Note that even though users will authenticate using the SAML 2.0 protocol, all your Office 365 users need to be created (provisioned) in Azure AD, in order for 'Office 365' to recognise users that want to login. The tool that is being used to sync your domain users with the Azure AD is called AAD Connect.
When deciding whether to use SURFconext when you choose for federated login, keep in mind: when you contact Microsoft support to troubleshoot issues, it's likely they don't know SURFconext and SAML, and they might assume your problem is related to SURFconext. You could be told to check with the SURFconext team. Troubleshooting in a complex environment with large companies sometimes is complex enough, so it might help when the complete connection is Microsoft-only .
For institutions opting for federated authentication without SURFconext, the below information helps you configure such a connection.
This Step-by-Step guide contains several Powershell scripts and explanation for the following steps:
You can use parts of this script or run every step on the servers you want to configure. Be aware that every step has its own variables where you will have to set your own configuration options.
Step 1: Install the ADDS Role and DNS on your server(s)
In case you already have a domain set up, you may skip this step and continue with step 2
To use the AAD Connect tool and sync your users between your (on-premise) domain and the Azure AD, you would need a domain, and a domain controller. This Powershell script, will install the ADDS role and DNS. In case you already have a domain set up, you can skip this step.
Step 2: Create a Group Managed Service Account and install ADFS Role
In case you already have AD FS set up, you may skip this step and continue with step 3
To be able to federate through ADFS, you would need to install the ADFS role. Also you will need a service account for ADFS. We used a Group Managed Account. Check this blog for more information about Group Managed Service Accounts.
We used a scenario without an ADFS Proxy (WAP), but you could add an ADFS proxy to this setup.
Step 3: Run and finish the AAD Connect tool setup before you continue
You will need to have a working AAD Connect configuration before continuing with the next steps. In case you don't have a working AAD Connect setup, please follow the instructions in the setup guide below.
This guide contains the configuration steps, that we used and it is a working configuration for our reference topology. Of course there are many other configurations possible, so please choose the configuration, needed for your topology.
You can download the AAD Connect tool.
You can find more information on supported topologies.
There is also more information to be found about the express or custom installation of AAD Connect.
When you've finished the AAD Connect tool setup and let it configure your AD FS Farm, you will be able to logon to Office 365 via your AD FS servers.