Skip to content

Commit 31937b6

Browse files
committed
refresh msol cmdlets
1 parent 700f9d6 commit 31937b6

2 files changed

Lines changed: 6 additions & 10 deletions

File tree

Binary file not shown.

support/windows-server/active-directory/troubleshoot-ad-fs-issues.md

Lines changed: 6 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -39,17 +39,13 @@ _Original KB number:_   3079872
3939

4040
:::image type="content" source="media/troubleshoot-ad-fs-issues/office-365-redirecting.png" alt-text="Page that is shown when the A D F S redirection occurs.":::
4141

42-
1. If no redirection occurs and you're prompted to enter a password on the same page, which means that Microsoft Entra ID or Office 365 doesn't recognize the user or the domain of the user to be federated. To check whether there's a federation trust between Microsoft Entra ID or Office 365 and your AD FS server, run the `Get-msoldomain` cmdlet from Azure AD PowerShell. If a domain is federated, its authentication property will be displayed as **Federated**, as in the following screenshot:
43-
44-
:::image type="content" source="media/troubleshoot-ad-fs-issues/federated-domain.png" alt-text="Cmdlet Get-msoldomain output shows that there is a federation trust between Microsoft Entra ID or Office 365 and your A D F S server.":::
45-
42+
1. If no redirection occurs and you're prompted to enter a password on the same page, which means that Microsoft Entra ID or Office 365 doesn't recognize the user or the domain of the user to be federated. To check whether there's a federation trust between Microsoft Entra ID or Office 365 and your AD FS server, run the `Get-MgDomain` cmdlet and check the **AuthenticationType**.
4643
2. If redirection occurs but you aren't redirected to your AD FS server for sign-in, check whether the AD FS service name resolves to the correct IP and whether it can connect to that IP on TCP port 443.
4744

4845
If the domain is displayed as **Federated**, obtain information about the federation trust by running the following commands:
4946

5047
```powershell
51-
Get-MsolFederationProperty -DomainName <domain>
52-
Get-MsolDomainFederationSettings -DomainName <domain>
48+
Get-MgDomainFederationConfiguration -DomainId <domain>
5349
```
5450
5551
Check the URI, URL, and certificate of the federation partner that's configured by Office 365 or Microsoft Entra ID.
@@ -280,7 +276,7 @@ _Original KB number:_ &nbsp; 3079872
280276
To get the User attribute value in Microsoft Entra ID, run the following command line:
281277
282278
```powershell
283-
Get-MsolUser -UserPrincipalName <UPN>
279+
Get-MgUser -UserId <user_id_string>
284280
```
285281
286282
SAML 2.0:
@@ -293,7 +289,7 @@ _Original KB number:_ &nbsp; 3079872
293289
This issue can occur when the UPN of a synced user is changed in AD but without updating the online directory. In this scenario, you can either correct the user's UPN in AD (to match the related user's logon name) or run the following cmdlet to change the logon name of the related user in the Online directory:
294290
295291
```powershell
296-
Set-MsolUserPrincipalName -UserPrincipalName [ExistingUPN] -NewUserPrincipalName [DomainUPN-AD]
292+
Update-MgUser -UserId <user_id_string> -UserPrincipalName <DomainUPN-AD>
297293
```
298294
299295
It might also be that you're using AADsync to sync MAIL as UPN and EMPID as SourceAnchor, but the Relying Party claim rules at the AD FS level haven't been updated to send MAIL as UPN and EMPID as ImmutableID.
@@ -306,10 +302,10 @@ _Original KB number:_ &nbsp; 3079872
306302
307303
Office 365 or Microsoft Entra ID will try to reach out to the AD FS service, assuming the service is reachable over the public network. We try to poll the AD FS federation metadata at regular intervals, to pull any configuration changes on AD FS, mainly the token-signing certificate info. If this process is not working, the global admin should receive a warning on the Office 365 portal about the token-signing certificate expiry and about the actions that are required to update it.
308304
309-
You can use `Get-MsolFederationProperty -DomainName <domain>` to dump the federation property on AD FS and Office 365. Here you can compare the TokenSigningCertificate thumbprint, to check whether the Office 365 tenant configuration for your federated domain is in sync with AD FS. If you find a mismatch in the token-signing certificate configuration, run the following command to update it:
305+
You can use `Get-MgDomainFederationConfiguration -DomainId <domain>` to dump the federation property on AD FS and Office 365. Here you can compare the TokenSigningCertificate thumbprint, to check whether the Office 365 tenant configuration for your federated domain is in sync with AD FS. If you find a mismatch in the token-signing certificate configuration, run the following command to update it:
310306
311307
```powershell
312-
Update-MsolFederatedDomain -DomainName <domain> -SupportMultipleDomain
308+
Update-MgDomainFederationConfiguration -DomainId <domain_id> -SigningCertificate <certificate_token>
313309
```
314310
315311
You can also run the following tool to schedule a task on the AD FS server that will monitor for the Auto-certificate rollover of the token-signing certificate and update the Office 365 tenant automatically.

0 commit comments

Comments
 (0)