Skip to content

Commit f5d901f

Browse files
committed
update the cmdlets
1 parent c3f1cac commit f5d901f

1 file changed

Lines changed: 17 additions & 10 deletions

File tree

support/windows-server/active-directory/troubleshoot-ad-fs-sso-issue.md

Lines changed: 17 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: ADFS SSO troubleshooting
33
description: Introduce how to troubleshoot ADFS SSO issues.
4-
ms.date: 01/15/2025
4+
ms.date: 04/01/2025
55
manager: dcscontentpm
66
audience: itpro
77
ms.topic: troubleshooting
@@ -112,13 +112,13 @@ If the application is Microsoft Online Services, what you experience may be cont
112112
2. Get the existing domain federation setting by running the following command:
113113

114114
```powershell
115-
Get-MSOLDomainFederationSettings -DomainName DomainName | FL *
115+
Get-MgDomainFederationConfiguration -DomainId <DomainName> | FL *
116116
```
117117

118118
3. Set the PromptLoginBehavior setting by running the following command:
119119

120120
```powershell
121-
Set-MSOLDomainFederationSettings -DomainName DomainName -PromptLoginBehavior <TranslateToFreshPasswordAuth|NativeSupport|Disabled> -SupportsMFA <$TRUE|$FALSE> -PreferredAuthenticationProtocol <WsFed|SAMLP>
121+
New-MgDomainFederationConfiguration -DomainId <domain_id> -PromptLoginBehavior <TranslateToFreshPasswordAuth|NativeSupport|Disabled> -FederatedIdpMfaBehavior <acceptIfMfaDoneByFederatedIdp|enforceMfaByFederatedIdp|rejectMfaByFederatedIdp> -PreferredAuthenticationProtocol <WsFed|SAMLP>
122122
```
123123

124124
The values for the PromptLoginBehavior parameter are:
@@ -127,16 +127,14 @@ If the application is Microsoft Online Services, what you experience may be cont
127127
2. **NativeSupport**: The prompt=login parameter is sent as is to AD FS.
128128
3. **Disabled**: Nothing is sent to AD FS.
129129

130-
To learn more about the Set-MSOLDomainFederationSettings command, see [Active Directory Federation Services prompt=login parameter support](/windows-server/identity/ad-fs/operations/ad-fs-prompt-login).
131-
132130
<a name='azure-active-directory-azure-ad-scenario'></a>
133131

134132
### Microsoft Entra scenario
135133

136134
If the authentication request sent to Microsoft Entra ID include [the prompt=login parameter](/windows-server/identity/ad-fs/operations/ad-fs-prompt-login), disable the prompt=login capability by running the following command:
137135

138136
```powershell
139-
Set-MsolDomainFederationSettings –DomainName DomainName -PromptLoginBehavior Disabled
137+
New-MgDomainFederationConfiguration -DomainId <domain_id> -PromptLoginBehavior Disabled
140138
```
141139

142140
After you run this command, Office 365 applications won't include the prompt=login parameter in each authentication request.
@@ -229,13 +227,13 @@ If the application that you want to access is Microsoft Online Services for Offi
229227
1. Get the current SupportsMFA domain federation setting by running the following command:
230228

231229
```powershell
232-
Get-MSOLDomainFederationSettings -DomainName DomainName | FL *
230+
Get-MgDomainFederationConfiguration -DomainId <domain_id> | FL *
233231
```
234232

235233
2. If the SupportsMFA setting is FALSE, set it to TRUE by running the following command:
236234

237235
```powershell
238-
Set-MSOLDomainFederationSettings -DomainName DomainName -SupportsMFA $TRUE
236+
New-MgDomainFederationConfiguration -DomainId <DomainName> -FederatedIdpMfaBehavior "acceptIfMfaDoneByFederatedIdp"
239237
```
240238

241239
### Check if SSO is disabled
@@ -627,10 +625,10 @@ If a user is trying to log in to Microsoft Entra ID, they will be redirected to
627625
1. [Download](https://connect.microsoft.com/site1164/Downloads/DownloadDetails.aspx?DownloadID=59185) and install the Azure AD PowerShell module for Windows PowerShell.
628626
1. Open Windows PowerShell with the "Run as administrator" option.
629627
1. Initiate a connection to Microsoft Entra ID by running the following command:
630-
`Connect-MsolService`
628+
`Connect-MgGraph`
631629
1. Provide the global administrator credential for the connection.
632630
1. Get the list of users in the Microsoft Entra ID by running the following command:
633-
`Get-MsolUser`
631+
`Get-MgUser`
634632
1. Verify if the user is in the list.
635633

636634
If the user is not in the list, sync the user to Microsoft Entra ID.
@@ -1238,3 +1236,12 @@ The following are the device claims. The authorization rules may use some of the
12381236
If there is a missing claim, follow the steps in [Configure On-Premises Conditional Access using registered devices](/windows-server/identity/ad-fs/operations/configure-device-based-conditional-access-on-premises) to make sure the environment is setup for device authentication.
12391237

12401238
If all the claims are present, see if the values of the claims from the Dump Token app match the values required in the authorization policy.
1239+
1240+
## Reference
1241+
1242+
For more informaiton, see the following articles:
1243+
1244+
- [Get-MgDomainFederationConfiguration](/powershell/module/microsoft.graph.identity.directorymanagement/get-mgdomainfederationconfiguration)
1245+
- [New-MgDomainFederationConfiguration](/powershell/module/microsoft.graph.identity.directorymanagement/new-mgdomainfederationconfiguration)
1246+
- [Connect-MgGraph](/powershell/microsoftgraph/authentication-commands?view=graph-powershell-1.0#use-connect-mggraph)
1247+
- [Get-MgUser](/powershell/module/microsoft.graph.users/get-mguser)

0 commit comments

Comments
 (0)