application so
that other farms can consume the service application is known as the Publishing farm. The farm that connects
to a remote location to use a service application that the remote location is
hosting is known as the Consuming farm.Following steps are required and must be performed in the order listed to publish and consume the service applications,
1. Exchange
trust certificates between the farms.
2. Publish
the service application on the publishing farm.
3. Set the
permission to the appropriate service applications.
4. Connect
to the remote service application on the consuming farm.
5. Add the
shared service application to a web application group on the consuming farm.
6. Configure
server-to-server authentication between the publishing and consuming farm.
Exchange trust certificates between farms
Administrator of the Consuming
farm must provide two trust certificates to the administrator of the Publishing
farm,
1. Root
certificate (Consuming farm à Publishing farm)
2. Security
token service certificate(STS) (Consuming farm à
Publishing farm)
Administrator of the
Publishing farm must provide a root certificate to the administrator of the
consuming farm.
3. Root
certificate (Publishing farm à Consuming farm)
By exchanging
certificates, each farm acknowledges that other farm can be trusted.
1.1 To export the root certificate from the
consuming farm
Start à All Programs à Microsoft SharePoint 2013 Products à SharePoint 2013 Management Shell
$rootCert =
(Get-SPCertificateAuthority).RootCertificate
$rootCert.Export("Cert") | Set-Content <C:\ConsumingFarmRoot.cer> -Encoding byte |
<C:\ConsumingFarmRoot.cer> is the path of the root certificate.
1.2 To export the STS certificate from the
consuming farm
Start à All Programs à Microsoft SharePoint 2013 Products à SharePoint 2013 Management Shell
$stsCert = (Get-SPSecurityTokenServiceConfig).LocalLoginProvider.SigningCertificate $stsCert.Export("Cert") | Set-Content <C:\ConsumingFarmSTS.cer> -Encoding byte |
<C:\ConsumingFarmSTS.cer> is the path of the STS certificate
1.3 To export the root certificate from the
publishing farm
Start à All Programs à Microsoft SharePoint 2013 Products à SharePoint 2013 Management Shell
$rootCert = (Get-SPCertificateAuthority).RootCertificate $rootCert.Export("Cert") | Set-Content <C:\PublishingFarmRoot.cer> -Encoding byte |
<C:\PublishingFarmRoot.cer> is the path of the root certificate.
1.4 Copy the certificates
- Copy the root certificate and the STS certificate from the server in the consuming farm to the server in the publishing farm.
- Copy the root certificate from the server in the publishing farm to a server in the consuming farm.
1.5 Establishing trust on the consuming farm
To import the
root certificate and create a trusted root authority on the consuming farm,
Start à All Programs à Microsoft SharePoint 2013 Products à SharePoint 2013 Management Shell
$trustCert = Get-PfxCertificate
<C:\PublishingFarmRoot.cer>
$trustCert = Get-PfxCertificate
.\HOT_Q_F06_PublishingFarmRoot.cer
New-SPTrustedRootAuthority Publishing
Farm_HOT_Q_F06 -Certificate $trustCert
|
- <C:\PublishingFarmRoot.cer> is the path of the root certificate that you copied to the consuming farm from the publishing farm.
- <PublishingFarm> is a unique name that identifies the publishing farm. Each trusted root authority must have a unique name. Ex: WFEFarm1
1.5 Establishing trust on the publishing farm
To import the
root certificate and create a trusted root authority on the publishing farm,
Start à All Programs à Microsoft SharePoint 2013 Products à SharePoint 2013 Management Shell
$trustCert = Get-PfxCertificate
<C:\ConsumingFarmRoot.cer>
$trustCert = Get-PfxCertificate
.\HOT_Q_F08_ConsumingFarmRoot.cer
New-SPTrustedRootAuthority
ConsumingFarm_HOT_Q_F08 -Certificate $trustCert
|
- <C:\ConsumingFarmRoot.cer> is the name and location of the root certificate that you copied to the publishing farm from the consuming farm.
- <ConsumingFarm> is a unique name that identifies the consuming farm. Each trusted root authority must have a unique name.
To import the
STS certificate and create a trusted service token issuer on the publishing
farm,
$stsCert = Get-PfxCertificate
<c:\ConsumingFarmSTS.cer>
$stsCert = Get-PfxCertificate
.\HOT_Q_F08_ConsumingFarmSTS.cer
New-SPTrustedServiceTokenIssuer
ConsumingFarm_HOT_Q_F08 -Certificate $stsCert
|
- <C:\ConsumingFarmSTS.cer> is the path of the STS certificate that you copied to the publishing farm from the consuming farm.
- <ConsumingFarm> is a unique name that identifies the consuming farm. Each trusted service token issuer must have a unique name.
1.6 Managing trust certificates by
using Central Administration (Optional)
We can
manage trusts on a farm only after the relevant certificates have already been
exported and copied to the farm. Following steps must be performed on
Publishing and consuming farm,
- Verify that the user account that is performing this procedure is a member of the Farm Administrators SharePoint group.
- Central Administration à Security à General Security à Manage trust à New
- On the Establish Trust Relationship page,
a. Supply a name that describes the
purpose of the trust relationship.
b. Browse to and select the Root
Authority Certificate for the trust relationship. This must be the Root
Authority Certificate that was exported from the other farm by using
PowerShell.
c. Only on Publishing Farm: Select the
check box for ‘Provide Trust Relationship’. Type in a
descriptive name for the token issuer and browse to and select the STS
certificate that was copied from the consuming farm. Click Ok.
Publish service application
On the farm on which
the service application is located, an administrator must explicitly publish
the service application. Service applications that are not explicitly published
are available to the local farm only.
To publish a
service application by using Central Administration,
- Verify that the user account that is performing this procedure is a member of the Farm Administrators SharePoint group.
- Central Administration à Application Management à Manage service applications.
- Choose the service application want to publish. On the Ribbon, Click Publish.
- In the Publish Service Application dialog box:
a.
Select the Connection Type
that we want from the drop-down list.
http
b. If we want the service application to be
available to remote farms, select the check box for Publish
this Service Application to other farms.
checked
c.
We have already
established trust between the farms. So we can check and see trust establishment by clicking the link Click here to add a trust relationship with
another farm.
d.
Copy the
Published URL into Notepad or another text editor. We must provide this URL to
remote farms to connect the remote farms to the published service application.
The URL will be similar to the following:
urn:schemas-microsoft-com:sharepoint:service:0d755965a89a43bfa93ad5d4b2e3f616#authority=urn:uuid:fa85d318d294438a83116e8c0b24ade6&authority=https://defnsvxxx:32844/Topology/topology.svc
To
publish a service application by using PowerShell(optional),
Start à All
Programs à Microsoft
SharePoint 2013 Products à SharePoint 2013 Management Shell
Publish-SPServiceApplication
-Identity <ServiceApplicationGUID>
|
- <ServiceApplicationGUID> GUID of the service application
To get the
GUID of the service application Run the following command,
Get-SPServiceApplication
|
To view the
published service application load balancer URL, type the following command and
record the output. Any connecting remote farms will need the information that
is generated by this command.
Get-SPTopologyServiceApplication
|
Set Permission to Published service application
We must give the
consuming farm permission to the Application Discovery and Load Balancing
Service Application on the publishing farm. After doing this, give the
consuming farm permission to the published service applications that it will be
consuming.
We must establish a
relationship between the publishing farm and the consuming farm by giving the
consuming farm permission to the Application
Discovery and Load Balancing Service Application first and other published service applications on
the publishing farm.
- Set the permission to the Application Discovery and Load Balancing Service Application
- Set the permission to other published service applications.
Start à All Programs à Microsoft SharePoint 2013 Products à SharePoint 2013 Management Shell
Get-SPFarm | Select Id
9da7ccab-2c24-4d50-abd4-9ce95784ce91
|
- Returns GUID value of the consuming farm
Run on the following commands on server in the publishing farm for giving the consuming farm permission to the Application Discovery and Load Balancing Service Application,
$security=Get-SPTopologyServiceApplication
| Get-SPServiceApplicationSecurity
$claimprovider=(Get-SPClaimProvider
System).ClaimProvider
$principal=New-SPClaimsPrincipal
-ClaimType
"http://schemas.microsoft.com/sharepoint/2009/08/claims/farmid"
-ClaimProvider $claimprovider -ClaimValue 9da7ccab-2c24-4d50-abd4-9ce95784ce91
Grant-SPObjectSecurity -Identity
$security -Principal $principal -Rights "Full Control"
Get-SPTopologyServiceApplication |
Set-SPServiceApplicationSecurity -ObjectSecurity $security
|
- Consumingfarmid is the GUID value of the consuming farm
Run on the following commands on server in the publishing farm for giving the consuming farm permission to the Application Discovery and Load Balancing Service Application,
Get-SPServiceApplication –id fa85d318-d294-438a-8311-6e8c0b24ade6
$security=Get-SPServiceApplication
fa85d318-d294-438a-8311-6e8c0b24ade6 | Get-SPServiceApplicationSecurity
$claimprovider=(Get-SPClaimProvider
System).ClaimProvider
$principal=New-SPClaimsPrincipal
-ClaimType
"http://schemas.microsoft.com/sharepoint/2009/08/claims/farmid"
-ClaimProvider $claimprovider -ClaimValue 9da7ccab-2c24-4d50-abd4-9ce95784ce91
Grant-SPObjectSecurity -Identity
$security -Principal $principal -Rights "Full Control"
Set-SPServiceApplicationSecurity fa85d318-d294-438a-8311-6e8c0b24ade6
-ObjectSecurity $security
|
- <ServiceApplicationName> is the name of the service application for which you want to find the ID. If the service application name contains spaces, enclose the value in double-quotation marks.
- <Consumingfarmid> is the GUID value of the consuming farm
- <GUID> is the ID of the published service application.
1. On publishing farmà SharePoint Central Administration website à verify that the user account that is performing this procedure is a
member of the Farm Administrators SharePoint group.
2. Navigate Application Management à Manage service applications à Application Discovery and Load Balancing Service Application.
3. On the ribbon, click Permissions
On a server in the consuming farm to get the Consuming farm ID,
Start à All
Programs à Microsoft
SharePoint 2013 Products à SharePoint 2013 Management Shell
Get-SPFarm | Select Id
|
Returns
GUID value of the consuming farm
4. In the
Connection Permissions dialog box,
a. Manually
paste the ID of the consuming farm from the PowerShell section à Click
Add
b. Select
the consuming farm ID, and then select the Full Control check box. à Click OK
5. Repeat steps 2 through 4 for any published service applications for
which you want to enable access from the consuming farm and assign the
necessary permission.
Connect to service applications on Remote farms
After the publishing farm has published the service application, an administrator of the consuming farm can connect to that service application from the consuming farm if the address of the specific service application is known.To connect to a service application on a remote farm by using Central Administration
1. Verify
that you are a member of the Farm Administrators SharePoint group
2. On a
server in the Consuming farm, SharePoint Central Administration à Application
Management à Manage service applications.
3. On ribbon, click Connect
4. On the Connect
drop-down menu, click the kind of service application to which you want to
connect.
5. On the
Connect to a Remote Service Application page, type the appropriate URL in the Farm
or Service Application address text box, and then click OK
urn:schemas-microsoft-com:sharepoint:service:0d755965a89a43bfa93ad5d4b2e3f616#authority=urn:uuid:fa85d318d294438a83116e8c0b24ade6&authority=https://defnsvxxxx:32844/Topology/topology.svc
6. On the
Connect to a Remote Service Application page, type the appropriate URL in the Farm
or Service Application address text box, and then click OK
7. The new Connect
to a Remote Service Application dialog box displays the service
applications that match the URL that you typed in Step 5. Click the row that
contains the name of the service application, and then select the check box to
add the service application connection to the farm’s default list of service
application connections (that is, the default proxy group). Click OK.
8. We are
prompted to change the connection name. Type a new name into the Connection
Name text box or leave the default name, and then click OK
9. After
the new connection is created, we must click OK to complete the
procedure.
10. Associate
the new service application connection with a local Web application.
To connect
to a service application on a remote farm by using PowerShell(optional)
Start à All
Programs à Microsoft
SharePoint 2013 Products à SharePoint 2013 Management Shell
To get the PublishingFarmTopologyURL,
Receive-SPServiceApplicationConnectionInfo
-FarmUrl <PublishingFarmTopologyURL>
|
<PublishingFarmTopologyURL>
is the information that is retrieved by running the Get-SPTopologyServiceApplication
cmdlet on the publishing farm below,
New-SP*ServiceApplicationProxy
-Name " <ServiceApplicationProxyName>" -Url
"<PublishingFarmTopologyURL>"
|
- <ServiceApplicationProxyName> is a unique name for a service application connection on the consuming farm.
- <PublishingFarmTopologyURL> is the service application topology URL that was also used in the previous command.
Example:
Following command creates a new Managed Metadata service application proxy
named "MetadataServiceProxy1" that connects to the service
application located at the stated URL.
Example:
New-SPMetadataServiceApplicationProxy
-Name "MetadataServiceProxy1" -Uri "
urn:schemas-microsoft-com:sharepoint:service:9c1870b7ee97445888d9e846519cfa27#authority=urn:uuid:02a493b92a5547828e21386e28056cba&authority=https://ua_powershell:32844/Topology/topology.svc "
|
Add or remove service application connections from a web application
An administrator must
associate the new service application connection with a local Web application
on the consuming farm. Only Web applications that are configured to use this
association can use the remote service application.
To edit a
service connection group by using Central Administration,
- Central Administration à Application Management à Service Applications à Configure service application associations
- On the Service Application Associations page, select Web Applications from the View drop-down menu.
- In the list of Web applications, in the Application Proxy Group column, click the name of the service application connection group that we want to change
- To add a service connection to the group, select the check box that is next to the service application that you want to add to the connection group.
- click OK
To add a
service application connection to a service application connection group by
using PowerShell (optional)
$serviceAppProxy =
Get-SPServiceApplicationProxy | where { $_.Name -eq "Name of the
service" }
$proxygroup =
Get-SPServiceApplicationProxyGroup | where { $_.FriendlyName -eq
"[default]" }
Add-SPServiceApplicationProxyGroupMember
-Identity $proxygroup -Member $serviceAppProxy
|
Configure permissions for Default Content Access Account
Configure server-to-server authentication between publishing and consuming farms
To enable the webapplication
or application service to request the resource from another farm on behalf of
the user we must configure server–to– server authentication between Publishing
and consuming farms.
To configure
server-to-server authentication between publishing and consuming farms,
- Choose a realm name that will be common to both farms. here realm name is “8db904b3-e2c7-4a9d-9541-0bc8cf08f4e1”
http://xxxx//_layouts/15/metadata/json/1
{"issuer":"00000003-0000-0ff1-ce00-000000000000@8db904b3-e2c7-4a9d-9541-0bc8cf08f4e1","keys":[{"keyValue":{"type":"x509certificate","value":"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"},"usage":"Signing"}],"name":"00000003-0000-0ff1-ce00-000000000000","serviceName":"00000003-0000-0ff1-ce00-000000000000"}
name identifier for the STS
Realm value
X509 Certificate Value
- To configure the Name ID for the SharePoint Security Token Service (STS) on the publishing farm to include the common realm name, type the following commands at the PowerShell command prompt on a server in the publishing farm
$sts=Get-SPSecurityTokenServiceConfig
$Realm=Get-SpAuthenticationRealm
$nameId =
"00000003-0000-0ff1-ce00-000000000000@$Realm"
Write-Host "Setting STS
NameId to $nameId"
$sts.NameIdentifier = $nameId
$sts.Update()
|
- To configure the Name ID for the SharePoint STS on the consuming farm to include the common realm name, type the following commands at the PowerShell command prompt on a server in the consuming farm:
$sts=Get-SPSecurityTokenServiceConfig
$Realm=Get-SpAuthenticationRealm
$nameId =
"00000003-0000-0ff1-ce00-000000000000@$Realm"
Write-Host "Setting STS
NameId to $nameId"
$sts.NameIdentifier = $nameId
$sts.Update()
|
- To configure the publishing farm for server-to-server authentication with the consuming farm,
New-SPTrustedSecurityTokenIssuer
-MetadataEndpoint
"https://<ConsumeHostName>/_layouts/15/metadata/json/1" -Name
"<ConsumeFriendlyName>"
|
- <ConsumeHostName> is the name and port of the web application of the consuming farm.
- <ConsumeFriendlyName> is a friendly name for the consuming farm.
- To configure the consuming farm for server-to-server authentication with the publishing farm,
New-SPTrustedSecurityTokenIssuer
-MetadataEndpoint
"https://<PublishHostName>/_layouts/15/metadata/json/1" -Name
"<PublishFriendlyName>"
|
- <PublishHostName> is the name and port of any SSL-enabled web application of the publishing farm.
- <PublishFriendlyName> is a friendly name for the publishing farm.
This creates the
server-to-server authentication trust with the publishing farm.
No comments:
Post a Comment