You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: support/windows-server/active-directory/troubleshoot-ad-fs-sso-issue.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -418,7 +418,7 @@ Then, check the certificate configuration on WAP servers and the fallback bindin
418
418
419
419
To support non-SNI cases, administrators may specify fallback bindings. Other than the standard federationservicename:443 binding, look for fallback bindings under the following application IDs:
420
420
421
-
- \{5d89a20c-beab-4389-9447-324788eb944a\}: This is the application ID for AD FS.
421
+
- \{00001111-aaaa-2222-bbbb-3333cccc4444\}: This is the application ID for AD FS.
422
422
- \{f955c070-e044-456c-ac00-e9e4275b3f04\}: This is the application ID for Web Application Proxy.
423
423
424
424
For example, if the SSL certificate is specified for a fallback binding like 0.0.0.0:443, make sure that the binding is updated accordingly when the SSL certificate gets updated.
@@ -884,12 +884,12 @@ Get the SSL certificate bindings for AD FS
884
884
On the AD FS server, run the following command in Windows PowerShell:
885
885
`netsh http show sslcert`
886
886
887
-
In the list of bindings returned, look for those with the Application ID of 5d89a20c-beab-4389-9447-324788eb944a. Here is an example of a healthy binding. Note the "Ctl Store Name" line.
887
+
In the list of bindings returned, look for those with the Application ID of 00001111-aaaa-2222-bbbb-3333cccc4444. Here is an example of a healthy binding. Note the "Ctl Store Name" line.
Copy file name to clipboardExpand all lines: support/windows-server/backup-and-storage/delete-s2d-storage-pool-reuse-disks.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -295,7 +295,7 @@ Keywords:
295
295
User: SYSTEM
296
296
Computer: S2D-1.contoso.com
297
297
Description:
298
-
Windows lost communication with physical disk {81ea06c7-7433-bdd5-6a02-b267b5702b0b}. This can occur if a cable failed or was disconnected, or if the disk itself failed.
298
+
Windows lost communication with physical disk {aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb}. This can occur if a cable failed or was disconnected, or if the disk itself failed.
299
299
This disk may be located using the following information:
300
300
Drive Manufacturer: Msft
301
301
Drive Model Number: Virtual Disk
@@ -306,9 +306,9 @@ Enclosure Model Number: NULL
306
306
Enclosure Serial Number: NULL
307
307
Enclosure Slot: -1
308
308
More information can be obtained using this PowerShell command:
Disk Class Driver Tracing Provider {945186BF-3DD6-4F3F-9C8E-9EDD3FC9D558}
51
-
Downlevel IPsec API {94335EB3-79EA-44D5-8EA9-306F49B3A041}
51
+
Downlevel IPsec API {aaaabbbb-0000-cccc-1111-dddd2222eeee}
52
52
53
53
Various utilities are available at the Microsoft Download Center in order to parse .etl files, for instance Network Monitor v3.4. However, the sample script below would not need an installation of any of those.
0 commit comments