Applies to: Exchange Server 2013

Topic Last Modified: 2012-10-09

A federation trust establishes a trust relationship between a Microsoft Exchange 2013 organization and the Microsoft Federation Gateway. By configuring a federation trust, you can configure federated sharing with other federated Exchange organizations to share calendar free/busy and contact information among recipients. Federated sharing can be configured between two federated Exchange 2013 organizations or between a federated Exchange 2013 organization and federated Exchange 2010 organizations.

Note:
Creating a federation trust is one of several steps in setting up federated sharing in your Exchange organization. To review all the steps, see Configure Federated Sharing.

For additional management tasks related to federation, see Federation Procedures.

What do you need to know before you begin?

  • Estimated time to complete: 30 minutes.

  • You need to be assigned permissions before you can perform this procedure or procedures. To see what permissions you need, see the “Federation and certificates” permissions entry in the Exchange and Shell Infrastructure Permissions topic.

  • The domain used for establishing a federation trust should be resolvable from the Internet. This requires that the domain be registered with a domain registrar and the Domain Name System (DNS) zone for the domain to be hosted on a DNS server accessible from the Internet. If the organization receives Internet email for the domain, these requirements are already met.

  • You will need to add a TXT record to your public DNS. Review the requirements for adding a TXT record with the organization that hosts your public DNS records.

  • For information about keyboard shortcuts that may apply to the procedures in this topic, see Keyboard Shortcuts in the Exchange Admin Center.

  • Both Exchange organizations in a federated sharing relationship must use the same Microsoft Federation Gateway instance for their federation trusts. This requirement applies when configuring federated sharing between two on-premises Exchange organizations or between an on-premises Exchange organization and an Exchange organization hosted by Microsoft Online Services or Microsoft Live@edu.

    When you create a federation trust with the Microsoft Federation Gateway for your Exchange 2013 organization, the federation trust will use the business or consumer instance of the Microsoft Federation Gateway. However, other federated Exchange organizations with previous versions of Exchange and existing federation trusts may be using either the business or consumer instance of the Microsoft Federation Gateway.

    The following Exchange organizations use the business instance of the Microsoft Federation Gateway by default:

    • Exchange 2013 organizations by using the Enable federation trust wizard and self-signed certificates for a federation trust.

    • Exchange 2010 SP1 or later organizations by using the New Federation Trust wizard and self-signed certificates for a federation trust.

    • Exchange organizations hosted by Microsoft Online Services, such as the Exchange Online service offered in Office 365.

    The following Exchange organizations use the consumer instance of the Microsoft Federation Gateway by default:

    • Release to manufacturing (RTM) version of Exchange 2010 organizations using certificates issued by third-party certification authorities.

    • Exchange organizations hosted by Microsoft Live@edu.

    We recommend that all Exchange organizations use the business instance of the Microsoft Federation Gateway for federation trusts. Before configuring federated sharing between the two Exchange organizations, you need to verify which Microsoft Federation Gateway instance each Exchange organization is using for any existing federation trusts. To determine which Microsoft Federation Gateway instance an Exchange organization is using for an existing federation trust, run the following Shell command.

    Copy Code
    Get-FederationInformation -DomainName <hosted Exchange domain namespace>
    
    The business instance returns a value of <uri:federation:MicrosoftOnline> for the TokenIssuerURIs parameter.

    The consumer instance returns a value of <uri:WindowsLiveID> for the TokenIssuerURIs parameter.

    To configure federated sharing with an Exchange organization that has an existing federation trust that's using the business instance of the Microsoft Federation Gateway, follow the steps in this topic. These steps are all you need to perform to create federation trusts that can be used to enable federated sharing between two Exchange 2013 organizations or between an Exchange 2013 organization and an Exchange 2010 organization that’s already using the business instance of the Microsoft Federation Gateway.

    To configure federated sharing between your Exchange 2013 organization and an Exchange organization that has an existing federation trust that's using the consumer instance of the Microsoft Federation Gateway, the Exchange organization using the consumer instance should install Exchange 2010 SP2 or later, or upgrade to Exchange 2013. If you decide to install Exchange 2010 SP2 or later, use the New Federation Trust wizard to remove and re-create the existing federated domains and federation trusts. When the federation trusts are re-created, the business instance of the Microsoft Federation Gateway will be used.

What do you want to do?

Use the EAC to create and configure a federation trust

  1. On an Exchange 2013 server in your on-premises organization, navigate to Organization > Sharing.

  2. Click Enable to start the Enable federation trust wizard.

  3. After the wizard completes, click Close.

  4. In the Federation Trust section of the Sharing tab, click Modify.

  5. In Sharing-Enabled Domains, next to Step 1, click Browse.

  6. In Select Accepted Domains, select the primary shared domain from the list, and then click OK.

    Note:
    The domain you select will be used to configure the OrgID for the federation trust. For more information about the OrgID, see Federation.
  7. Make a note of the federated domain proof that’s generated for the primary shared domain. You’ll use this string to create a TXT record on your public DNS server.

    Important:
    The federated domain proof is a string of alphanumeric characters. To avoid input errors, we recommend that you copy the string from the EAC, paste it into a text editor such as Notepad. You can then copy it from the text editor to the Clipboard, and then paste it into the Text field when creating the TXT record. If the TXT record is created by using an incorrect federated domain proof string, the Microsoft Federation Gateway won't be able to verify proof of domain ownership, and you won't be able to add it to the federated organization identifier.
  8. In Step 2, click Add Add Icon to add additional domains to the federated trust for email addresses that will used by users in your organization that require federated sharing features. For example, if you have users that use a subdomain in their email address such as sales.contoso.com, you’ would add the sales.contoso.com domain to the federation trust.

    Note:
    A federated domain proof string will be created for each additional domain selected. You must create separate TXT records on your public DNS for each additional domain.
  9. Using the federated domain proof strings created for each domain, create TXT records for each of these domains on your public DNS server. Depending on the update schedule of your public DNS host, replication of DNS changes may take 15 minutes or longer.

  10. After the TXT records are created and replicated, click Update.

Use the Shell to create and configure a federation trust

  1. This example creates a unique subject key identifier to be used with the certificate.

    Copy Code
    $ski = [System.Guid]::NewGuid().ToString("N")
    
  2. This example creates a self-signed certificate for the federation trust with the Microsoft Federation Gateway.

    Copy Code
    New-ExchangeCertificate -FriendlyName "Exchange Federated Sharing" -DomainName $env:USERDNSDOMAIN -Services Federation -KeySize 2048 -PrivateKeyExportable $true -SubjectKeyIdentifier $ski
    
  3. This example retrieves the self-signed certificate and creates the federation trust "Microsoft Federation Gateway". This automatically deploys the self-signed certificate to the Exchange servers in your organization.

    Copy Code
    Get-ExchangeCertificate | ?{$_.friendlyname -eq "Exchange Federated Sharing"} | New-FederationTrust -Name "Microsoft Federation Gateway"
    

For detailed syntax and parameter information, see New-ExchangeCertificate and New-FederationTrust.

How do you know this worked?

The successful completion of the Enable federation trust and Sharing-Enabled Domains wizards will be your first indication that the federation trust was configured as expected.

To further verify that you have successfully created and configured the federation trust, do the following:

  1. Run the following Shell command to verify the federation trust information.

    Copy Code
    Get-FederationTrust | format-list
    
  2. Run the following Shell command to verify that federation information can be retrieved from your organization.

    Copy Code
    Get-FederationInformation -DomainName <your primary sharing domain>
    

For detailed syntax and parameter information, see Get-FederationTrust and Get-FederationInformation.

Tip:
Having problems? Ask for help in the Exchange forums. Visit the forums at: Exchange Server, Exchange Online, or Exchange Online Protection