You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -103,23 +103,20 @@ If the application that you want to access is not Microsoft Online Services, wha
103
103
If the application is Microsoft Online Services, what you experience may be controlled by the **PromptLoginBehavior** setting from the trusted realm object. This setting controls whether Microsoft Entra tenants send prompt=login to AD FS. To set the **PromptLoginBehavior** setting, follow these steps:
104
104
105
105
1. Open Windows PowerShell with the "Run as administrator" option.
106
-
2.Get the existing domain federation setting by running the following command:
106
+
2.Set the PromptLoginBehavior setting by running the following commands:
The values for the PromptLoginBehavior parameter are:
119
116
120
-
1.**TranslateToFreshPasswordAuth**: Microsoft Entra ID sends wauth and wfresh to AD FS instead of prompt=login. This leads to an authentication request to use forms-based authentication.
121
-
2.**NativeSupport**: The prompt=login parameter is sent as is to AD FS.
122
-
3.**Disabled**: Nothing is sent to AD FS.
117
+
1.**translateToFreshPasswordAuth**: Microsoft Entra ID sends wauth and wfresh to AD FS instead of prompt=login. This leads to an authentication request to use forms-based authentication.
118
+
2.**nativeSupport**: The prompt=login parameter is sent as is to AD FS.
119
+
3.**disabled**: Nothing is sent to AD FS.
123
120
124
121
<aname='non-azure-ad-scenario'></a>
125
122
@@ -215,7 +212,7 @@ If the application that you want to access is Microsoft Online Services for Offi
215
212
2. If the SupportsMFA setting is FALSE, set it to TRUE by running the following command:
3. Enter the correct credentials of a valid user on the sign-in page.
274
271
@@ -885,132 +882,6 @@ DS Mapper Usage : Disabled
885
882
Negotiate Client Certificate : Disabled
886
883
```
887
884
888
-
### Run script to automatically detect problems
889
-
890
-
To automatically detect problems with the proxy trust relationship, run the following script. Based on the problem detected, take the action accordingly.
891
-
892
-
```powershell
893
-
param
894
-
(
895
-
[switch]$syncproxytrustcerts
896
-
)
897
-
function checkhttpsyscertbindings()
898
-
{
899
-
Write-Host; Write-Host("1 – Checking http.sys certificate bindings for potential issues")
$warning = "There is an IP specific binding on IP " + $ipbindingparsed[2].trim() + " which may conflict with the AD FS port 443 cert binding." | Write-Warning
918
-
$certbindingissuedetected = $true
919
-
}
920
-
$i = $i + 14
921
-
continue
922
-
}
923
-
## check that CTL Store is set for ADFS service binding
if ( ($cert.NotBefore -lt $now) -and ($cert.NotAfter -gt $now))
981
-
{
982
-
$certThumbprint = $cert.Thumbprint
983
-
$certSubject = $cert.Subject
984
-
$ctlMatch = dir cert:\localmachine\ADFSTrustedDevices\$certThumbprint -ErrorAction SilentlyContinue
985
-
if ($ctlMatch -eq $null)
986
-
{
987
-
$atLeastOneMismatch = $true
988
-
Write-Warning "This cert is NOT in the CTL: $certThumbprint – $certSubject"
989
-
if ($repair -eq $true)
990
-
{
991
-
write-Warning "Attempting to repair"
992
-
$store.Add($cert)
993
-
Write-Warning "Repair successful"
994
-
}
995
-
else
996
-
{
997
-
Write-Warning ("Please install KB.2964735 or re-run script with -syncproxytrustcerts switch to add missing Proxy Trust certs to AdfsTrustedDevices cert store")
998
-
}
999
-
}
1000
-
}
1001
-
}
1002
-
$store.Close()
1003
-
if ($atLeastOneMismatch -eq $false)
1004
-
{
1005
-
Write-Host("Check Passed: No mismatched certs found. CTL is in sync with DB content")
1006
-
}
1007
-
}
1008
-
checkhttpsyscertbindings
1009
-
checkadfstrusteddevicesstore
1010
-
checkproxytrustcerts($syncproxytrustcerts)
1011
-
Write-Host; Write-Host("All checks completed.")
1012
-
```
1013
-
1014
885
### Problem 1: There is an IP specific binding
1015
886
1016
887
The binding may conflict with the AD FS certificate binding on port 443.
@@ -1051,23 +922,6 @@ If a CA issued certificate is in a certificate store where only self-signed cert
1051
922
1052
923
Therefore, delete any CA issued certificate from the AdfsTrustedDevices certificate store.
1053
924
1054
-
### Problem 4: Install KB2964735 or re-run the script with -syncproxytrustcerts
1055
-
1056
-
When a proxy trust relationship is established with an AD FS server, the client certificate is written to the AD FS configuration database and added to the AdfsTrustedDevices certificate store on the AD FS server. For an AD FS farm deployment, the client certificate is expected to be synced to the other AD FS servers. If the sync doesn't happen for some reason, a proxy trust relationship will only work against the AD FS server the trust was established with, but not against the other AD FS servers.
1057
-
1058
-
To solve this problem, use one of the following methods.
1059
-
1060
-
#### Method 1
1061
-
1062
-
Install the update documented in [KB 2964735](https://support.microsoft.com/topic/700e0502-c19a-54e4-9c5f-65c2844d9a9f) on all AD FS servers. After the update is installed, a sync of the client certificate is expected to happen automatically.
1063
-
1064
-
#### Method 2
1065
-
1066
-
Run the script with the – syncproxytrustcerts switch to manually sync the client certificates from the AD FS configuration database to the AdfsTrustedDevices certificate store. The script should be run on all the AD FS servers in the farm.
1067
-
1068
-
> [!NOTE]
1069
-
> This is not a permanent solution because the client certificates will be renewed on a regular basis.
1070
-
1071
925
### Problem 5: All checks are passed. But the problem persists
1072
926
1073
927
Check if there is a time or time zone mismatch. If time matches but the time zone doesn't, proxy trust relationship will also fail to be established.
@@ -1223,6 +1077,6 @@ If all the claims are present, see if the values of the claims from the Dump Tok
0 commit comments