Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (2024)

Introduction

This is part 4 of a 4-part “Routing and Remote Access” series. This part covers how to configure Web Application proxy in Windows Server 2016.

Web Application Proxy (WAP) is a Remote Access role introduced with Windows Server 2012 R2. It is used to publish web applications that end users can interact with from any device.

Setup Requirements for Web Application proxy in Windows Server 2016

  1. Domain Controller
  2. Certificate Authentication Server
  3. Web Application Proxy Server

To install AD FS to use with Web Application Proxy in Windows Server 2016, the following conditions must be met:

  1. The AD FS server must be joined to the domain
  2. The Web Application Proxy server cannot be installed on the same computer as the Federation service server.

And the certificate must meet the following requirements:

  1. A Server Authentication option as an applicable policies
  2. It must have a Private key
  3. A subject with the AD FS server name in FQDN format

Effectively, you require 2 separate servers to set up WAP in Server 2016:

  1. A server with Active Directory Domain Services installed. AD Federation Service will also be installed on this server
  2. Another server act as the WAP Server.

Before you proceed with the steps in this guide you need to install Remote Access Role with Web Application Proxy role service. To install Remote Access, read part 1 of this series.

Steps to Enable and Setup Web Application proxy in Windows Server 2016

To fully configure WAP in Windows Server 2016, complete these 5 steps:

  1. Install Active Directory Federation Service (AD FS)
  2. Generate a Self Signed Certificate for AD FS
  3. Configure AD FS
  4. Setup a Proxy Server Certificate on the WAP Server
  5. ConfigureWeb Application Proxy

The certificates created and used in this guide are for test purposes. If you are setting up WAP in a production environment you have to order a certificate from a certificate issuing authority.

Install Active Directory Federation Service (AD FS)

Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (1)

AD FS requires a service account. The first step is to create one in AD.

Here are the steps:

  • Login to a DC and open Server Manager.
  • From Server Manager, click Tools. Then select Active Directory Users and Computers
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (2)
  • Right-click the container you wish to create your service account. Then point to New and click User.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (3)
  • On the New object – user screen, enter the details of the service account. Note the user logon name – mine is ADFSService. When you finish, click Next.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (4)
  • Then enter a password for the service account and repeat the password. Beneath the password fields, uncheck every other box. Then check Password never expires and click Next.

From Windows server 2012, Microsoft introduced Managed Service Accounts (MSA) and Grouped Managed Service Accounts (gMSA). It is better to use MSA and gMSA as passwords are managed by AD. To read more about MSA and how to use it, click Managed Service Accounts: Understanding, Implementing, Best Practices, and Troubleshooting.

Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (5)
  • Finally, to create the account, click Finish.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (6)

Now, you can install AD FS. To install AD FS:

  • Login to your Domain Controller and open Server Manager.
  • From Server Manager, click Manage. Then select Add Roles and Features.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (7)
  • When the first page opens, click Next.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (8)
  • On the Select installation type screen, select Role-based or feature-based installation. Then click Next.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (9)
  • Then select the server to install the role and click Next.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (10)
  • On the Select server roles screen, check the box beside Active Directory Federation Services. Click Next.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (11)
  • Then on the Select features screen, click Next….
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (12)
  • If you wish you can read the information about AD FS. When you are ready click Next.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (13)
  • On the final screen, check the box beside Restart the destination server automatically if required. This will prompt for confirmation. Click Yes. Then, to begin installation, click Install.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (14)
  • When the installation is completed, click Close.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (15)

Generate a Self Signed Certificate for AD FS

Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (16)

The certificate generated using the steps in this guide is for test purposes. If you are deploying AD FS and WAP in a production you need to request a public certificate. Follow the steps in Generate CSR with MMC.

AD FS requires a certificate to function. Perform this task on the server you installed AD FS role.

  • Press Windows + R key to open Run command. Then type MMC and click OK.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (17)
  • When MMC opens click File. Then select Add/Remove Snap-in..
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (18)
  • Highlight Certificates and click Add.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (19)
  • When the Certificates snap-in opens, select Computer account and Next.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (20)
  • Then select Local computer> (the computer this console is running on) and click Finish.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (21)
  • On the Add or Remove Snap-ins, click OK. The local certificate store will be loaded. Before you continue save the MMC (File -> Save as).
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (22)
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (23)
  • Expand Certificates (Local computer). Then right-click Personal, point to All Tasks -> Request New Certificate...
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (24)
  • When Certificate Enrollment opens, click Next.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (25)
  • Then click Active Directory Enrollment Policy and click Next.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (26)
  • On the Request Certificates page, check Computer.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (27)
  • Expand the downward arrow beside Details, click Properties. On the General tab type a friendly name for the certificate.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (28)
  • Then click the Subject tab. Beneath Alternative name: on the Type drop-down select User Principal Name. Then type ServerName.Domain.Extension and click Add. See the image below for my example.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (29)
  • Click Extensions tab. Then on the Available options: highlight Server Authentication and Add>. Also, highlight Client Authentication and Add>. When you finish, it should look like the image below.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (30)
  • Click the Private key tab. Expand Cryptographic Server Provider. Then check Microsoft RSA SChannel Provider (Encryption).
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (31)
  • Still on Private key tab, expand Key options. Then on the Key size drop-down, select 2048. Also check Make private key exportable. Finally, click Apply and then OK.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (32)
  • Back to Request Certificates, click Enroll.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (33)
  • When the Certificate is fully enrolled, click Finish.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (34)
  • To see the certificate details, click Certificate node below Personal folder.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (35)

Web Application Proxy in Windows Server 2016: Configure AD FS

Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (36)

The next step in the setup of Web Application Proxy in Windows Server 2016 is to configure AD FS.

Here are the steps:

  • From Server Manager, click the amber triangle. Then select Configure the federation service on this server.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (37)
  • On the Welcome screen, select Create the first federation server in a federation server farm and click Next.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (38)
  • On theConnect to AD DSscreen, the logged in account is auto-detected. ClickNext.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (39)
  • When the Specify Service Properties page opens, on the SSL Certificates drop-down, select the certificate you generated in the previous section.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (40)
  • When you select the certificate, the Federation Service Name will be automatically populated. Enter a Name for the Federation Service Display Name and click Next.

If you requested for a certificate from an issuing authority, click Import and use the certificate instead.

Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (41)
  • This is the stage you specify a Service account for AD FS. I mentioned earlier that you could use the new Group Managed Service Account (gSMA). To use gSMA, it has to be configured. For the purpose of this lab, beside Use an existing domain user account or group Managed Service Account, click Select.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (42)
  • Type the name of the service account you created in section 1 of this guide. Then click Check Names.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (43)
  • If the account exists, it will be populated in the Account Name field. Type the password for the Service Account. Then click Next.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (44)
  • On the Specify Configuration Database page select, Create a database on this server using Windows Internal Database. Alternatively, if you have an SQL server, select Specify the location of an SQL database. When you have made your selection, click Next.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (45)
  • Then review your sections and click Next.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (46)
  • And if you have done everything right, you should have all green! Finally, to setup AD FS for Web Application Proxy in Windows Server 2016, click Configure.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (47)
  • AD FS configuration will perform a number of tasks and report a result. Some of the warning messages shown in my configuration below is because it is a non-production environment. For instance I omitted adding an SPN for the service account. I also used a certificate alternative name.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (48)
  • On the AD FS installation, click Close. Then Restart the server.

Setup an AD FS Proxy Server Certificate on the WAP Server

Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (49)

The next step in our Web Application Proxy in Windows Server 2016 setup is to create a certificate for the AD FS. This task is performed on the Web Application Server.

Here are the steps:

  • Login to the AD FS server and open the certificate MMC you saved in Generate a Self Signed Certificate for AD FS section of this guide.
  • Expand Certificates (Local Computer) -> Personal -> Certificates. Then right-click the certificate you enrolled earlier, point to All Tasks and click Export.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (50)
  • On the Certificate Export Wizard welcome screen, click Next.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (51)
  • Then on the Export Private key screen, select Yes, export the private key and click Next.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (52)
  • On the Export File Format screen, check the box Export all extended properties. Then click Next.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (53)
  • Then on Security screen, check Password. Also, enter and re-enter a password and click Next.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (54)
  • Click Browse, select a location to export the certificate to. Then save it with the .pfx extension.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (55)
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (56)
  • Back on the Export wizard, click Next. Then click Finish.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (57)
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (58)
  • You will receive an export confirmation.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (59)

To complete this part of the setup, you will log on to your AD FS server and import this certificate. But before you proceed, share the folder you exported the certificate to. This way, you can access it via the network. You could also copy it to a USB.

To import the certificate to your AD FS server:

  • Logon to the server. Then use the steps in Generate a Self Signed Certificate for AD FS to add a Certificate snap-in.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (60)
  • Expand Certificates (Local Computer). Then right-click Personal node. Point to All Tasks and click Import.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (61)
  • On the welcome screen, click Next.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (62)
  • Beside File name field, click Browse.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (63)
  • Then enter the path where you exported the file and click Open.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (64)
  • On the highlighted drop-down select Personal Information Exchange. Then select the certificate and click Open.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (65)
  • On Certificate Import Wizard, click Next.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (66)
  • Enter the password you used when you exported the certificate and click Next.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (67)
  • Select the options shown below. Then click Next.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (68)
  • Then click Finish.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (69)
  • Import is confirmed as successful.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (70)
  • To confirm that the certificate is imported, expand Personal and click Certificates.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (71)

Configure Web Application Proxy in Windows Server 2016

Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (72)

Here is the final step to setup Web Application Proxy in Windows Server 2016:

  • Logon to the Server you installed Remote Access Role with Web Application Server role service.
  • Open Server Manager. Then click Tools and select Remote Access Management.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (73)
  • On the Remote Access Management console, click Web Application Proxy. Then click Run the Web Application Proxy Configuration Wizard
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (74)
  • On the welcome screen click Next.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (75)
  • Enter the details of the AD FS server you configured earlier. Then type the local administrator’s details and click Next.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (76)
  • Click the drop-down below Select a certificate to be used by the AD FS proxy and select the certificate you imported in the last section. To continue, click Next.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (77)
  • On Confirmation screen, click Configure.
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (78)
  • Here is the final confirmation you have been looking for: Web Application Proxy was configured successfully!
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (79)

Conclusion

This is part 4 of 4 in our Routing and Remote Access in Windows Server 2016 series.

This last part covered setup of Web Application Proxy in Windows Server 2016. I hope you found this helpful.

To see all the series, click this search link – Routing and Remote Access.

I hope you found this Windows Server fix-it guide helpful. If you found it helpful, kindly spare 2 minutes to share your experience with our community at [discourse_topic_url].

Alternatively, you could ask a question, leave a comment or provide feedback at [discourse_topic_url]. Our team and other community members will respond to you as soon as possible.

Want more Windows Server guides? Visit our Windows Server Fix page.

  • Was this page helpful?
  • Yes (0)No (2)
Routing and Remote Access in Windows Server 2016 (Part 4): Configure Web Application proxy (2024)

References

Top Articles
Latest Posts
Article information

Author: Kelle Weber

Last Updated:

Views: 6448

Rating: 4.2 / 5 (73 voted)

Reviews: 88% of readers found this page helpful

Author information

Name: Kelle Weber

Birthday: 2000-08-05

Address: 6796 Juan Square, Markfort, MN 58988

Phone: +8215934114615

Job: Hospitality Director

Hobby: tabletop games, Foreign language learning, Leather crafting, Horseback riding, Swimming, Knapping, Handball

Introduction: My name is Kelle Weber, I am a magnificent, enchanting, fair, joyous, light, determined, joyous person who loves writing and wants to share my knowledge and understanding with you.