You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The values for the PromptLoginBehavior parameter are:
@@ -127,16 +127,14 @@ If the application is Microsoft Online Services, what you experience may be cont
127
127
2.**NativeSupport**: The prompt=login parameter is sent as is to AD FS.
128
128
3.**Disabled**: Nothing is sent to AD FS.
129
129
130
-
To learn more about the Set-MSOLDomainFederationSettings command, see [Active Directory Federation Services prompt=login parameter support](/windows-server/identity/ad-fs/operations/ad-fs-prompt-login).
If the authentication request sent to Microsoft Entra ID include [the prompt=login parameter](/windows-server/identity/ad-fs/operations/ad-fs-prompt-login), disable the prompt=login capability by running the following command:
@@ -627,10 +625,10 @@ If a user is trying to log in to Microsoft Entra ID, they will be redirected to
627
625
1.[Download](https://connect.microsoft.com/site1164/Downloads/DownloadDetails.aspx?DownloadID=59185) and install the Azure AD PowerShell module for Windows PowerShell.
628
626
1. Open Windows PowerShell with the "Run as administrator" option.
629
627
1. Initiate a connection to Microsoft Entra ID by running the following command:
630
-
`Connect-MsolService`
628
+
`Connect-MgGraph`
631
629
1. Provide the global administrator credential for the connection.
632
630
1. Get the list of users in the Microsoft Entra ID by running the following command:
633
-
`Get-MsolUser`
631
+
`Get-MgUser`
634
632
1. Verify if the user is in the list.
635
633
636
634
If the user is not in the list, sync the user to Microsoft Entra ID.
@@ -1238,3 +1236,12 @@ The following are the device claims. The authorization rules may use some of the
1238
1236
If there is a missing claim, follow the steps in [Configure On-Premises Conditional Access using registered devices](/windows-server/identity/ad-fs/operations/configure-device-based-conditional-access-on-premises) to make sure the environment is setup for device authentication.
1239
1237
1240
1238
If all the claims are present, see if the values of the claims from the Dump Token app match the values required in the authorization policy.
0 commit comments