Consider the following scenario:
- Forest A is a user forest that contains user accounts, a server that is running Internet Information Services (IIS), and an ADFS server.
- Forest B is a Perimeter Network forest (also known as DMZ, demilitarized zone, and screened subnet) that contains a Windows Application Proxy (WAP) server.
- All domain controllers are running Windows Server 2012 R2.
- Two-way forest trust is built between Forest A and Forest B.
- Both the Web Application Proxy (WAP) and IIS services are running under a Network Service account.
- You have configured Kerberos constrained delegation (KCD), and set the PrincipalsAllowedToDelegateTo value on the IIS machine account to the WAP server machine object. For more information, see Kerberos Constrained Delegation Overview.
- A user in Forest A want to authenticate to the WAP server in forest B.
- WAP authentication is handled by ADFS in ADATUM, and a token that has a UPN claim is returned to the WAP server. The WAP server uses the token to use KCD to access the server that's running IIS.