Skip to content

Commit 8a3bc88

Browse files
committed
update some commands.
1 parent 1ac0175 commit 8a3bc88

1 file changed

Lines changed: 12 additions & 3 deletions

File tree

support/windows-server/active-directory/troubleshoot-ad-fs-issues.md

Lines changed: 12 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -45,9 +45,12 @@ _Original KB number:_   3079872
4545
If the domain is displayed as **Federated**, obtain information about the federation trust by running the following commands:
4646

4747
```powershell
48-
Get-MgDomainFederationConfiguration -DomainId <domain>
48+
Get-MgDomainFederationConfiguration -DomainId <domain_id>
4949
```
5050
51+
> [!NOTE]
52+
> \<domain_id> is a placeholder for your domain's name. For example, contoso.com.
53+
5154
Check the URI, URL, and certificate of the federation partner that's configured by Office 365 or Microsoft Entra ID.
5255
5356
2. After you're redirected to AD FS, the browser may throw a certificate trust-related error, and for some clients and devices it may not let you establish an SSL (Secure Sockets Layer) session with AD FS. To resolve this issue, follow these steps:
@@ -302,12 +305,18 @@ _Original KB number:_ &nbsp; 3079872
302305
303306
Office 365 or Microsoft Entra ID will try to reach out to the AD FS service, assuming the service is reachable over the public network. We try to poll the AD FS federation metadata at regular intervals, to pull any configuration changes on AD FS, mainly the token-signing certificate info. If this process is not working, the global admin should receive a warning on the Office 365 portal about the token-signing certificate expiry and about the actions that are required to update it.
304307
305-
You can use `Get-MgDomainFederationConfiguration -DomainId <domain>` to dump the federation property on AD FS and Office 365. Here you can compare the TokenSigningCertificate thumbprint, to check whether the Office 365 tenant configuration for your federated domain is in sync with AD FS. If you find a mismatch in the token-signing certificate configuration, run the following command to update it:
308+
You can use `Get-MgDomainFederationConfiguration -DomainId <domain_id>` to dump the federation property on AD FS and Office 365. Here you can compare the TokenSigningCertificate thumbprint, to check whether the Office 365 tenant configuration for your federated domain is in sync with AD FS. If you find a mismatch in the token-signing certificate configuration, run the following command to update it:
306309
307310
```powershell
308-
Update-MgDomainFederationConfiguration -DomainId <domain_id> -SigningCertificate <certificate_token>
311+
Connect-MgGraph -scopes Domain.ReadWrite.All, Directory.ReadWrite.All
312+
$tdo= Get-MgDomainFederationConfiguration -DomainID <domain_id>
313+
Update-MgDomainFederationConfiguration -DomainId <domain_id> -InternalDomainFederationId $tdo.Id -SigningCertificate <certificate_token>
314+
Disconnect-MgGraph
309315
```
310316
317+
> [!NOTE]
318+
> \<domain_id> is a placeholder for your domain's name. For example, contoso.com.
319+
311320
You can also run the following tool to schedule a task on the AD FS server that will monitor for the Auto-certificate rollover of the token-signing certificate and update the Office 365 tenant automatically.
312321
313322
[Verify and manage single sign-on with AD FS](/previous-versions/azure/azure-services/jj151809(v=azure.100))

0 commit comments

Comments
 (0)