You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
4. Update the WIASupportedUserAgents setting by running the following command:
@@ -104,42 +105,26 @@ For more information, see [Overview of authentication handlers of AD FS sign-in
104
105
105
106
If the application that you want to access is not Microsoft Online Services, what you experience is expected and controlled by the incoming authentication request. Work with the application owner to change the behavior.
106
107
107
-
[!INCLUDE [Azure AD PowerShell deprecation note](~/../support/reusable-content/msgraph-powershell/includes/aad-powershell-deprecation-note.md)]
108
-
109
108
If the application is Microsoft Online Services, what you experience may be controlled by the **PromptLoginBehavior** setting from the trusted realm object. This setting controls whether Microsoft Entra tenants send prompt=login to AD FS. To set the **PromptLoginBehavior** setting, follow these steps:
110
109
111
110
1. Open Windows PowerShell with the "Run as administrator" option.
112
-
2.Get the existing domain federation setting by running the following command:
111
+
2.Set the PromptLoginBehavior setting by running the following commands:
> \<domain_id> is a placeholder for your domain's name. For example, contoso.com.
123
122
124
123
The values for the PromptLoginBehavior parameter are:
125
124
126
-
1.**TranslateToFreshPasswordAuth**: Microsoft Entra ID sends wauth and wfresh to AD FS instead of prompt=login. This leads to an authentication request to use forms-based authentication.
127
-
2.**NativeSupport**: The prompt=login parameter is sent as is to AD FS.
128
-
3.**Disabled**: Nothing is sent to AD FS.
129
-
130
-
To learn more about the Set-MSOLDomainFederationSettings command, see [Active Directory Federation Services prompt=login parameter support](/windows-server/identity/ad-fs/operations/ad-fs-prompt-login).
If the authentication request sent to Microsoft Entra ID include [the prompt=login parameter](/windows-server/identity/ad-fs/operations/ad-fs-prompt-login), disable the prompt=login capability by running the following command:
After you run this command, Office 365 applications won't include the prompt=login parameter in each authentication request.
125
+
1.**translateToFreshPasswordAuth**: Microsoft Entra ID sends wauth and wfresh to AD FS instead of prompt=login. This leads to an authentication request to use forms-based authentication.
126
+
2.**nativeSupport**: The prompt=login parameter is sent as is to AD FS.
127
+
3.**disabled**: Nothing is sent to AD FS.
143
128
144
129
<aname='non-azure-ad-scenario'></a>
145
130
@@ -229,13 +214,23 @@ If the application that you want to access is Microsoft Online Services for Offi
229
214
1. Get the current SupportsMFA domain federation setting by running the following command:
3. Enter the correct credentials of a valid user on the sign-in page.
294
289
@@ -626,11 +621,10 @@ If a user is trying to log in to Microsoft Entra ID, they will be redirected to
626
621
627
622
1.[Download](https://connect.microsoft.com/site1164/Downloads/DownloadDetails.aspx?DownloadID=59185) and install the Azure AD PowerShell module for Windows PowerShell.
628
623
1. Open Windows PowerShell with the "Run as administrator" option.
629
-
1. Initiate a connection to Microsoft Entra ID by running the following command:
630
-
`Connect-MsolService`
624
+
1. Initiate a connection to Microsoft Entra ID by running `Connect-MgGraph` with proper permission.
631
625
1. Provide the global administrator credential for the connection.
632
626
1. Get the list of users in the Microsoft Entra ID by running the following command:
633
-
`Get-MsolUser`
627
+
`Get-MgUser`
634
628
1. Verify if the user is in the list.
635
629
636
630
If the user is not in the list, sync the user to Microsoft Entra ID.
@@ -906,132 +900,6 @@ DS Mapper Usage : Disabled
906
900
Negotiate Client Certificate : Disabled
907
901
```
908
902
909
-
### Run script to automatically detect problems
910
-
911
-
To automatically detect problems with the proxy trust relationship, run the following script. Based on the problem detected, take the action accordingly.
912
-
913
-
```powershell
914
-
param
915
-
(
916
-
[switch]$syncproxytrustcerts
917
-
)
918
-
function checkhttpsyscertbindings()
919
-
{
920
-
Write-Host; Write-Host("1 – Checking http.sys certificate bindings for potential issues")
$warning = "There is an IP specific binding on IP " + $ipbindingparsed[2].trim() + " which may conflict with the AD FS port 443 cert binding." | Write-Warning
939
-
$certbindingissuedetected = $true
940
-
}
941
-
$i = $i + 14
942
-
continue
943
-
}
944
-
## check that CTL Store is set for ADFS service binding
if ( ($cert.NotBefore -lt $now) -and ($cert.NotAfter -gt $now))
1002
-
{
1003
-
$certThumbprint = $cert.Thumbprint
1004
-
$certSubject = $cert.Subject
1005
-
$ctlMatch = dir cert:\localmachine\ADFSTrustedDevices\$certThumbprint -ErrorAction SilentlyContinue
1006
-
if ($ctlMatch -eq $null)
1007
-
{
1008
-
$atLeastOneMismatch = $true
1009
-
Write-Warning "This cert is NOT in the CTL: $certThumbprint – $certSubject"
1010
-
if ($repair -eq $true)
1011
-
{
1012
-
write-Warning "Attempting to repair"
1013
-
$store.Add($cert)
1014
-
Write-Warning "Repair successful"
1015
-
}
1016
-
else
1017
-
{
1018
-
Write-Warning ("Please install KB.2964735 or re-run script with -syncproxytrustcerts switch to add missing Proxy Trust certs to AdfsTrustedDevices cert store")
1019
-
}
1020
-
}
1021
-
}
1022
-
}
1023
-
$store.Close()
1024
-
if ($atLeastOneMismatch -eq $false)
1025
-
{
1026
-
Write-Host("Check Passed: No mismatched certs found. CTL is in sync with DB content")
1027
-
}
1028
-
}
1029
-
checkhttpsyscertbindings
1030
-
checkadfstrusteddevicesstore
1031
-
checkproxytrustcerts($syncproxytrustcerts)
1032
-
Write-Host; Write-Host("All checks completed.")
1033
-
```
1034
-
1035
903
### Problem 1: There is an IP specific binding
1036
904
1037
905
The binding may conflict with the AD FS certificate binding on port 443.
@@ -1072,23 +940,6 @@ If a CA issued certificate is in a certificate store where only self-signed cert
1072
940
1073
941
Therefore, delete any CA issued certificate from the AdfsTrustedDevices certificate store.
1074
942
1075
-
### Problem 4: Install KB2964735 or re-run the script with -syncproxytrustcerts
1076
-
1077
-
When a proxy trust relationship is established with an AD FS server, the client certificate is written to the AD FS configuration database and added to the AdfsTrustedDevices certificate store on the AD FS server. For an AD FS farm deployment, the client certificate is expected to be synced to the other AD FS servers. If the sync doesn't happen for some reason, a proxy trust relationship will only work against the AD FS server the trust was established with, but not against the other AD FS servers.
1078
-
1079
-
To solve this problem, use one of the following methods.
1080
-
1081
-
#### Method 1
1082
-
1083
-
Install the update documented in [KB 2964735](https://support.microsoft.com/topic/700e0502-c19a-54e4-9c5f-65c2844d9a9f) on all AD FS servers. After the update is installed, a sync of the client certificate is expected to happen automatically.
1084
-
1085
-
#### Method 2
1086
-
1087
-
Run the script with the – syncproxytrustcerts switch to manually sync the client certificates from the AD FS configuration database to the AdfsTrustedDevices certificate store. The script should be run on all the AD FS servers in the farm.
1088
-
1089
-
> [!NOTE]
1090
-
> This is not a permanent solution because the client certificates will be renewed on a regular basis.
1091
-
1092
943
### Problem 5: All checks are passed. But the problem persists
1093
944
1094
945
Check if there is a time or time zone mismatch. If time matches but the time zone doesn't, proxy trust relationship will also fail to be established.
@@ -1238,3 +1089,14 @@ The following are the device claims. The authorization rules may use some of the
1238
1089
If there is a missing claim, follow the steps in [Configure On-Premises Conditional Access using registered devices](/windows-server/identity/ad-fs/operations/configure-device-based-conditional-access-on-premises) to make sure the environment is setup for device authentication.
1239
1090
1240
1091
If all the claims are present, see if the values of the claims from the Dump Token app match the values required in the authorization policy.
0 commit comments