Troubleshoot Azure Active Directory
Troubleshoot Azure Active Directory
c HOW-TO GUIDE
c HOW-TO GUIDE
Unable to create gMSA because KDS may not be running on domain controller
c HOW-TO GUIDE
c HOW-TO GUIDE
This article describes a problem in which you receive an error message "We could not
verify your account" when you try to reset your password in Microsoft Azure, Office 365,
or Microsoft Intune. To resolve this problem, work with your administrator to update
your telephone number.
Original product version: Azure Active Directory, Microsoft Intune, Cloud Services (Web
roles/Worker roles)
Symptoms
When you use Microsoft Azure, Microsoft Office 365, or Microsoft Intune, you may
receive the following error message when you try to reset your password:
Cause
This problem may occur because there are no telephone numbers on file for you.
Resolution
To resolve this problem, work with your administrator to update your telephone
number(s).
This article describes a problem in which a "The maximum number of devices that can
be joined to the workplace by the user has been reached" error occurs when you try to
perform a Workplace Join operation.
Original product version: Windows Server 2012 R2 Datacenter, Windows Server 2012 R2
Standard, Windows 8.1 Enterprise, Azure Active Directory
Symptoms
When a user tries to perform a Workplace Join operation on a WIndows device, they
receive the following message:
Confirm you are using the current sign-in info, and that your workplace uses this
feature. Also, the connection to your workplace might not be working right now.
Please wait and try again.
Additionally, an administrator may see the following Event details in Event Viewer.
Event ID:200
Service.svc
Cause
This problem occurs because the user has joined the maximum number of devices and
has fulfilled the designated quota.
Resolution
To resolve this problem, check the quota configuration. Then, check the number of
devices that the user has previously registered. If the quota is reached, follow these
steps, depending on the applicable scenario.
If the user is trying to perform Workplace Join to your local Active Directory site
For example, run the following command to set the number of devices for
the user to 10:
Set-ADFSDeviceRegistration -DevicesPerUser 10
You can also verify that the user has reached the device capacity by reviewing the DRS
Event logs.
This article offers common diagnostic fixes for the data freshness alert "Health service
data is not up to date", which is generated when the Azure Active Directory (Azure AD)
Connect Health Service hasn't received data in the last two hours. The alert occurs in the
Health Service for the following services:
Prerequisites
Azure AD Connect .
The Azure AD Connect Health agent for AD DS .
The Azure AD Connect Health agent for Azure AD FS .
The PsExec tool.
Symptoms
To view the data freshness alert, take the following steps:
1. In the Azure portal , search for and select Azure AD Connect Health.
2. In the Azure Active Directory Connect Health | Quick start menu pane, select AD
DS Services.
4. In the Active Directory Domain Services Alerts pane, select Health service data is
not up to date.
5. In the Health service data is not up to date pane, select the Server Name. The lists
of properties for Alert Details and Data Type Details appear.
1. If Secure Sockets Layer (SSL) inspection is turned on, make sure that you've added
the policy key service endpoint ( policykeyservice.dc.ad.msft.net ) to the allow list.
2. Use a PowerShell cmdlet to find connectivity issues. You can run the Test-
AzureADConnectHealthConnectivity cmdlet successfully as a regular user.
However, if all data types are missing, the proxy setting might be correct for the
user but not for Local System (the context that the service runs under). In that
case, run the appropriate Test-AzureADConnectHealthConnectivityAsSystem cmdlet
instead:
Sync
PowerShell
3. To check whether the proxy settings are correct for Local System:
a. Enter the following PsExec command to view the Windows settings remotely:
Console
b. Select Network & internet > Proxy, and then select Edit under the Manual
proxy setup heading.
c. In the Edit proxy server dialog box, update the proxy server settings to match
the current setup.
Sync
PowerShell
[System.Diagnostics.PerformanceCounterCategory]::Exists("Processor")
[System.Diagnostics.PerformanceCounterCategory]::Exists("TCPv4")
[System.Diagnostics.PerformanceCounterCategory]::Exists("Memory")
[System.Diagnostics.PerformanceCounterCategory]::Exists("Process")
If any of these commands return False, run the following script to get more information
about the performance counters:
Sync
PowerShell
$perfCounters = @(
"\Memory\Available MBytes",
"\TCPv4\Connections Established",
"\Process(Microsoft.Identity.AadConnect.Health.AadSync.Host)\Private
Bytes",
"\Process(Microsoft.Identity.Health.AadSync.MonitoringAgent.Startup)\Pri
vate Bytes"
foreach($counter in $perfCounters)
try
if($counter -eq
"\Process(Microsoft.Identity.AadConnect.Health.AadSync.Host)\Private
Bytes")
elseif($counter -eq
"\Process(Microsoft.Identity.Health.AadSync.MonitoringAgent.Startup)\Pri
vate Bytes")
else
catch {}
Sync
AadSyncService‑Connectors
Make sure that the Azure AD Connect Health Sync
AadSyncService‑GlobalConfigurations
Insights Service is running.
AadSyncService‑RunProfileResults
AadSyncService‑ServiceConfigurations
AadSyncService‑ServiceStatus
AadSyncService‑SynchronizationRules
Begin by entering the following PsExec command to run the command prompt
remotely:
Console
PsExec.exe -i -s cmd
Then, collect the agent logs for the Monitoring and Insights services of Sync, AD DS, or
AD FS, as described in the next section.
7 Note
1. At the remote command prompt, enter services.msc to open the Services snap-in.
3. Change the current directory to the appropriate directory according to the service
type. Then, open the configuration file of the Monitoring Agent service executable
in a text editor (such as Notepad) for editing. The path name and executable file
name for each service type is shown in the following table. The configuration file
name simply appends the .config file name extension to the end of the
executable file name.
AD DS C:\Program Microsoft.Identity.Health.Adds.MonitoringAgent.Startup.exe
Files\Azure Ad
Connect Health
Adds
Agent\Monitor
Service Path Executable
type
AD FS C:\Program Microsoft.Identity.Health.Adfs.MonitoringAgent.Startup.exe
Files\Azure Ad
Connect Health
Adfs
Agent\Monitor
Console
notepad
"Microsoft.Identity.Health.Adfs.MonitoringAgent.Startup.exe.config"
4. In the text editor, insert the following line to set the ConsoleDebug key to true :
XML
6. Run the Monitoring Agent service, and direct its output to a log file (monitor.log).
Console
Microsoft.Identity.Health.Adfs.MonitoringAgent.Startup.exe >
monitor.log
7. Let the Monitoring Agent service run for 15 minutes. Then, press Ctrl+C to stop the
service, and inspect the monitor.log file.
1. At the remote command prompt, enter services.msc to open the Services snap-in.
3. Change the current directory to the appropriate directory according to the service
type. Then, run the Insights Agent service executable by using the /console
parameter and direct its output to a log file (insights.log). The path name and
executable file name for each service type is shown in the following table.
Console
4. Let the Insights Agent service run for 15 minutes. Then press Ctrl+C to stop the
service, and inspect the insights.log file.
1. In the remote command prompt, enter services.msc to open the Services snap-in.
3. Change the current directory to the diagnostics directory for AD FS. Then, run the
Diagnostics Agent service executable by using the -Debug parameter, and direct its
output to a log file (diagnostics.log).
Console
4. Press Enter.
5. Let the Diagnostics Agent service run for 15 minutes. Then, press Ctrl+C to stop
the service, and copy the console output into diagnostics.log.
6. Search for Error in the logs, and check whether any error entry indicates a specific
problem (such as connectivity or proxy configuration).
Original product version: Windows 8.1 Enterprise, Windows Server 2012 R2 Standard,
Windows Server 2012 R2 Datacenter, Azure Active Directory
Symptoms
When you try to perform a Workplace Join operation and register your device to your
local Active Directory domain from a Windows 8.1 device, you receive the following
error message:
We can't connect to the service you need right now. Check your network connection
or try this again later.
Cause
This problem may occur for one of the following reasons:
Although the Active Directory Federation Services (AD FS) proxy server can resolve
the name of the federation server, the name resolves to an incorrect host.
The AD FS service is not running on the AD FS proxy server.
The WAP role is not installed.
The WAP role is installed but is not configured.
Resolution
To resolve this problem, follow these steps:
7 Note
3. Don't worry about whether the PING is successful or unsuccessful. Instead, notice
whether the target address resolves to the IP address of the server.
Check the Hosts file on the AD FS proxy server to see whether the correct
entry is included and whether it targets your AD FS instance.
If you do not use a Hosts file, check internal DNS by using the Nslookup
command to verify DNS records.
More information
For more troubleshooting information, see the following article:
With Azure AD Connect Health, you can integrate Active Directory Federation Services
(AD FS) sign-in events into the Azure Active Directory (Azure AD) sign-ins report. The
Azure AD sign-ins report includes information about when the following types of
entities sign in to Azure AD and access resources:
Users
Applications
Managed resources
This article shows how to use the Connect Health for AD FS agent, Azure Monitor, and
Log Analytics to correlate and analyze AD FS sign-in data.
Prerequisites
Azure AD Connect Health for AD FS installed and upgraded to latest version
(3.1.95.0 or greater).
The Global Administrator or Reports Reader role to view the Azure AD sign-ins.
At least one Azure AD Premium (P1 or P2) license for the first Connect Health
agent.
25 extra Azure AD Premium (P1 or P2) licenses for each extra registered agent.
An equal agent count to the total number of agents that are registered across all
monitored roles (AD FS, Azure AD Connect, and Active Directory Domain Services).
The requisite number of valid Azure AD Connect Health licenses. (You aren't
required to assign the license to specific users.)
The available data mirrors the same data that's available for Azure AD sign-ins. Five tabs
with information are available, based on the sign-in type:
Azure AD
AD FS
Connect Health correlates events from AD FS, dependent on the server version. It then
matches the events with the AD FS schema. For more information, see What data is
displayed in the report?
Configuration
Basic configuration is automatic. Data is fed into the report after the feature goes live
and prerequisites are met.
You can enable Log Analytics for AD FS sign-ins and use it with any other Log Analytics-
integrated components, such as Microsoft Sentinel. For more information, see Enabling
Log Analytics and Azure Monitor.
Basic troubleshooting
For current known issues and limitations, see Frequently asked questions.
Kusto logging
To collect the sign-in events from AD FS sign-ins, run the following Kusto query in Log
Analytics.
Kusto
unioncluster('Idsharedweu').database('ADFSConnectHealth').SignInEvent,
cluster('Idsharedwus').database('ADFSConnectHealth').SignInEvent
| take 15
Next steps
Read more about AD FS sign-ins in Azure AD with Connect Health.
With the implementation of version 1.4.xx.x of Azure Active Directory Connect (Azure AD
Connect), customers may see some or all of their Windows devices disappear from
Azure AD. This isn't a cause for concern, as these device identities aren't used by Azure
Active Directory (Azure AD) during Conditional Access authorization. This change won't
delete any Windows devices that were correctly registered with Azure AD for Hybrid
Azure AD Join.
If you see the deletion of device objects in Azure AD exceeding the Export Deletion
Threshold, allow the deletions to go through. How To: allow deletes to flow when they
exceed the deletion threshold
Background
Windows devices registered as Hybrid Azure AD Joined are represented in Azure AD as
device objects, and they can be used for Conditional Access. Windows 10 devices are
synchronized to the cloud via Azure AD Connect, while down level Windows devices are
registered directly using either Active Directory Federation Services (AD FS) or seamless
single sign-on.
Windows 10 devices
Only Windows 10 devices with a specific userCertificate attribute value that's configured
by Hybrid Azure AD Join should be synchronized to the cloud by Azure AD Connect. In
previous versions of Azure AD Connect, this requirement was not rigorously enforced,
and unnecessary device objects were added to Azure AD. Such devices in Azure AD
always stayed in the "pending" state, as these devices were not intended to be
registered with Azure AD.
This version of Azure AD Connect will only synchronize Windows 10 devices that are
correctly configured to be Hybrid Azure AD Joined. Windows 10 device objects without
the Azure AD join specific userCertificate will be removed from Azure AD.
Some customers might need to revisit How To: Plan your hybrid Azure Active Directory
join implementation to register their Windows devices correctly and ensure that those
devices can participate in device-based Conditional Access.
This script generates a report about certificates stored in Active Directory Computer
objects, and specifically certificates issued by the Hybrid Azure AD join feature.
The script also checks the certificates present in the UserCertificate property of a
Computer object in AD. For each non-expired certificate present, the script validates
whether or not the certificate was issued for the Hybrid Azure AD join feature; for
example, Subject Name matches CN={ObjectGUID} .
Before this update, Azure AD Connect would synchronize to Azure AD any Computer
that contained at least one valid certificate. Beginning with Azure AD Connect version
1.4, the synchronization engine identifies Hybrid Azure AD join certificates, and will use
the cloudfilter filter to prevent the computer object from synchronizing to Azure AD
unless there's a valid Hybrid Azure AD join certificate.
Azure AD devices that were previously synchronized to AD, but don't have a valid
Hybrid Azure AD join certificate, will be deleted by the synchronization engine using the
filter CloudFiltered=TRUE .
<#
Filename: Export-ADSyncToolsHybridAzureADjoinCertificateReport.ps1.
DISCLAIMER:
.Synopsis
.DESCRIPTION
certificate but starting on Azure AD Connect version 1.4, the sync engine
can identify Hybrid
Azure AD join certificates and will 'cloudfilter' the computer object from
synchronizing to Azure AD unless
there's a valid Hybrid Azure AD join certificate.
Azure AD Device objects that were already synchronized to AD but do not have
a valid Hybrid Azure AD join
.EXAMPLE
.\Export-ADSyncToolsHybridAzureADjoinCertificateReport.ps1 -DN
'CN=Computer1,OU=SYNC,DC=Fabrikam,DC=com'
.EXAMPLE
.\Export-ADSyncToolsHybridAzureADjoinCertificateReport.ps1 -OU
'OU=SYNC,DC=Fabrikam,DC=com' -Filename "MyHybridAzureADjoinReport.csv" -
Verbose
#>
[CmdletBinding()]
Param
# Computer DistinguishedName
[Parameter(ParameterSetName='SingleObject',
Mandatory=$true,
ValueFromPipelineByPropertyName=$true,
Position=0)]
[String]
$DN,
# AD OrganizationalUnit
[Parameter(ParameterSetName='MultipleObjects',
Mandatory=$true,
ValueFromPipelineByPropertyName=$true,
Position=0)]
[String]
$OU,
[Parameter(Mandatory=$false,
ValueFromPipelineByPropertyName=$false,
Position=1)]
[String]
$Filename
# Read AD object(s)
Else
$results = @()
$userCertificateList = @($obj.UserCertificate)
$validEntries = @()
$totalEntriesCount = $userCertificateList.Count
If ($totalEntriesCount -eq 0)
Continue
ForEach($entry in $userCertificateList)
{
Try
$cert =
[System.Security.Cryptography.X509Certificates.X509Certificate2] $entry
Catch
Continue
$validEntries += $cert
$validEntriesCount = $validEntries.Count
$validCertsCount = $validCerts.Count
$hybridJoinCerts = @()
$certSubjectName = $cert.Subject
If ($certSubjectName.StartsWith($("CN=$objectGuid")) -or
$certSubjectName.StartsWith($("CN={$objectGuid}")))
$hybridJoinCerts += $cert
$hybridJoinCertsCount = $hybridJoinCerts.Count
if ($hybridJoinCertsCount -gt 0)
$cloudFiltered = 'FALSE'
Else
$cloudFiltered = 'TRUE'
# Save results
$r.ObjectDN = $objDN
$r.ObjectGUID = $objectGuid
$r.TotalEntriesCount = $totalEntriesCount
$r.CertsCount = $validEntriesCount
$r.ValidCertsCount = $validCertsCount
$r.HybridJoinCertsCount = $hybridJoinCertsCount
$r.CloudFiltered = $cloudFiltered
$results += $r
Try
Catch
Next Steps
Azure AD Connect Version history
Authentication fails with the error "The requested federation realm object '< Object ID
>' does not exist" for users who are part of domain that is federated with a third party
identity provider in either Azure Active Directory (Azure AD) or Microsoft 365 .
This failure happens when the third Party identity provider returns the wrong IssuerURI
within the Issuer field in the Security Assertion Markup Language (SAML) response.
Resolution 1
Contact the support team for the third party identity provider and have them correct the
IssuerURI, returned as Issuer, in the SAML the response returned to either Azure AD or
Microsoft 365, through the client.
Resolution 2
Use the command Set-MsolDomainFederationSettings to modify the IssuerURI of the
federated domain to match the realm object listed in the error.
1. Connect to Azure AD using the MSONLINE module. To check that the module is
installed, open PowerShell and execute the get-module MSONLINE -ListAvailable
command.
2. Follow the steps outlined in Install the Azure AD Module to install the module.
3. Run the following commands to verify the preferred authentication protocol of the
federated domain.
PowerShell
$federationSettings=Get-MsolDomainFederationSettings -DomainName
domain.com
$federationSettings.PreferredAuthenticationProtocol
PowerShell
PowerShell
Overview
The scenarios in this set of articles describe frequent issues when installing Azure AD
Hybrid Sync Agent, and how to correct them.
This troubleshooting doc applies to configuring the agent for Azure AD Connect Cloud
Sync or Workday automatic user provisioning.
Prerequisites
To install Cloud Provisioning Agent, the following prerequisites are required:
Prerequisites for Azure AD Connect cloud sync.
This troubleshooting guide focuses on when you don't have privileges to install MSI.
Without these privileges, you may be unable to successfully install the Azure AD
Connect Provisioning Agent.
Prerequisites
To install Cloud Provisioning Agent, the following prerequisites are required:
Prerequisites for Azure AD Connect cloud sync.
1. Make sure the user context credentials are set to either Domain Administrator or
Enterprise Administrator.
2. Open the Local Security Policy snap-in (secpol.msc). In the Security Settings pane,
select Local policies > User Rights Assignment. Then select the Log on as a
service policy.
3. Select Action > Properties. Then in Local Security Setting, make sure the NT
SERVICE\ALL SERVICES group appears.
During package installation, the service AADConnectProvisioningAgent is created, and
logon credentials are temporarily set to NT Service\AADConnectProvisioningAgent.
If Log on as a service doesn't have ALL SERVICES listed, the installation fails to start, and
it shows the previously listed error message.
To resolve this issue, provide ALL SERVICES user rights to Log on as a service.
Prerequisites
To install Cloud Provisioning Agent, the following prerequisites are required:
Prerequisites for Azure AD Connect cloud sync.
Failed changing Windows service credentials to gMSA. Please check the logs for
more detailed information. If that doesn't help resolve this issue, please contact
support.
If you select the confirm button again, following message will be displayed:
Unable to create gMSA because KDS may not be running on domain controller.
Please create/run KDS manually.
To resolve this issue, check the System event logs for eventID 7041. The event details
describe how to assign a Log on as a service user right at the Local Security Policy snap-
in (secpol.msc).
This troubleshooting guide focuses on when the gMSA is set to log on as a service. This
situation may block you from successfully installing the Azure AD Connect Provisioning
Agent.
Prerequisites
To install Cloud Provisioning Agent, the following prerequisites are required:
Prerequisites for Azure AD Connect cloud sync.
To resolve this issue, check the System event logs for EventID 7038. The following error
appears:
Open the Microsoft Azure AD Connect Provisioning Agent properties and select the
Log On tab. You'll find the settings aren’t grayed out, as is expected for a managed
account service.
To verify whether the account is managed, open a command prompt and type the
following command:
Console
To set the status to True and resolve this issue, type the following command:
Console
Sc.exe managedaccount aadconnectprovisioningagent true
This troubleshooting guide focuses on when an object reference isn't set to an object
instance. This situation may block you from installing the Azure AD Connect
Provisioning Agent.
Prerequisites
To install Cloud Provisioning Agent, the following prerequisites are required:
Prerequisites for Azure AD Connect cloud sync.
Scenario 1
When installing Cloud Provisioning Agent, you may get this error during installation
process.
Error while creating group managed service account (gMSA). Error: There is no such
object on the server.
The installation wizard's trace file isn't clear about what's missing:
Output
at System.DirectoryServices.DirectoryEntry.Bind(Boolean throwIfFail)
at System.DirectoryServices.DirectoryEntry.Bind()
at System.DirectoryServices.DirectoryEntry.get_NativeObject()
at System.DirectoryServices.DirectoryEntry.InvokeGet(String propertyName)
at
Microsoft.Online.Deployment.Framework.Providers.GroupManagedServiceAccountPr
ovider.CreateGroupManagedAccount(String serviceAccountName, String
serviceDnsName, String username, String password)
To resolve the issue in this scenario, use the Active Directory Users and Computers snap-
in (dsa.msc). This snap-in verifies within the domain controller whether the Managed
Service Account container is present.
If the container is missing, contact the Windows Directory Services Team to restore or
create the container with the ADPrep /Domainprep command.
The Active Directory schema in the gMSA domain's forest needs to be updated to
Windows Server 2012 to create a gMSA.
You can update the schema by installing a domain controller that runs Windows
Server 2012 or by running the version of adprep.exe from a computer running
Windows Server 2012. The object-version attribute value for the object
CN=Schema,CN=Configuration,DC=< name of DC >,DC=Com must be 52.
Scenario 2
In a similar scenario as above, you may get the following error:
Error when creating group managed service account (gMSA). Error: There is no such
object on the server.
Output
at System.DirectoryServices.DirectoryEntry.Bind(Boolean throwIfFail)
at System.DirectoryServices.DirectoryEntry.Bind()
at System.DirectoryServices.DirectoryEntry.get_NativeObject()
at System.DirectoryServices.DirectoryEntry.InvokeGet(String propertyName)
at
Microsoft.Online.Deployment.Framework.Providers.GroupManagedServiceAccountPr
ovider.CreateGroupManagedAccount(String serviceAccountName, String
serviceDnsName, String username, String password)
Once you verify and confirm that Managed Service account container is present at the
domain, a client Lightweight Directory Access Protocol (LDAP) trace shows the following
information:
Output
9638 [2]0144.1380::04/14/21-14:17:20.2063638
[Microsoft_Windows_LDAP_Client/Debug16 ] Message=ldap_search called for
connection 0x4392e0d8: DN is
<WKGUID=1eb93889e40c45df9f0c64d23bbb6237,DC=*****,DC=com>. SearchScope is
0x0. AttributesOnly is 0x0.
9679 [1]0144.1380::04/14/21-14:17:20.2075574
[Microsoft_Windows_LDAP_Client/Debug16 ] Message=4e 61 6d 65 45 72 72 3a 20
44 53 49 44 2d 30 33 NameErr:.DSID-03
9680 [1]0144.1380::04/14/21-14:17:20.2076087
[Microsoft_Windows_LDAP_Client/Debug16 ] Message=31 30 30 32 33 38 2c 20 70
72 6f 62 6c 65 6d 20 100238,.problem.
9681 [1]0144.1380::04/14/21-14:17:20.2076151
[Microsoft_Windows_LDAP_Client/Debug16 ] Message=32 30 30 31 20 28 4e 4f 5f
4f 42 4a 45 43 54 29 2001.(NO_OBJECT)
The agent couldn't find the WellKnown globally unique identifier (GUID) for the
Managed Service Accounts (MSA) container.
PowerShell
$ListOWKO.otherwellKnownObjects
Output
B:32:1EB93889E40C45DF9F0C64D23BBB6237:CN=Managed Service
Accounts\0ADEL:8b637607-65e8-4a80-b194-f738b26b9414,CN=Deleted Objects,DC=<
name of DC >,DC=com
This orphan metadata value indicates one of these scenarios:
The MSA container was previously deleted and wasn't properly restored.
The value is missing.
To resolve this issue, open a ticket with Windows Directory Services Team.
This troubleshooting guide focuses on when you can't install the service account after
many retries. This situation blocks you from installing the Azure AD Connect
Provisioning Agent.
Prerequisites
To install Cloud Provisioning Agent, the following prerequisites are required:
Prerequisites for Azure AD Connect cloud sync.
Unable to create gMSA because KDS may not be running on domain controller.
Please create/run KDS manually.
To locate the 9001 and 9002 EventIDs, go to Applications and Services Logs >
Microsoft > Windows > Security - Netlogon.
Use the following command to retrieve the server settings for the supported encryption
types:
Console
C:\windows\system32>reg query
"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Syste
m\Kerberos\Parameters"
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System
\Kerberos\Parameters
In the Active Directory Users and Computers snap-in (dsa.msc), open the
provAgentgMSA properties of the domain controller:
Verify that there's a mismatch between the encryption types that the server offers and
that the accounts accept.
To resolve the issue, remove the RC4 from the provAgentgMSA account by running the
following command in a domain controller:
Console
Next, reboot the Provisioning agent server and reinstall the agent.
For more information on this issue, see Cannot install service account. The provided
context did not match the target.
This article helps you understand the common problems people face when adding or
removing an app in Azure Active Directory.
If your application is never added, or you encounter an error when clicking the Add
button, you’ll see a Notification in an Error state. If you want more details about the
error to learn more to or share with a support engineer, you can see more information
about the error by following the steps in the How to see the details of a portal
notification section.
If you encounter an error when clicking the Add button, you’ll see a Notification in an
Error state. If you want more details about the error to learn more to or share with a
support engineer, you can see more information about the error by following the steps
in the How to see the details of a portal notification section.
I don’t know how to set up my application
once I’ve added it
If you need help with learning about applications, the List of Tutorials on How to
Integrate SaaS Apps with Azure Active Directory article is a good place to start.
In addition to this, the Azure AD Applications Document Library helps you to learn more
about single sign-on with Azure AD and how it works.
For applications under Enterprise application, if you don't have one of the
following roles: Global Administrator, Cloud Application Administrator, Application
Administrator, or owner of the service principal.
For Microsoft application, you won't be able to delete them from the UI regardless
of your role.
1. Select the Notifications icon (the bell) in the upper right of the Azure portal
2. Select any notification in an Error state (those with a red (!) next to them).
7 Note
3. Use the information under Notification Details to understand more details about
the problem.
4. If you still need help, you can also share this information with a support engineer
or the product group to get help with your problem.
5. Select the copy icon to the right of the Copy error textbox to copy all the
notification details to share with a support or product group engineer.
[{"objectId":null,"displayName":null,"status":0,"details":"Internal url
23T19:50:26.465743Z","clientRequestId":"302fd775-3329-4670-a9f3-
bea37004f0bb","internalTransactionId":"ea5b5475-03b9-4f08-8e95-
bbb11289ab65","upn":"tperkins@f128.info","tenantId":"7918d4b5-0442-4a97-
be2d-36f9f9962ece","userObjectId":"17f84be4-51f8-483a-b533-383791227a99"}
This article describes a problem in which you receive the error message "Error
AADSTS50003 - No signing key configured." when trying to sign into a SAML-based
single sign-on (SSO) configured app that has been integrated with Azure Active
Directory (Azure AD).
Symptoms
You receive error AADSTS50003 when trying to sign into an application that has been
setup to use Azure AD for identity management using SAML-based SSO.
Cause
The application object is corrupted and Azure AD doesn’t recognize the certificate
configured for the application.
Resolution
To delete and create a new certificate, follow the steps below:
1. On the SAML-based SSO configuration screen, select Create new certificate under
the SAML signing Certificate section.
2. Select Expiration date and then click Save.
3. Check Make new certificate active to override the active certificate. Then, click
Save at the top of the pane and accept to activate the rollover certificate.
4. Under the SAML Signing Certificate section, click remove to remove the Unused
certificate.
More Information
For a full list of Active Directory Authentication and authorization error codes see Azure
AD Authentication and authorization error codes
This article provides a resolution to the AADSTS50011 error that occurs during federated
authentication with Azure Active Directory (Azure AD).
Symptoms
You receive error AADSTS50011 when trying to sign into an application that has been set
up to use Azure AD for identity management using SAML-based SSO.
Error AADSTS50011 - The reply URL does not match the reply URLs configured for
the application <GUID>. Make sure the reply URL sent in the request matches one
added to your application in the Azure portal. Navigate to
https://aka.ms/urlMismatchError to learn more about how to fix this." when trying
to sign into a SAML-based Single Sign-On (SSO) configured app that has been
integrated with Azure Active Directory (Azure AD).
Cause
The AssertionConsumerServiceURL value in the SAML request doesn't match the Reply
URL value or pattern configured in Azure AD. The AssertionConsumerServiceURL value in
the SAML request is the URL you see in the error.
Resolution
To fix the issue, follow these steps:
As an example, refer to the following article for detailed steps about how to configure
the values in Azure AD:
The reply URL is also known as Redirect URI. These values depend on what
application is being used. You should get the values from the application vendor.
After you update the Reply URL value in Azure AD and it matches the value that sent by
the application in the SAML request, you should be able to sign in to the application.
More Information
For a full list of Active Directory Authentication and authorization error codes, see Azure
AD Authentication and authorization error codes.
Symptoms
You receive the following error message when you try to sign in to an application that
uses OIDC or OAuth2 authentication protocols with Azure AD:
Error AADSTS50011 - The redirect URI <Redirect URI> specified in the request does
not match the redirect URIs configured for the application <GUID>. Make sure the
redirect URI sent in the request matches one added to your application in the Azure
portal. Navigate to https://aka.ms/redirectUriMismatchError to learn more about
how to fix this.
Cause
This error occurs if the redirect URI that the application sent doesn't match any of the
redirect URIs that are registered on the application itself.
When the user tries to sign in to the application by using OIDC or OAuth2 SSO, the login
server (Azure AD) has to know where to send the authorization code or access token
that proves that the user has been successfully authenticated. The application notifies
Azure AD by sending the redirect URI together with the login request. However, the
protocol specifications require that the redirect URI that the application sends must
also be registered on the application itself.
Resolution
To fix the issue, follow these steps:
1. Copy the <GUID> value from the error message. This is your application (client) ID.
2. Go to the Authentication blade of your application in the Azure portal. You can
open the page directly by inserting your application ID as the GUID value in one of
the following links:
4. Add the redirect URI to the appropriate platform configuration. This might be the
web, single page app, or some public/native client platform. Make sure to save the
input after the redirect URI is added.
5. Wait three to five minutes for the changes to take effect, and then send the log-in
request again. You should now be able to sign in to the application.
7 Note
The redirect URI is also known as the reply URL. These values depend on which
protocol is used. OIDC and OAuth2 protocols refer to this value as a redirect URI.
The following video shows how to fix the redirect URI mismatch error in Azure AD:
[!VIDEO https://www.youtube.com/embed/a_abaB7494s ]
More information
For a full list of Active Directory authentication and authorization error codes, see Azure
AD Authentication and authorization error codes.
This article helps you troubleshoot error code AADSTS50020 that's returned if a guest
user from an identity provider (IdP) can't sign in to a resource tenant in Azure Active
Directory (Azure AD).
Symptoms
When a guest user tries to access an application or resource in the resource tenant, the
sign-in fails, and the following error message is displayed:
When an administrator reviews the sign-in logs on the home tenant, a "90072" error
code entry indicates a sign-in failure. The error message states:
User account {email} from identity provider {idp} does not exist in tenant {tenant}
and cannot access the application {appId}({appName}) in that tenant. The account
needs to be added as an external user in the tenant first. Sign out and sign in again
with a different Azure Active Directory user account.
AzureADandPersonalMicrosoftAccount
AzureADMultipleOrgs
PersonalMicrosoftAccount
If the signInAudience setting doesn't contain one of these values, re-create the
app registration by having the correct account type selected. You currently can't
change signInAudience in the manifest.
For more information about how to register applications, see Quickstart: Register an
application with the Microsoft identity platform.
In your application code, apply this URL value in the Authority setting. For more
information about Authority , see Microsoft identity platform application configuration
options.
To make sure that this scenario is the issue, look for the User account and Identity
provider values in the error message. Do those values match the expected combination
or not? For example, did a user sign in by using their organization account to your
tenant instead of their home tenant? Or did a user sign in to the live.com identity
provider by using a different personal account than the one that was already invited?
To individually assign the user access to the application, see Assign a user account
to an enterprise application.
Microsoft Graph
Issue a request to the MS Graph API to review the user creation date, as follows:
HTTP
GET https://graph.microsoft.com/v1.0/users/{id |
userPrincipalName}/createdDateTime
Then, check the creation date of the guest user in the resource tenant against the
creation date of the user account in the home tenant. The scenario is confirmed if the
guest user was created before the home tenant's user account was created.
MSOnline PowerShell
7 Note
Azure PowerShell
Then, check the creation date of the guest user in the resource tenant against the
creation date of the user account in the home tenant. The scenario is confirmed if the
guest user was created before the home tenant's user account was created.
7 Note
When a guest user accepts an invitation, the user's LiveID attribute (the unique sign-in
ID of the user) is stored within AlternativeSecurityIds in the key attribute. Because the
user account was deleted and created in the home tenant, the NetID value for the
account will have changed for the user in the home tenant. Compare the NetID value of
the user account in the home tenant against the key value that's stored within
AlternativeSecurityIds of the guest account in the resource tenant, as follows:
1. In the home tenant, retrieve the value of the LiveID attribute using the Get-
MsolUser PowerShell cmdlet:
Azure PowerShell
2. In the resource tenant, convert the value of the key attribute within
AlternativeSecurityIds to a base64-encoded string:
Azure PowerShell
[convert]::ToBase64String((Get-MsolUser -ObjectId 01234567-89ab-cdef-
0123-456789abcdef
).AlternativeSecurityIds.key)
4. Compare the values from step 1 and step 3 to verify that they're different. The
NetID of the user account in the home tenant changed when the account was
deleted and re-created.
This article provides a resolution to the AADSTS50105 error that occurs during federated
authentication with Azure Active Directory (Azure AD).
Symptoms
You receive the following error when trying to sign into an application that has been set
up to use Azure AD for identity management using SAML-based Single Sign-On (SSO):
Error AADSTS50105 - The signed in user is not assigned to a role for the application.
Cause
The user hasn't been granted access to the application in Azure AD. The user must
belong to a group that is assigned to the application, or be assigned directly.
7 Note
Nested groups are not supported, and the group must be directly assigned to the
application.
Resolution
To assign one or more users to an application directly, see Quickstart: Assign users to an
app.
More Information
For a full list of Active Directory authentication and authorization error codes, see Azure
AD Authentication and authorization error codes.
This article describes a problem in which you receive the following error message when
trying to sign into a SAML-based single sign-on (SSO) configured app that has been
integrated with Azure Active Directory (Azure AD):
Symptoms
You receive error AADSTS650056 when trying to sign into an application that has been
setup to use Azure AD for identity management using SAML-based SSO.
Cause
The Issuer attribute sent from the application to Azure AD in the SAML request doesn’t
match the Identifier value configured for the application in Azure AD.
Resolution
Ensure that the Issuer attribute in the SAML request matches the Identifier value
configured in Azure AD.
Verify that the value in the Identifier textbox matches the value for the identifier value
displayed in the error.
For more information about the Issuer attribute, see Single Sign-On SAML protocol.
More Information
For a full list of Active Directory authentication and authorization error codes see Azure
AD Authentication and authorization error codes.
This article describes a problem in which you receive the error message "Error
AADSTS70001 - Application with Identifier was not found in the directory." when trying
to sign into a SAML-based single sign-on (SSO) configured app that has been integrated
with Azure Active Directory (Azure AD).
Symptoms
You receive error AADSTS70001 when trying to sign into an application that has been set
up to use Azure AD for identity management using SAML-based SSO.
Cause
The Issuer attribute sent from the application to Azure AD in the SAML request doesn’t
match the Identifier value that's configured for the application in Azure AD.
Resolution
Ensure that the Issuer attribute in the SAML request matches the Identifier value
configured in Azure AD.
On the SAML-based SSO configuration page, in the Basic SAML configuration section,
verify that the value in the Identifier textbox matches the value for the identifier value
displayed in the error. If there's a trailing slash at the end of the url, it should be also
included.
More Information
For a full list of Active Directory Authentication and authorization error codes, see Azure
AD Authentication and authorization error codes
This article describes a problem in which you receive the error message "Error -
AADSTS75011 Authentication method by which the user authenticated with the service
doesn't match requested authentication method AuthnContextClassRef." when trying to
sign into a SAML-based single sign-on (SSO) configured app that has been integrated
with Azure Active Directory (Azure AD).
Symptoms
You receive error AADSTS75011 when trying to sign into an application that has been
setup to use Azure AD for identity management using SAML-based SSO.
Cause
The RequestedAuthnContext is in the SAML request. This means the app is expecting the
AuthnContext specified by the AuthnContextClassRef . However, the user has already
authenticated prior to access the application and the AuthnContext (authentication
method) used for that previous authentication is different from the one being
requested. For example, a federated user access to MyApps and WIA occurred. The
AuthnContextClassRef will be urn:federation:authentication:windows . AAD won’t
perform a fresh authentication request, it will use the authentication context that was
passed-through it by the IdP (ADFS or any other federation service in this case).
Therefore, there will be a mismatch if the app requests other than
urn:federation:authentication:windows . Another scenario is when MultiFactor was used:
'X509, MultiFactor .
Resolution
RequestedAuthnContext is an optional value. Then, if possible, ask the application if it
could be removed.
Another option is to make sure the RequestedAuthnContext will be honored. This will be
done by requesting a fresh authentication. By doing this, when the SAML request is
processed, a fresh authentication will be done and the AuthnContext will be honored. To
request a Fresh Authentication the SAML request must contain the value
forceAuthn="true" .
More Information
For a full list of Active Directory Authentication and authorization error codes see Azure
AD Authentication and authorization error codes
This article describes a problem in which you receive the error message "Error
AADSTS75005 - The request is not a valid Saml2 protocol message." when you try to
sign into an apapplication that has been integrated with Azure Active Directory (Azure
AD).
Symptoms
You receive error AADSTS75005 when trying to sign into an application that has been set
up to use Azure AD for identity management using SAML-based SSO.
Cause
Azure AD doesn't support the SAML request sent by the application for single sign-on.
Some common issues are:
Resolution
1. Capture the SAML request. Follow the tutorial How to debug SAML-based single
sign-on to applications in Azure AD to learn how to capture the SAML request.
2. Contact the application vendor and share the following info:
SAML request
Azure AD Single Sign-on SAML protocol requirements
The application vendor should validate that they support the Azure AD SAML
implementation for single sign-on.
More Information
For a full list of Active Directory Authentication and authorization error codes, see Azure
AD Authentication and authorization error codes
Contact us for help
If you have questions or need help, create a support request , or ask Azure community
support.
Error AADSTS750054 - SAMLRequest or
SAMLResponse must be present as
query string parameters in HTTP
request for SAML Redirect binding
Article • 10/12/2022 • 2 minutes to read
This article describes a problem in which you receive the error message "Error
AADSTS750054 - SAMLRequest or SAMLResponse must be present as query string
parameters in HTTP request for SAML Redirect binding." when trying to sign into a
SAML-based single sign-on (SSO) configured app that has been integrated with Azure
Active Directory (Azure AD).
Symptoms
You receive error AADSTS750054 when trying to sign into an application that has been
setup to use Azure AD for identity management using SAML-based SSO.
Cause
Azure AD wasn’t able to identify the SAML request within the URL parameters in the
HTTP request. This can happen if the application is not using HTTP redirect binding
when sending the SAML request to Azure AD.
Resolution
The application needs to send the SAML request encoded into the location header using
HTTP redirect binding. For more information about how to implement it, read the
section HTTP Redirect Binding in the SAML protocol specification document .
More Information
For a full list of Active Directory Authentication and authorization error codes see Azure
AD Authentication and authorization error codes
Install the My Apps Secure Browser Extension to help Azure Active Directory (Azure
AD) to provide better diagnosis and resolutions when using the testing experience
in the Azure portal.
Reproduce the error using the testing experience in the app configuration page in
the Azure portal. Learn more on Debug SAML-based Single Sign-On applications
If you use the testing experience in the Azure portal with the My Apps Secure Browser
Extension, you don't need to manually follow the steps below to open the SAML-based
Single Sign-On configuration page.
2. Open the Azure Active Directory Extension by selecting All services at the top of
the main left-hand navigation menu.
3. Type “Azure Active Directory" in the filter search box and select the Azure Active
Directory item.
If you do not see the application you want show up here, use the Filter control at
the top of the All Applications List and set the Show option to All Applications.
7. Once the application loads, select Single Sign-On from the application’s left-hand
navigation menu.
General troubleshooting
Problem when customizing the SAML claims sent to an
application
To learn how to customize the SAML attribute claims sent to your application, see
Claims mapping in Azure Active Directory.
Compare the resource you’re requesting access to in code with the configured
permissions in the Required Resources tab to make sure you only request resources
you’ve configured.
This article describes a problem in which Azure Active Directory is sending the token to
an incorrect reply URL endpoint or localhost.
Symptoms
During single sign-on, if the sign-in request does not contain an explicit reply URL
(Assertion Consumer Service URL) then Azure AD will select any of the configured reply
URLs for that application. Even if the application has an explicit reply URL configured,
the user may be to redirected https://127.0.0.1:444 .
When the application was added as a non-gallery app, Azure Active Directory created
this reply URL as a default value. This behavior has changed and Azure Active Directory
no longer adds this URL by default.
Cause
The user has not been granted access to the application in Azure AD.
Resolution
Delete the unused reply URLs configured for the application.
On the SAML-based SSO configuration page, in the Reply URL (Assertion Consumer
Service URL) section, delete unused or default Reply URLs created by the system. For
example, https://127.0.0.1:444/applications/default.aspx .
Symptoms
When you try to sign up for, or sign in to, an app that's set up for Microsoft Azure B2C,
you receive the following error message:
Response status code does not indicate success: 404 (Not Found)
Source Error :
Line 106: {
Line 110: }
Cause
This problem occurs if the Policy Name setting for sign-in, password reset, or the user
profile is missing or incorrect in the web.config file for your app.
Resolution
To resolve this issue, follow these steps:
The ida:SignInPolicyId app key exists, and you've replaced the value with the
name of the Sign-in policy that you provided in the Azure B2C Admin Portal.
The ida:PasswordResetPolicyId app key exists, and you've replaced the value
with the name of the Sign-in policy that you provided in the Azure B2C
Admin Portal.
The ida:UserProfilePolicyId app key exists, and you've replaced the value with
the name of the Sign-in policy that you provided in the Azure B2C Admin
Portal.
Console
<appSettings>
...
...
</appSettings>
This article describes an issue in which an error occurs when you try to delete a B2C
directory in Azure Active Directory.
Symptoms
In a Microsoft Azure Active Directory environment, you set up a B2C directory, and then
you try to delete it. However, you receive the following error message:
Cause
This problem occurs if existing B2C application service principals (for example, CPIM,
Ibiza Portal, and SSPR) are blocking the deletion.
Resolution
To fix this issue, use the Azure portal.
Step 1: Delete all apps that are listed on the Azure AD B2C
Dashboard
To do this, follow these steps:
1. Sign in Azure portal as an administrator who has access to the Azure AD B2C
directory.
2. Select your display name in the upper-right corner, and then select the directory
that's your B2C directory.
7 Note
If you have only one directory, your Azure AD B2C directory will already be
selected.
3. To find the Azure AD B2C blade, select the More Services (>) button in the lower-
left corner, and then search on "B2C".
6. Delete all applications. To do this, select the application, select Properties, and
then select the Delete button.
Step 2: Delete the Azure AD B2C tenant
To do this, follow these steps:
1. In the Azure AD B2C directory, locate and select the Azure Active Directory blade
in the Azure portal.
This article describes an error that occurs when you try to sign in to an app that's set up
for Azure AD B2C.
Symptoms
When you try to sign in to an app that is set up for Microsoft Azure Active Directory
(AD) business to consumer (B2C), you receive the following error message:
We track these errors automatically, but if the problem persists feel free to contact
us. In the meantime, please try again.
Timestamp:yyyy-mm-dd hh:mm:ssZ
Cause
The client ID may be missing or incorrect in the Web.config file for the app.
Resolution
To fix this issue, follow these steps:
3. Replace the value of the app key with the client ID that is provided for your app in
the Azure AD B2C admin portal.
<appSettings>
</appSettings>
This article describes an error that occurs when trying to sign in to an app that is set up
for Azure AD B2C.
Symptoms
When you try to sign in to an app that is set up for Microsoft Azure Active Directory
(AD) business to consumer (B2C), you receive the following error message:
Response status code does not indicate success: 404 (Not Found)
Source Error : An unhandled exception occurred during the execution of the current
web request. Information regarding the origin and locations of the exception can be
identified using the exception stack trace below.
Stack Trace :
...
Cause
The sign-up policy name may be missing or incorrect in the Web.config file for the app.
Resolution
To fix this issue, follow these steps:
2. In the Web.config file, verify that the app key ida:SignUpPolicyId exists.
3. Replace the value of the app key with the name of the sign-up policy that you
provided in the Azure AD B2C admin portal.
Console
<appSettings>
</appSettings>
This article can help you fix an issue in which you can't delete a directory from the Azure
Active Directory extension in Azure portal.
Symptoms
You can't delete a directory from the Microsoft Azure Active Directory extension through
the Azure Management Portal. Additionally, you receive one of the following messages:
You are signed in as a user for whom <Your Company Name> is the home directory.
For example, your directory has the domains contoso.onmicrosoft.com and contoso.com .
There must be no users who have these domains in your directory. The guest user may
be a Microsoft account or may be homed from another directory such as
fabrikam.onmicrosoft.com .
To learn more about how to add a guest user, see Create or edit users. When you create
this user in your directory, select one of the following:
Office 365
Intune
Dynamics
Microsoft Azure Information Protection (previously known as Microsoft Azure
Rights Management)
Azure Active Directory Premium
If you have one of these subscriptions, contact billing and subscriptions support .
If you have one of these subscriptions, contact your Volume Licensing partner to cancel
the subscription.
Subscription
Account administrator
Directory
3. If the directory that you are trying to delete is listed under any of the subscriptions,
the account administrator has to sign in and change the directory that is
associated with the subscription. To do this, the account administrator should
follow these steps:
a. On this screen, select Edit Directory.
b. In the Edit Directory window, select the Directory list, and then change the
directory.
7 Note
You may also have to remove additional service principals. Use Azure Active Directory
Module for Windows PowerShell to remove all service principals. To do this, follow these
steps:
PowerShell
Get-MsolServicePrincipal | Remove-MsolServicePrincipal
7 Note
You may receive an error when you remove some service principals. These
principals can't be removed. However, this does not prevent you from
deleting your directory. The error that you receive may resemble the
following:
Original product version: Cloud Services (Web roles/Worker roles), Azure Active
Directory, Microsoft Intune, Azure Backup, Office 365 User and Domain Management,
Office 365 Identity Management
Symptoms
When you try to open the Microsoft Azure Active Directory Module for Windows
PowerShell, the Windows PowerShell console window opens with many text errors
indicating that module packages couldn't be loaded.
Cause
This issue occurs if you don't have the Microsoft .NET Framework 3.51 enabled on your
computer.
Resolution
To resolve this issue, manually enable the .NET Framework 3.51. To do this, follow these
steps, as appropriate for the operating system that you're running:
In Windows 7:
This article describes a problem in which you receive an error message "We could not
verify your account" when you try to reset your password in Microsoft Azure, Office 365,
or Microsoft Intune. To resolve this problem, work with your administrator to update
your telephone number.
Original product version: Azure Active Directory, Microsoft Intune, Cloud Services (Web
roles/Worker roles)
Symptoms
When you use Microsoft Azure, Microsoft Office 365, or Microsoft Intune, you may
receive the following error message when you try to reset your password:
Cause
This problem may occur because there are no telephone numbers on file for you.
Resolution
To resolve this problem, work with your administrator to update your telephone
number(s).
This article discusses an issue in which you receive an error message "Method invocation
failed because [System.Object[]] doesn't contain a method named 'RemoveAll'." when
you run Azure PowerShell cmdlets.
Original product version: Azure Active Directory, Cloud Services (Web roles/Worker
roles)
Symptoms
When you run Windows Azure PowerShell cmdlets, you receive an error message that
resembles the following message:
Cause
This problem occurs for either of the following reasons:
Resolution
To resolve this problem, do either of the following:
Install the latest version of Azure PowerShell. To upgrade the program, see How to
install and configure Azure PowerShell.
Make sure that you are using the correct method name.
Original product version: Cloud Services (Web roles/Worker roles), Microsoft Intune
Symptoms
When you change your password in Microsoft Azure, Microsoft Office 365, or Microsoft
Intune and then select Finish to save your changes, the changed password is not saved.
Cause
This problem occurs when you use special characters such as the less-than sign < or the
greater-than sign > as part of your password.
Resolution
To resolve this problem, do not use special characters as part of your password.
Pending devices are devices that are synced to Azure Active Directory (Azure AD) from
your on-premises Active Directory, but haven't completed registration with the Azure
AD device registration service. When the registered state of a device is pending, the
device can't complete any authorization or authentication requests, such as requesting a
Primary Refresh token for single sign-on, or applying device-based Conditional Access
policies.
7 Note
The pending state exists only for hybrid Azure AD-joined devices.
For more information about how to troubleshoot pending devices, see the following
video:
https://www.youtube-nocookie.com/embed/QBR1c81kaxA
1. The device object is moved to another organizational unit (OU) that isn't in the
sync scope in Azure AD Connect Sync.
2. Azure AD Connect Sync recognizes this change as the device object being deleted
in the on-premises Active Directory. Therefore, it deletes the device in Azure AD.
3. The device object was moved back to the OU in the sync scope.
4. Azure AD Connect Sync creates a pending device object for this device in Azure
AD.
5. The device fails to complete the device registration process because it was
registered previously.
To fix the problem, unregister the device by running dsregcmd /leave at an elevated
command prompt, and restart the device. The device will reinitiate the device
registration process through the scheduled task. For Windows 10-based devices, the
scheduled task is under Task Scheduler Library > Microsoft > Windows > Workplace
Join > Automatic-Device-Join Task.
PowerShell
Get all pending devices, and save the returned data in a CSV file
PowerShell
This article describes an issue in which a user can't join a device to a Workplace by using
Device Registration Services. It provides two resolutions.
Original product version: Windows 8.1 Enterprise, Windows Server 2012 R2 Datacenter,
Windows Server 2012 R2 Standard, Azure Active Directory
Symptoms
When a user tries to do a Workplace Join by using Device Registration Services, the user
receives one of the following messages:
The user receives the following message before providing the user's user name and
password:
Confirm you are using the current sign-in info, and that your workplace uses
this feature. Also, the connection to your workplace might not be working
right now. Please wait and try again.
The user receives the following message after the user provides the user's user
name and password:
Resolution
To resolve either of these problems, use the method that's appropriate for the situation.
Method 1
To fix the problem for message 1, review the Event logs on the client computer that's
trying to do a Workplace Join to determine the correct solution.
An administrator may see details in Event Viewer that resemble the following example:
Event ID: (See the following table for the Event ID.)
Level: Error
103 Workplace Join discovery failed. Server returned http status 404. KB
3045386
103 Workplace Join discovery failed. Server returned http status 503. KB
3045388
The server name or address could not be resolved. Could not connect to
'https://EnterpriseRegistration.domainTEST.com:443/EnrollmentServer/contract?
api-version=1.0' .
A connection with the server could not be established. Could not connect to
'https://EnterpriseRegistration.domain.com:443/EnrollmentServer/contract?api-
version=1.0' .
200 "The maximum number of devices that can be joined to the workplace by the user KB
has been reached." 3045379
Method 2
To fix the problem for message 2, see "Can't connect to the service" error when you try
to register a device .
More Information
To quickly troubleshoot these problems, try one or more of the following things.
Verify DNS
Verify the DNS configuration by using NSlookup , and verify that the answers are correct.
To do so, open a Command Prompt window, and then run the following command:
Console
Nslookup enterpriseregistration.domain.com
Console
ipconfig /FlushDNS
1. Sign in to the Azure portal, or start the Azure AD console from Microsoft 365
admin center as a Company Administrator.
2. Go to the directory where the user is trying to do the join.
3. Go to Configure.
4. Scroll down to the Device Registration section.
5. Make sure the setting labeled ENABLE WORKPLACE JOIN is toggled to Yes.
("Yes" will be blue.)
If you try to do Workplace Join to your local Active Directory domain, take the following
actions:
Open the Active Directory Federation Services (AD FS) management console.
Select Relying Party Trusts to determine whether the Device Registration
Service trust is enabled on each node of the AD FS farm.
Verify that the host name bindings are registered for each
node in the AD FS farm
If you try to do a Workplace Join to your local Active Directory, follow the steps at the
following Microsoft TechNet website:
Original product version: Office 365 Identity Management, Azure Active Directory,
Cloud Services (Web roles/Worker roles), Microsoft Intune, Azure Backup
Symptoms
When you try to remove a user from the recycle bin (also sometimes known as the
Deleted Users container) in a Microsoft cloud service such as Microsoft Office 365,
Microsoft Intune, or Microsoft Azure, you receive the following error message:
For example, you experience these symptoms when you run the following cmdlet:
PowerShell
Remove-MsolUser -RemoveFromRecyleBin
Cause
This problem occurs if the user who is performing the action is not a global admin.
Resolution
Take one of the following actions:
Have someone assign the global admin role to you, and then remove the user
from the recycle bin.
Have a global admin remove the user from the recycle bin.
Wait 30 days. Deleted users will remain in the recycle bin for 30 days. After 30 days,
they are automatically removed from the recycle bin.
Contact us for help
If you have questions or need help, create a support request , or ask Azure community
support.
Set up your enterprise for
working remotely in Azure: FAQ
FAQ
This Azure Active Directory (Azure AD) and cloud services FAQ can help you manage
your IT Pro teams as they work remotely.
If you don't have a VPN solution yet, you can proceed with the deployment, and use a
Windows gateway to allow remote access by having MFA as an additional layer of
security.
If you have an Azure MFA server already in operation, and you have to use it, you can
create such a deployment by using an existing VPN solution or a Windows gateway.
(Notice that this kind of deployment has been deprecated, and only existing customers
can use it.)
If you're using the MFA NPS extension, see the following articles for technical details:
Scenario Prerequisite
Hybrid identity scenarios Azure AD Connect is deployed, and user identities are
synchronized or federated with the on-premises Active
Directory Domain Services (AD DS) with Azure Active
Directory.
Users have Microsoft Upgrade to Microsoft Office 2013 or later and Apple Mail for
Office 2010 or earlier, or iOS 12 or later. Conditional access is not supported by legacy
Apple Mail for iOS 11 or authentication protocols.
earlier
For more information about how each MFA type works and when to use it, go to Plan an
Azure Multi-Factor Authentication deployment.
If the user has Azure Active Directory Premium and wants to enable SSPR-U (SSPR
for users), we recommend this option:
If the user doesn't have Azure Active Directory Premium, and uses an Active
Directory Federation Services (AD FS) for federation but doesn't have any SSPR, we
recommend this option:
If the user doesn't have Azure Active Directory premium but wants to use ADFS to
change the password endpoint, they must explicitly enable the endpoint (Update
password customization). They can do this also on a proxy endpoint. Doing this enables
the capability on AD FS.
Users can send a claim that is named "passwordchangeurl" for the URL as a claim to
Azure AD. Azure AD will honor this for Windows 10, Azure AD-joined workstations that
are running Windows 10, version 1703 or a later version. The user will be directed to the
URL that is shown in the claim when the user presses Ctrl+Alt+Del.
To learn how to manage your users' MFA settings, go to View the status for a user.
1. The device tries to retrieve the tenant ID and domain name from the following
registry subkey:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\CDJ\AAD .
2. If step 1 fails, the device communicates with the Local AD (configuration partition)
to get the tenant's information form the Service Connection Point (SCP). (You can
get SCP information by using Device Registration SCP Tool PowerShell.)
3. The device communicates with the Azure AD tenant.
4. The device authenticates against either Azure AD or a federation service (for
example, ADFS).
5. The device registration process finishes.
For more information, go to Hybrid Azure AD Device Registration .
1. Enable the password writeback feature from Azure Active Directory Connect. For
more information, go to Enable password writeback in Azure AD Connect.
2. Set the required permission to the Azure Active Directory Connect account by
running the following PowerShell commands on the Azure Active Directory
Connect server:
PowerShell
PowerShell
Set-ADSyncPasswordWritebackPermissions -
ADConnectorAccountNameAADConnectAccount -ADConnectorAccountDomain
domain.local
PowerShell
Get-ADSyncADConnectorAccount
How does self-service password reset writeback work in Azure Active Directory?
The third-party products that this article discusses are manufactured by companies that
are independent of Microsoft. Microsoft makes no warranty, implied or otherwise, about
the performance or reliability of these products.
Error when you try to run Azure Active
Directory for Windows PowerShell
cmdlets: The term <cmdlet name> is
not recognized
Article • 04/20/2022 • 2 minutes to read
Original product version: Cloud Services (Web roles/Worker roles), Azure Active
Directory, Microsoft Intune, Azure Backup, Office 365 Identity Management
Symptoms
When you try to run Microsoft Azure Active Directory Module for Windows PowerShell
cmdlets, you receive the following error message:
The term <cmdlet name> is not recognized as the name of a cmdlet, function, script
file, or operable program. Check the spelling of the name, or if a path was included,
verify that the path is correct and try again.
At line:1 char:20
+ Connect-MsolService <<<<
+ FullyQualifiedErrorId : CommandNotFoundException
Cause
This issue can occur if the Azure Active Directory Module for Windows PowerShell isn't
loaded correctly.
Resolution
To resolve this issue, follow these steps.
1. Install the Azure Active Directory Module for Windows PowerShell on the
computer (if it isn't already installed). To install the Azure Active Directory Module
for Windows PowerShell, see Manage Azure AD using Windows PowerShell.
2. Select Start > All Programs, select Windows Azure Active Directory, and then
select Windows Azure Active Directory Module for Windows PowerShell.
3. At the Windows PowerShell command prompt, type Get-Module , and then press
Enter.
4. In the output, check that the MSOnline module is present. The output should look
similar to the following one:
Output
If the MSOnline module isn't present, use Windows PowerShell to import the
MSOnline module. To do it, follow these steps:
a. Connect to Exchange Online by using remote PowerShell. For more info about
how to do it, see Connect to Exchange Online Using Remote PowerShell.
PowerShell
Import-Module MSOnline
This troubleshooting guide helps you diagnose and solve issues with dynamic groups in
Azure Active Directory.
No: Create a basic group and add members using Azure Active Directory or other
applicable groups.
References
Recommended articles for group creation:
You're unable to create a dynamic group in the Azure Portal, or you receive an
error when creating a dynamic group in PowerShell. See Cannot create a dynamic
group.
You can't find the attribute to create a rule. See Create a dynamic membership rule.
You receive a "max groups allowed" error when trying to create a Dynamic Group
in PowerShell: You have reached 5,000 groups, the maximum limit for Dynamic
groups in your tenant. To create new Dynamic groups, first delete existing Dynamic
groups. Note that there's no way to increase the maximum limit.
Dynamic membership update issues
You've created a dynamic group and configured a rule, but encountered these common
issues:
No members appear in the group, some users or devices don't appear in the group, or
the wrong users or devices appear in the group.
This behavior is expected. Existing members of the group are removed when a rule
is enabled or changed, or attributes are changed. The users returned from the
evaluation of the rule are added as members to the group.
You don't see membership changes instantly after adding or changing a rule.
To force the group to be processed, see Force the group to be processed now.
Before you attempt to delete a group in Azure Active Directory, ensure that you
have deleted all assigned licenses. For more information about group deletion in
general, see Delete a group.
You restored a deleted group but did not see any update.
When a dynamic group is deleted and restored, it's seen as a new group and re-
populated according to the rule. This process might take up to 24 hours.
2. Select the group in the Overview of Group tab, then check whether the
membership type is set to Dynamic.
When creating or updating dynamic group rules, you can use this information to help
determine whether a user or device meets the rule criteria for becoming a member of a
group. This can also aid you in troubleshooting when membership isn't expected.
For more information, see Validate a dynamic group membership rule (preview) in Azure
Active Directory
Dynamic groups require the tenant to have an Azure Active Directory P1/P2
Premium license. For more information, check Azure Active Directory license
plans
2. Ensure that the user creating the group has the appropriate administrator
permissions:
Ensure that you are authorized to create a new group. Global administrators
can disable group creation in the Azure portal or Access Panel. You may need
an administrator create the new group for you, or give you appropriate
permissions.
3. Check that group creation permissions are enabled for the type of group being
created.
4. Check that the specific user is in the list of users that can create a group.
To create any new Dynamic groups, you'll first need to delete some existing Dynamic
groups. There's no way to increase the limit.
The list of Azure Active Directory license plans can be accessed at Azure
Active Directory pricing .
2. If you cannot find the built-in User Attributes, ensure that the attribute is in the list
of supported properties. If it's not in the list, it's not currently supported.
3. If you're looking for built-in Device Attributes, ensure that the attribute is in the
list of device attributes. If it's not in the list, it's not currently supported.
4. If the attribute isn't found in the Simple Rule drop-down in the Azure portal, use
the Advanced Rule to construct a rule.
a. Ensure that the syntax is accurate and that both the property type and value
match.
b. Also ensure that you have added the appropriate object prefix to select the
property.
c. Learn about the guidelines on how to create an Advanced Rule including the list
of supported operators and examples for common rules.
5. Also use Extension Attributes for dynamic user rules. These rules will be visible in
the drop-down list while creating a simple rule.
The custom attribute name can be found in the directory by querying a user's
attribute using PowerShell, and searching for the attribute name. These
attributes could also be used when constructing an Advanced Rule.
6. Ensure that the Role of the user creating the Dynamic group, is either a Company
Administrator or a User Administrator.
8. The Simple Rule builder supports up to five (5) expressions. To add more than five
expressions to the rule, the text box must be used.
Troubleshoot dynamic membership update
issues
You've created a dynamic group and configured a rule, but encountered one of these
issues:
2. If membership processing status is processing error and update paused, ask the
administrator or PG team to resume the group from processing error.
3. Verify that the users or devices satisfy the membership rule or not, following the
steps in Evaluate dynamic membership of a user or device.
4. Verify that processing status is not impacted by the issue of guest user addition
disallowed by policy.
If the group is an Office365 group and the user is a guest user, the guest user
can't be added to a group if the directory setting does not allow a guest user
addition in the tenant.
A guest user addition error in one group will block the updates of the same
and other groups in the same tenant. You can choose to:
Allow a guest user addition by following the Manage guest user setting
for groups in a tenant.
Change the group rule to exclude a guest user by adding: (user.userType
-eq "member") .
5. If everything looks correct, allow some time for the group to populate. Depending
on the size of your tenant, the group may take up to 24 hours to populate the first
time, or after a rule change.
6. If problem still exists after 24 hours and the processing status shows as complete,
you can reset the processing for the group to resolve any transient system issue.
If the processing status shows as in processing, continue to wait.
Manual validation
Validate the values for user or device attributes (InAzure Portal, or using PowerShell in
the rule.
1. Connect to the directory. Visit How to connect to the directory using PowerShell
for more information.
3. Update the setting at the tenant level. To change the guest user setting at the
tenant level, visit: How to update setting at tenant level using PowerShell.
4. Check the setting for the group. To change the guest user setting to your target
value if applicable, visit: How to check and update setting for a specific group
using PowerShell
Attribute not eq "Value") Make sure the attribute is on the supported properties
supported list.
Operator contains true) The operator used isn't supported for the property
isn't type (in this example, -contains cannot be used on
supported on type boolean). Use the correct operators for the
attribute property type.
Error: Query 1. (user.department -eq 1. Missing operator. Use -and or -or two join
compilation "Sales") predicates: (user.department -eq "Sales") -or
error (user.department -eq (user.department -eq "Marketing")
"Marketing")
2. Error in regular expression used with -match
(For more information about group deletion in general, see Delete a group.
Delete a group
1. Groups can be deleted from the directory using the Remove-AzureADGroup
cmdlet in the Azure AD PowerShell module.
2. Before attempting to delete a group in Azure Active Directory, ensure you have
deleted all assigned licenses to avoid errors.
Related articles
Creating Dynamic Membership Rules.
Troubleshooting groups.
This article outlines the methods in Azure Active Directory (Azure AD) you can use to:
Create a user.
Delete a user.
Create users in bulk.
Prerequisites
One of the following role assignments:
Global Administrator
User Administrator
Azure portal
Microsoft Graph REST API
Azure PowerShell
Azure CLI
These methods refer to users who are created directly in Azure AD. The article doesn't
cover users who are created elsewhere and then synced to Azure AD or business-to-
business scenarios.
Create a user
Select a method to create a user in Azure AD.
Azure portal
4. On the User page, enter the user's Name, User name, Groups, Directory role,
and Job info.
5. Copy the autogenerated password provided in the Password box. You'll need
to give this password to the user to sign in for the first time.
6. Select Create.
For more information, see Add or delete users - Azure Active Directory.
Delete a user
Select a method to delete a user in Azure AD.
Azure portal
3. Select Users.
4. Search for and select the user you want to delete from your Azure AD tenant
(for example, Mary Parker).
The user is deleted and no longer appears on the Users - All users page. You can
view the user on the Deleted users page for the next 30 days. You may also restore
the deleted user during that time. For more information about restoring a user, see
Restore or remove a recently deleted user using Azure Active Directory.
After you delete a user, any licenses that the user consumes are made available for
other users.
User.ReadWrite.All
Directory.ReadWrite.All
For more information about who can manage each aspect of user management, see
Least privileged roles by task in Azure Active Directory—Users.
Another object Make the user principal name (UPN) unique. This error occurs when the
with the same administrator attempts to create a user with an existing user name in Azure
value for property AD. For more information, see User name policies.
userPrincipalName
already exists.
Property See User name policies for a list of allowed and disallowed characters. This
userPrincipalName error occurs when you create a new user with unacceptable characters in the
is invalid. UPN. The user name and email address properties also can't contain accent
characters.
Error message Action
The domain Make sure the domain you're using to create the user is on the list of
portion of the verified domains in the Azure AD portal. The status of the domain needs to
userPrincipalName be Verified. If you've verified the domain status, see whether the domain is
property is invalid. Federated (has a checkmark) or Managed (doesn't have a checkmark). You
You must use one can only create users in Azure AD for managed domains. For federated
of the verified domains, you must create the user on the identity provider (IdP), and then
domain names in sync to Azure AD. You can't assign a federated domain to a user.
your organization.
Directory quotas
For the Free edition of Azure AD, you can create a maximum of 50,000 Azure AD
resources in a single tenant by default. If you use at least one verified domain, the
default Azure AD service quota for your organization is extended to 300,000 Azure AD
resources. For organizations that are created by self-service sign-up, the Azure AD
service quota remains 50,000 Azure AD resources. This limit applies even if you made an
internal admin takeover and converted the organization to a managed tenant with one
or more verified domains. This service limit is unrelated to the pricing tier limit of
500,000 resources on the Azure AD pricing page. To go beyond the default quota, you
must contact Microsoft Support.
The following are common examples of Microsoft first party service principal actors that
may be found in Azure Active Directory audit logs including a description of actions
these actors may take on Azure Active Directory objects in your tenant.
Unknown actors
Actor Name Service(s) Description
- Reference 1 - Azure AD
built-in roles
When you're reviewing your sign-in reports, you might see an application in your sign-in
report that you don't own and want to identify the application. You also might wonder
how you signed into that app, if you don't remember accessing the app.
For example, when you access learn.microsoft.com , the application that's shown in the
sign-in log may say dev-rel-auth-prod , which isn't descriptive of learn.microsoft.com .
Although the apps that are listed in sign-in reports are owned by Microsoft and aren't
suspicious applications, you can determine whether Microsoft owns an Azure Active
Directory (Azure AD) service principal that's found in your Azure AD logs.
7 Note
3. In the Application Type drop-down list, select Microsoft Applications, and then
select Apply. All applications that are listed here are owned by Microsoft.
4. In the search box below the drop-down lists, filter the Microsoft application list by
adding a specific Display Name or Application ID.
5. Select the desired app, and then select Properties in the navigation pane to view
the listed app's properties. Verify that you see the following error message:
Output
You can't delete this application because it's a Microsoft first party
application.
cmd
AEM-DualAuth 69893ee3-dd10-4b1c-832d-
4870354be3d8
AzureSupportCenter 37182072-3c9c-4f6a-a4b3-b3f91cacffce
Bing 9ea1ad79-fdb6-4f9a-8bc3-2b70f96e34c7
Dataverse 00000007-0000-0000-c000-000000000000
IrisSelectionFrontDoor 16aeb910-ce68-41d1-9ac3-9e1673ac9575
0cd196ee-71bf-4fd6-a57c-b491ffd4fb1e
38049638-cc2c-4cde-abe4-4479d721ed44
Office.com 4b233688-031c-404b-9a80-a4f3f2351f90
OfficeClientService 0f698dd4-f011-4d23-a33e-b36416dcb1e6
OfficeHome 4765445b-32c6-49b0-83e6-1d93765276ca
OfficeShredderWacClient 4d5c2d63-cf83-4365-853c-925fd1a64357
OMSOctopiPROD 62256cef-54c0-4cb4-bcac-4c67989bdc40
OneNote 2d4d3d8e-2be3-4bef-9f87-7875a61c29de
SharedWithMe ffcb16e8-f789-467c-8ce9-f826a080d987
Signup b4bddae8-ab25-483e-8670-df09b9f1d0ea
Sway 905fcf26-4eb7-48a0-9ff0-8dcc7194b5ba
Yammer 00000005-0000-0ff1-ce00-000000000000
More information
For more information, see Sign-in activity reports in the Azure Active Directory portal.
Original product version: Cloud Services (Web roles/Worker roles), Azure Active
Directory, Microsoft Intune, Azure Backup, Office 365 Identity Management
Symptoms
When you run the Microsoft Azure Active Directory Sync Tool Configuration Wizard, you
receive the following error message:
An unknown error occurred with the Microsoft Online Services Sign-in Assistant.
Contact Support.
Resolution
To resolve this issue, follow these steps:
1. Select Start, type appwiz.cpl , and then press Enter to open the Programs and
Features item in Control Panel.
4. Reinstall the Azure Active Directory Sync tool. For more information about how to
do this, go to Install or upgrade the Directory Sync tool .
5. Check whether the issue is resolved. If the error still occurs after you follow steps 1
through 4, make sure that the Microsoft Online Services Sign-In Assistant service is
started. To do this, follow these steps:
a. Select Start, type services.msc , and then press Enter.
b. In the list of services, make sure that the entry in the Status column for
Microsoft Online Services Sign-In Assistant is Started.
This article provides information about troubleshooting a problem in which you receive
Authorization_RequestDenied error when trying to change a password using Graph API.
Symptoms
You try to change the password of a Microsoft Azure Active Directory (Azure AD) user. If
the Organizational Role setting for that user is set to any "Administrator" option, the
process fails. It generates the following error message:
{"odata.error":{"code":"Authorization_RequestDenied","message":
{"lang":"en","value":"Insufficient privileges to complete the operation." }} }
When you give the Read and write directory data permission to your application or
Application Service Principal, the application can change the password of a typical Azure
AD user by using Graph API. This setting is shown in the following screenshot.
Resolution
To resolve this problem, add your application to Company Administrator in the Office
365 administrative roles. To do so, run all the following Azure AD Module for Windows
PowerShell (MSOL) cmdlets:
PowerShell
Connect-MsolService
It will prompt you for your tenant's credential. You should be able to use your Azure AD
administrative user name in the admin@tenant.onmicrosoft.com format.
PowerShell
Replace the "Application Name" with the name of your "Application Service Principal".
PowerShell
It will add your "Application Service Principal" to the Company Administrator role.
Also, you must add your application to User Account Administrator in the Office 365
administrative roles if the Azure AD user has any of the following Administrator
organizational roles:
Global Administrator
Billing Administrator
Service Administrator
PowerShell
Connect-MsolService
After you run both sets of cmdlets, your application will be enabled to change the
password of all Administrator organizational roles.
7 Note
This article describes an issue in which Azure Active Directory Authentication Library
(ADAL) authentication from Android devices fails if additional certificate downloads are
required.
Symptoms
When you try to authenticate by using the ADAL for Android, Federation sign-in may
fail. Specifically, the application triggers an AuthenticationException error when it tries
to display the login page. In Google Chrome, the STS login page might be called out as
unsafe. This issue occurs only on Android devices, for any application that uses ADAL for
Android to connect to a Federation server.
To determine whether you are experiencing this issue, run the following test:
1. Obtain your Security Token Service (STS) server's fully qualified domain name
(FQDN). To do this, follow these steps:
a. Go to https://login.microsoftonline.com on a non-Android device.
b. Enter your work or school account.
c. When you're redirected to your federated STS login page, note the URL address
in the browser. It looks like https://sts.contoso.com . The FQDN is
sts.contoso.com .
https://www.ssllabs.com/ssltest/analyze.html?d=
<STS_SERVER_FQDN_HERE>&hideResults=on&latest
For example:
https://www.ssllabs.com/ssltest/analyze.html?
d=sts.contoso.com&hideResults=on&latest
3. See whether any of the following messages are displayed:
Extra download
Sent by server
In trust store
If any of the SSL certificates displays the "Extra download" message, you are
experiencing the issue that's described earlier in this section, per the following
screenshot:
Cause
Android does not support downloading additional certificates from the
authorityInformationAccess field of the certificate. This is true across all Android
versions and devices, and for the Chrome browser. Any server authentication certificate
that's marked for extra download based on the authorityInformationAccess field will
trigger this error if the entire certificate chain is not passed from Active Directory
Federation Services (AD FS).
Resolution
To resolve this issue, configure your STS and Web Application Proxy (WAP) servers to
send the necessary intermediate certificates together with the SSL certificate. To do this,
follow these steps:
1. When you export the SSL certificate from a computer to the computer's personal
store of the AD FS and WAP server (or servers), make sure that you export the
Private key and that you select Personal Information Exchange - PKCS #12. Also
make sure that the Include all certificates in the certificate path if possible and
Export all extended properties check boxes are selected.
2. Run certlm.msc on the Windows servers, and then import the *.PFX file into the
computer's personal certificate store. When you do this, the server will pass the
entire certificate chain when a client application uses ADAL for authentication.
7 Note
The certificate store of Network Load Balancers should also be updated to include
the entire certificate chain.
This article describes a problem in which an error occurs when you perform a Workplace
Join operation.
Original product version: Windows 8.1 Enterprise, Windows Server 2012 R2 Datacenter,
Windows Server 2012 R2 Standard, Azure Active Directory
Symptoms
When you try to perform a Workplace Join operation, you receive this error message:
Confirm you are using the current sign-in info, and that your workplace uses this
feature. Also, the connection to your workplace might not be working right now.
Please wait and try again.
Additionally, an administrator may see the following event details in Event Viewer:
Level: Error
Description: Workplace Join discovery failed. Server returned http status 404.
https://EnterpriseRegistration.domain.com:443/EnrollmentServer/contract?api-
version=1.0
Cause
This problem occurs for one of the following reasons:
The client is being redirected to the internal Device Registration Service (DRS)
instance where the DRS endpoint is disabled or stopped.
The DNS records for the EnterpriseRegistration service are missing or
misconfigured.
The domain suffix of the currently logged-on user is not accounted for in the SSL
certificate of DRS.
The network or firewall is blocking traffic, or transient network issues are causing
packet loss.
Resolution
Verify DNS
Verify the DNS configuration by using the NSlookup tool, and verify that the answers are
correct.
To do this, open a Command Prompt window, and then run the following command:
Console
Nslookup enterpriseregistration.domain.com
1. Sign in to Azure portal, or launch the Azure AD console from the M365 admin
center as a Company Administrator.
2. Locate the directory where the user is trying the join operation.
3. Go to Configure.
4. Scroll down to the Device Registration section.
5. Make sure that the setting that's labeled ENABLE WORKPLACE JOIN is toggled to
Yes (Yes will be blue).
If you try to perform a Workplace Join to your local Active Directory domain, follow
these steps:
1. Start the AD FS Management console, and then select Relying Party Trusts to
determine whether the Device Registration Service trust is Enabled on each node
of the AD FS farm.
2. If Device Registration Service is Enabled, check the Services Console to make sure
that the Device Registration Service is started.
Console
Netsh
Console
More information
For more troubleshooting information, see the following article in the Microsoft
Knowledge Base:
This article provides information about resolve a problem in which you receive errors
when trying to use the Azure Active Directory Sync tool to synchronize the
SystemMailbox and DiscoverySearchMailbox user accounts.
Original product version: Cloud Services (Web roles/Worker roles), Azure Active
Directory, Microsoft Intune, Azure Backup, Office 365 Identity Management
Symptoms
When you use the Microsoft Azure Active Directory Sync tool to sync the following user
accounts, you receive directory synchronization errors:
SystemMailbox{1f05a927-beed-480c-b962-
da8d1d7e16a8}@<DomainNameName>
SystemMailbox{e0dc1c29-89c3-4034-b678-e6c29d823ed9}@<DomainName>
DiscoverySearchMailbox{D919BA05-46A6-415f-80AD-
7E09334BB852}@<DomainNameName>
Cause
This issue occurs if the three user accounts that were created during Microsoft Exchange
Server 2010 installation are missing the attribute data. In this case, the attribute data is
used by the Azure Active Directory Sync tool to filter out these user accounts and stop
them from being synced to the cloud.
Resolution
To resolve this issue, use one of the following methods, as appropriate for your
situation.
Method 1
On the domain controller or a computer on which the Active Directory Domain Services
Administration Tools are installed, follow these steps:
4. Double-click each SystemMailbox user account, and then follow these steps for
each account:
a. Select Attribute Editor.
b. Find the mailNickName attribute, and then populate the attribute by using the
value that's included in the mail attribute.
c. Select OK.
Method 2
On the computer on which the Directory Sync tool is installed, follow these steps:
2. Open Windows PowerShell, type Import-Module DirSync , and then press Enter.
3. After the Windows PowerShell session starts, run the following cmdlet:
PowerShell
Start-OnlineCoexistenceSync
If the methods did not work, see Recreate missing arbitration mailboxes.
This article describes a problem in which you receive an error message "We could not
verify your account" when you try to reset your password in Microsoft Azure, Office 365,
or Microsoft Intune. To resolve this problem, work with your administrator to update
your telephone number.
Original product version: Azure Active Directory, Microsoft Intune, Cloud Services (Web
roles/Worker roles)
Symptoms
When you use Microsoft Azure, Microsoft Office 365, or Microsoft Intune, you may
receive the following error message when you try to reset your password:
Cause
This problem may occur because there are no telephone numbers on file for you.
Resolution
To resolve this problem, work with your administrator to update your telephone
number(s).
This article can help you resolve a problem in which you receive Code 403 (Forbidden)
when using Azure Seamless Single Sign-On on Windows 10.
Symptoms
The Azure Seamless Single Sign-On authentication does not work after you upgrade to
Windows 10. When this problem occurs, you may receive the following error message:
Resolution
To resolve this problem, follow these steps:
1. Check the following Group Policy object, and make sure that it is set to not
defined:
If you update the Group Policy setting, run gpupdate /force to push the changes
to the devices.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\k
erberos\parameters
This article describes an issue in which you can't connect to a Microsoft cloud service
such as Office 365, Azure, or Microsoft Intune by using the Connect-MSOLService cmdlet.
Original product version: Azure Active Directory, Microsoft Intune, Azure Backup, Office
365 User and Domain Management, Office 365 Identity Management
Symptoms
When you try to use the Connect-MSOLService cmdlet in the Microsoft Azure Active
Directory Module for Windows PowerShell to connect to a Microsoft cloud service such
as Office 365, Microsoft Azure, or Microsoft Intune, your attempt is unsuccessful.
Instead, you receive one of the following error messages:
Resolution
To resolve this issue, refer one of the following articles, as appropriate for your situation:
More information
For more information about Azure Active Directory Module for Windows PowerShell, see
Manage Azure AD using Windows PowerShell.
Original product version: Windows 10 version 1709 all editions, Windows 10 version
1703 all editions, Windows 10 version 1511 all editions, Windows 10 version 1607 all
editions
Symptoms
You have enabled Enterprise State Roaming (ESR) in the Azure Active Directory portal
and on some Windows 10 clients. Any supported settings for sync, such as the desktop
background or task bar position, don't sync between devices for the same user. The
following events 1098 and 1097 are logged in the Microsoft-Windows-AAD/Operational
event log:
Console
Source: Microsoft-Windows-AAD
Level: Error
Keywords: Error,
TokenEndpoint: https://login.microsoftonline.com/common/oauth2/token
Authority: https://login.microsoftonline.com/common
Resource: https://syncservice.windows.net/*
Source: Microsoft-Windows-AAD
Keywords: Operational,
Authority: https://login.microsoftonline.com/common
Resource: https://syncservice.windows.net/*
Cause
Multi-factor authentication (MFA) is enabled, and that's why Enterprise State Roaming
won't prompt the user for additional authorization.
Resolution
If your device is configured to require multi-factor authentication on the Azure Active
Directory portal, you may fail to sync settings while you sign in to a Windows 10 device
using a password. This type of multi-factor authentication configuration is intended to
protect an Azure administrator account. Admin users may still be able to sync by signing
in to their Windows 10 devices with their Microsoft Passport for Work PIN or by
completing multi-factor authentication while accessing other Azure services, such as
Microsoft Office 365.
Sync can fail if the Azure AD Administrator configures the Active Directory Federation
Services multi-factor authentication conditional access policy, and the access token on
the device expires. Make sure that you sign in and sign out using the Microsoft Passport
for Work PIN, or complete multi-factor authentication when accessing other Azure
services like Office 365.
More Information
Microsoft is investigating how to improve the experience with Enterprise State Roaming
and MFA authorization enabled on the device.
To improve the security posture of your tenant, and to remain in compliance with industry standards,
Microsoft Azure Active Directory (Azure AD) will soon stop supporting the following Transport Layer
Security (TLS) protocols and ciphers:
TLS 1.1
TLS 1.0
3DES cipher suite (TLS_RSA_WITH_3DES_EDE_CBC_SHA)
Azure AD Connect
Azure AD PowerShell
Azure AD Application Proxy connectors
PTA agents
Legacy browsers
Applications that are integrated with Azure AD
To follow the latest compliance standards for the Federal Risk and Authorization Management
Program (FedRAMP) .
To improve security when users interact with our cloud services.
TLS 1.0, 1.1 and 3DES Cipher suite in U.S. government instances starting on March 31, 2021.
TLS 1.0, 1.1 and 3DES Cipher suite in public instances starting January 31, 2022. (This date has been
postponed from June 30th, 2021 to January 31st, 2022, to give administrators more time to remove
the dependency on legacy TLS protocols and ciphers (TLS 1.0,1.1 and 3DES).)
Update the Windows OS and the default TLS that you use for
WinHTTP
These operating systems natively support TLS 1.2 for client-server communications over WinHTTP:
Windows 10
Windows 8.1
Windows Server 2016
Windows Server 2012 R2
Later versions of Windows and Windows Server
Verify that you haven't explicitly disabled TLS 1.2 on these platforms.
By default, earlier versions of Windows (such as Windows 8 and Windows Server 2012) don't enable TLS
1.2 or TLS 1.1 for secure communications by using WinHTTP. For these earlier versions of Windows:
You can configure those values to add TLS 1.2 and TLS 1.1 to the default secure protocols list for WinHTTP.
7 Note
By default, an OS that supports TLS 1.2 (for example, Windows 10) also supports legacy versions of
the TLS protocol. When a connection is made by using TLS 1.2 and it doesn’t get a timely response, or
when the connection is reset, the OS might try to connect to the target web service by using an older
TLS protocol (such as TLS 1.0 or 1.1). This usually occurs if the network is busy, or if a packet drops in
the network. After the temporary fallback to the legacy TLS, the OS will try again to make a TLS 1.2
connection.
What will be the status of such fallback traffic after Microsoft stops supporting the legacy TLS? The OS
might still try to make a TLS connection by using the legacy TLS protocol. But if the Microsoft service
is no longer supporting the older TLS protocol, the legacy TLS-based connection won’t succeed. This
will force the OS to try the connection again by using TLS 1.2 instead.
Identify and reduce dependency on clients that don't support TLS 1.2
Update the following clients to provide uninterrupted access:
For more information, see Handshake Simulation for various clients connecting to www.microsoft.com,
courtesy SSLLabs.com.
Enable TLS 1.2 on common server roles that communicate with Azure
AD
Azure AD Connect (install the latest version)
Do you also want to enable TLS 1.2 between the sync engine server and a remote SQL Server?
Then make sure you have the required versions installed for TLS 1.2 support for Microsoft SQL
Server .
Azure AD Connect Authentication Agent (pass-through authentication) (version 1.5.643.0 and later
versions)
Azure Application Proxy (version 1.5.1526.0 and later versions enforce TLS 1.2)
Active Directory Federation Services (AD FS) for servers that are configured to use Azure Multi-Factor
Authentication (Azure MFA)
NPS servers that are configured to use the NPS extension for Azure AD MFA
Action required
1. We highly recommend that you run the latest version of the agent, service, or connector.
2. By default, TLS 1.2 is enabled on Windows Server 2012 R2 and later versions. In rare instances,
the default OS configuration might have been modified to disable TLS 1.
To make sure that TLS 1.2 is enabled, we recommend that you explicitly add the registry values
from the Enable TLS 1.2 on client or server operating systems section on servers that are
running Windows Server and that communicate with Azure AD.
3. Most of the previously listed services are dependent on .NET Framework. Make sure it's
updated as described in the Update and configure .NET Framework to support TLS 1.2 section.
Registry strings
To manually configure and enable TLS 1.2 at the operating system level, you can add the following
DWORD values.
For Windows 2012 R2, Windows 8.1, and later OS, TLS 1.2 is enabled by default. Thus, the following
registry values aren't required unless they were set with different values.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS
1.2\Client
"DisabledByDefault": 00000000
"Enabled": 00000001
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS
1.2\Server
"DisabledByDefault": 00000000
"Enabled": 00000001
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v4.0.30319
"SchUseStrongCrypto": 00000001
To enable TLS 1.2 by using a PowerShell script, see TLS 1.2 enforcement for Azure AD Connect.
For more information, see Determine which versions and service pack levels of .NET Framework are
installed.
.NET Framework 4.6.2 and later versions support TLS 1.2 and TLS 1.1. Check the registry settings. No
other changes are required.
Update .NET Framework 4.6 and earlier versions to support TLS 1.2 and TLS 1.1.
Do you use .NET Framework 4.5.2 or 4.5.1 on Windows 8.1 or Windows Server 2012? Then the
relevant updates and details are also available from Microsoft Update Catalog .
Also see Microsoft Security Advisory 2960358.
For any computer that communicates across the network and runs a TLS 1.2-enabled system, set the
following registry DWORD values.
For 32-bit applications that are running on a 32-bit OS and 64-bit applications that are running on a
64-bit OS, update the following subkey values:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v2.0.50727
"SystemDefaultTlsVersions": 00000001
"SchUseStrongCrypto": 00000001
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v4.0.30319
"SystemDefaultTlsVersions": 00000001
"SchUseStrongCrypto": 00000001
For 32-bit applications that are running on 64-bit OSs, update the following subkey values:
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\.NETFramework\v2.0.50727
"SystemDefaultTlsVersions": dword:00000001
"SchUseStrongCrypto": dword:00000001
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v4.0.30319
"SystemDefaultTlsVersions": dword:00000001
"SchUseStrongCrypto": dword:00000001
To find the sign-in attempts that used legacy TLS protocols, an administrator can review the logs by:
Azure Monitor
You can query the sign-in logs using Azure Monitor. Azure Monitor is a powerful log analysis,
monitoring, and alerting tool. Use Azure Monitor for:
Azure AD logs
Azure resources logs
Logs from independent software tools
7 Note
You need an Azure AD Premium license to export reporting data to Azure Monitor.
1. In Integrate Azure AD logs with Azure Monitor logs, follow the instructions for how to access the
Azure AD sign-in logs in Azure Monitor.
2. In the query definition area, paste the following Kusto Query Language query:
Kusto
SigninLogs
| mv-apply JsonAuthProcDetails on (
| project HasLegacyTls=JsonAuthProcDetails.value
// Non-interactive sign-ins
AADNonInteractiveUserSignInLogs
| mv-apply JsonAuthProcDetails on (
| project HasLegacyTls=JsonAuthProcDetails.value
AADServicePrincipalSignInLogs
| mv-apply JsonAuthProcDetails on (
| project HasLegacyTls=JsonAuthProcDetails.value
3. Select Run to execute the query. The log entries that match the query appear in the Results tab
below the query definition.
4. To learn more about the source of the legacy TLS request, look for the following fields:
UserDisplayName
AppDisplayName
ResourceDisplayName
UserAgent
1. In the Azure portal , search for and select Azure Active Directory.
4. Select the Additional details tab. (If you don't see this tab, first select the ellipsis (...) in the right
corner to view the full list of tabs.)
5. Check for a Legacy TLS (TLS 1.0, 1.1, or 3DES) value that's set to True. If you see that particular field
and value, the sign-in attempt was made using legacy TLS. If the sign-in attempt was made using TLS
1.2, that field doesn't appear.
This article discusses an issue in which federated users in Azure AD are forced to sign in
frequently.
Symptoms
After federated users sign in to Azure Active Directory (Azure AD), they are forced to
continually sign back in instead of being kept signed in.
Cause
Federated users who do not have the LastPasswordChangeTimestamp attribute synced
are issued session cookies and refresh tokens that have a Max Age value of 12 hours.
This means that the program can silently retrieve new tokens to keep the user's session
alive only up to 12 hours. After that time, the users are returned to the original IdP to re-
authenticate.
This occurs because Azure AD cannot determine when to revoke tokens that are
related to an old credential (such as a password that has been changed). Therefore,
Azure AD must check more frequently to make sure that the user and associated tokens
are still in good standing.
For more information about token lifetimes and how they are
managed, see the following Microsoft Azure article:
Resolution
To resolve this problem, tenant admins must make sure to sync the
LastPasswordChangeTimestamp attribute. Syncing this attribute improves the
user experience and security status.
This setting can be made on the user object by using PowerShell or through Azure AD
Connect.
PowerShell
You can use the Azure AD PowerShell V1 (MSOnline) module to set the
StsRefreshTokensValidFrom attribute for a user. This will inform the Azure Active
Directory authentication flow to give the user a longer lasting Refresh Token or one
based on your Azure Active Directory policies. To do this, follow these steps:
2. Run the Connect command to sign in to your Azure AD admin account every time
that you start a new session:
PowerShell
Connect-msolservice
PowerShell
$RefreshTokensValidFrom = Get-Date
For example:
PowerShell
$RefreshTokensValidFrom = Get-Date
7 Note
Azure AD Connect
Azure AD Connect syncs this attribute by default. However, Azure AD Connect can be
configured to sync or not sync this attribute either by using the attribute filtering feature
or by disabling the out-of-box synchronization rules.
1. Log in to the Azure AD Connect server, and then start the Azure AD Connect
wizard.
3. Navigate to the Optional Features screen, and verify that the Azure AD app and
attribute filtering feature is enabled. If it isn't, this means that the feature hasn't
been used to disable synchronization of the PwdLastSet attribute.
PowerShell
7 Note
If the Azure AD app and attribute filtering feature is disabled (see step 3) or
the PwdLastSet attribute is already enabled (see step 4), this means that the
feature hasn't been used to disable the PwdLastSet attribute. In this situation,
you can skip steps 5 and 6.
In the following screen shot, you can see how the attribute flow is implemented in both
synchronization rules by using the Azure AD Connect Synchronization Rules Editor.
For more information about how to implement and verify sync rule changes, see to
article Azure AD Connect sync: How to make a change to the default configuration.
Original product version: Azure Active Directory, Microsoft Intune, Azure Backup, Office
365 Identity Management
Symptoms
When a federated user signs in Office 365, Microsoft Azure, or Microsoft Intune, the user
is prompted unexpectedly to enter the work or school account credentials. After the
user enters the credentials, the user is granted access to the cloud service.
7 Note
Not all federated user authentication experiences are without a credential prompt.
In certain scenarios, it's by design and expected that federated users are prompted
to enter their credentials. Make sure that the credential prompt is unexpected
before you continue.
Cause
This issue may occur for internal domain clients if one or more of the following
conditions are true:
An internal client resolves the Active Directory Federation Services (AD FS)
endpoint to the IP address of the AD FS proxy service instead of to the IP address
of the AD FS federation service.
The security settings in Internet Explorer are not configured for single sign-on to
AD FS.
The proxy server settings in Internet Explorer are not configured for single sign-on
to AD FS.
The web browser does not support integrated Windows authentication.
The client computer cannot connect to the on-premises Active Directory domain.
1. Select Start, select Run, type cmd, and then press Enter.
2. At the command prompt, type the following command, where the placeholder
sts.contoso.com represents the AD FS endpoint name:
Console
nslookup sts.contoso.com
3. If the output of the command shows an incorrect IP address, update the A record
on the internal or external DNS server. For more information about how to do this,
see Internet browser can't display the AD FS sign-in webpage for federated users
Internet browser can't display the AD FS webpage when a federated user tries to
sign in to Office 365, Azure, or Intune
Procedure A
Check the local intranet zone and proxy server settings in Internet Explorer. To do this,
follow these steps:
4. In the Local intranet dialog box, select Advanced. In the Websites list, make sure
that an entry (such as sts.contoso.com ) exists for the fully qualified DNS name of
the AD FS service endpoint.
7 Note
8. Under Proxy server, select to select the Use a proxy server for your LAN check
box, type the proxy server address and the port that it uses, and then select
Advanced.
Procedure B
Manually configure the security settings for the security zone in Internet Explorer. The
default security setting that causes the local intranet zone not to prompt for Windows
authentication can be configured manually for any security zone in Internet Explorer. To
customize the security zone of which the AD FS service name is already a part, follow
these steps:
2 Warning
1. At a command prompt, type the following command, and then press Enter: Nltest
/dsgetdc:<FQDN Of Domain> . If the settings are correct, you receive output that
2. Check the computer's site membership. To do this, type the following command,
and then press Enter: nltest /dsgetsite . A successful result resembles the
following:
More information
Accessing Office 365 resources by using a non-federated account or a federated
account from a public Internet connection may not result in a single sign-on experience.
The experience for logging on to Microsoft Outlook connections is also not expected to
be a single sign-on experience.
This article discusses an issue in which federated users in Azure Active Directory must
sign in two times before they can run MFA.
Symptoms
Consider the following scenario:
You have an Azure Active Directory (Azure AD) tenant in which users are federated
through Active Directory Federated Services (AD FS).
In this tenant, Azure MFA Server or a third-party MFA provider is deployed in AD
FS.
In this scenario, users may be forced to sign in by providing their user name and
password two times before they are prompted for multi-factor authentication (MFA) and
can complete the logon.
Cause
If the MsolDomainFederationSettings -SupportsMFA value is set to $true and the -
PromptLoginBehavior value is set to TranslateToFreshPasswordAuth, Azure AD sends
the MFA request to the Identity Provider for step-up authentication. Azure AD also asks
for a fresh user login. This is accomplished by sending the following parameters to AD
FS:
wauth=http://schemas.microsoft.com/claims/multipleauthn
wfresh=0
When this occurs, user is prompted a second time for their user name and password
regardless of whether they just logged in. Users are prompted for MFA only after they
enter their credentials a second time.
Resolution
To resolve this issue, you must configure Azure AD to let AD FS natively handle this
request by changing the -PromptLoginBehavior setting to NativeSupport. To do this,
follow these steps:
) Important
PowerShell
Connect-Msolservice
7 Note
Run this command every time that you start a new session.
PowerShell
Set-MsolDomainFederationSettings -DomainNameyour_domain_name-
PreferredAuthenticationProtocol <current auth setting such as WsFed> -
SupportsMfa $True -PromptLoginBehavior NativeSupport
This article provides information about resolving an issue in which you receive an error
message when running the New-MSOLFederatedDomain command or the Convert-
MSOLDomainToFederated command using Azure Active Directory Module for Windows
PowerShell.
Original product version: Cloud Services (Web roles/Worker roles), Azure Active
Directory, Microsoft Intune, Azure Backup, Office 365 Identity Management
Symptoms
In a Microsoft cloud service such as Office 365, Microsoft Azure, or Microsoft Intune, you
can't set up a second federated domain on an Active Directory Federation Services (AD
FS) server. When you use the Azure Active Directory Module for Windows PowerShell to
run the New-MSOLFederatedDomain command or the Convert-MSOLDomainToFederated
command, you receive the following error message:
The federation service identifier specified in the Active Directory Federation Services
2.0 server is already in use. Please correct this value in the AD FS 2.0 Management
console and run the command again.
Cause
The Azure Active Directory (Azure AD) authentication system requires a unique
federation brand uniform resource identifier (URI) for each federated domain. By default,
AD FS uses a global value for all federated trusts. When you try to federate a second
domain in a scenario where a federated trust already exists, the request fails because the
URI is already being used.
Resolution
To resolve the issue, you must use the -supportmultipledomain switch to add or convert
every domain that's federated by the cloud service. This includes federated domains that
already exist.
7 Note
This update requires a restart of the computer. If you do not restart the computer,
you will experience the issue "Sorry, but we're having trouble signing you in" and
"8004789A" error when a federated user tries to sign in to Office 365, Azure, or
Intune .
2. At the command prompt, run the following commands in the order in which they
are presented. Press Enter after each command.
PowerShell
Connect-MSOLService
7 Note
When you are prompted, enter your cloud service global administrator
credentials.
PowerShell
7 Note
In this command, <AD FS 2.0 server name> is the computer name of a node
in the AD FS Federation Service farm.
PowerShell
7 Note
2 Warning
The following steps should be planned carefully. Users for which SSO functionality
is enabled in the federated domain will be unable to authenticate between the
completion of steps C and D. If the Update-MSOLFederatedDomain command test in
step 2 was not completed successfully, step D of this procedure will not finish
correctly. Federated users will be unable to authenticate until the Update-
MSOLFederatedDomain command can be run successfully.
1. Log on to the console of the AD FS server, select Start > All Programs >
Administrative Tools, and then select AD FS (2.0) Management.
2. In the left navigation pane, select AD FS (2.0), select Trust Relationships, and then
select Relying Party Trusts.
3. In the pane on the right side, delete the Microsoft Office 365 Identity Platform
entry.
PowerShell
7 Note
In this command, <Federated Domain Name> is the name of the domain that's
already federated with the cloud service for SSO.
PowerShell
PowerShell
7 Note
In this command, <domain name> represents the name of the domain that you are
trying to federate.
Workaround
Implement an AD FS Federation Service farm to federate every cloud service domain for
which SSO features will be used. AD FS implementation guidance for Office 365 can be
found at the following article:
Step-by-step implementation guidance: Plan for and deploy Active Directory Federation
Services 2.0 for use with single sign-on
This article describes a scenario in which users who are enabled for Azure Multi-Factor
Authentication aren't prompted for a second verification factor when they sign in.
Original product version: Azure Active Directory, Cloud Services (Web roles/Worker
roles), Microsoft Intune
Symptoms
When conditional access policies are set up so that Azure Multi-Factor Authentication is
expected to be enforced, some users aren't prompted to verify their identities through a
second verification method. This issue may occur in the following two scenarios.
In this scenario, an admin sets up trusted networks for multi-factor authentication and
enables the Allow users to suspend multi-factor authentication by causing a device to
be remembered option.
In this scenario, the user is a member of an exception group for the app. When an
admin sets up multi-factor authentication access policies for an app, an admin can select
the Except box to set up groups as exceptions. Even though the settings in these
scenarios are configured, you expect users to be prompted for the second verification
method because of the conditional access policies that you applied.
Resolution
For Scenario 1:
For Scenario 2:
More information
For Scenario 1:
This option lets users who have successfully authenticated through multi-factor
authentication avoid future multi-factor authentication prompts for the next 1-60 days,
depending on the value that's configured in the Days before a device must re-
authenticate setting.
This is true even if the app is set to Require multi-factor authentication, Require multi-
factor authentication when not at work, or Block access when not at work, and the
user's device isn't on a trusted network.
For Scenario 2:
For users who are members of the exception group, the requirement for multi-factor
authentication on the user account is overridden.
This article describes a problem in which you receive an error message when you try to
reset your password in Microsoft Azure, Office 365, or Microsoft Intune.
Original product version: Azure Active Directory, Microsoft Intune, Cloud Services (Web
roles/Worker roles)
Symptoms
When you try to reset your password in Microsoft Azure, Microsoft Office 365, or
Microsoft Intune, you receive the following error message:
We did not receive your response in time, or you hung up the call.
Cause
This problem occurs because of any of the following:
You pressed the wrong button instead of the pound (#) button.
You hung up before hitting the pound (#) button.
You did not answer.
The telephone number that we have on file may be incorrect, and we were unable
to reach you.
7 Note
If available, try to use another method such as using your mobile phone, office
telephone, or mobile app.
This article describes a problem in which you receive a "Your request could not be
processed" message when you reset your password in Microsoft Azure, Office 365, or
Microsoft Intune. To resolve this problem, work with your administrator to update your
telephone number(s).
Original product version: Azure Active Directory, Microsoft Intune, Cloud Services (Web
roles/Worker roles)
Symptoms
When you try to reset your password in Microsoft Azure, Microsoft Office 365, or
Microsoft Intune, you receive the following error message:
There was an error processing your request. Please try resetting your password
again by clicking here.
If you are unable to reset your password after retrying, please contact Support for
assistance.
Cause
This problem occurs because the telephone number that we have on file may be
incorrect, and we were unable to reach you.
Resolution
To resolve this problem, work with your administrator to update your telephone
number(s).
7 Note
If available, try to use another method such as using your mobile phone, office
telephone, or mobile app.
Contact us for help
If you have questions or need help, create a support request , or ask Azure community
support.
Can't use Azure Multi-Factor
Authentication to sign in to cloud
services after you lose your phone or
the phone number changes
Article • 04/20/2022 • 2 minutes to read
Original product version: Cloud Services (Web roles/Worker roles), Azure Active
Directory, Microsoft Intune, Azure Backup, Office 365 Identity Management
Symptoms
Assume that you're a Microsoft cloud services admin who has Microsoft Azure Multi-
Factor Authentication enabled. If you lose your phone or your phone number has
changed, you can't sign in to your cloud services account (such as Office 365, Azure, or
Microsoft Intune) because you didn't receive the text message or voice call from the
Multi-Factor Authentication service.
Resolution
Ask another cloud services admin to reset your Multi-Factor Authentication settings. To
do this, the admin should follow these steps:
This article describes an issue in which error "Event ID 6065:80070533 This user can't
sign in because this account is currently disabled" is logged when Windows 10 settings
fail to sync.
Original product version: Windows 10, version 1803, version 1709, version 1703, version
1511, version 1607, all editions
Symptoms
You have enabled Enterprise State Roaming in the Azure Active Directory portal and on
some Windows 10 clients. Any supported settings for sync, such as the desktop
background or the task bar position, do not sync between devices for the same user.
Source: Microsoft-Windows-SettingSync
Level: Error
Computer: WIN10DESKTOP
Description:
shell\roaming\cloudsync\cloudsyncengine\cloudsyncengine.cpp(990)\SettingSyncH
ost.exe!00007FF701A2A8C2: (caller: 00007FF701A2A3D9) ReturnHr[PreRelease](17)
tid(1060) 80070533 This user can't sign in because this account is currently disabled.
CallContext:[\AttemptSyncActivity]
Cause
The tenant has not been provisioned with the RMSBASIC subscription. This happens
automatically when Enterprise State Roaming is enabled in the Azure Active Directory
portal and is used to encrypt the synchronized data. If AllowAdHocSubscriptions is set to
False on the tenant, this configuration can prevent the tenant from being provisioned
with the RMSBASIC subscription.
Resolution
PowerShell
2. Run the following cmdlet to see all the SKUs that the company owns.
PowerShell
Get-MsolAccountSku
3. If RMSBASIC is listed, as in the example output below, you do not need to proceed
with the rest of the steps in this article.
tenantname:ENTERPRISEPACK 25 0 14
tenantname:INTUNE_A 25 0 23
tenantname:AAD_PREMIUM 100 0 21
tenantname:RIGHTSMANAGEMENT_ADHOC 1000 0 18
tenantname:ENTERPRISEPACK 25 0 14
tenantname:INTUNE_A 25 0 23
tenantname:AAD_PREMIUM 100 0 21
tenantname:RIGHTSMANAGEMENT_ADHOC 1000 0 18
1. Open PowerShell and sign in to Azure Active Directory using your Azure Active
Directory credentials. The first line will prompt you for your credentials. The second
line connects to Azure Active Directory.
PowerShell
PowerShell
Get-MsolCompanyInformation | fl AllowAdHocSubscriptions
PowerShell
Set-MsolCompanySettings -AllowAdHocSubscriptions $true
4. In the Azure AD portal, disable and re-enable Enterprise State Roaming. See the
Verify USERS MAY SYNC SETTINGS AND ENTERPRISE APP DATA is enabled on
the tenant section.
5. Run the Get-MsolAccountSku cmdlet to see if the RMSBASIC subscription has been
added:
PowerShell
Get-MsolAccountSku
PowerShell
More information
Azure Active Directory PowerShell Module
Get-MsolAccountsku
Set-MsolCompanySettings
How administrators can control the accounts created for RMS for individuals
50,000 seats are assigned to the RIGHTSMANAGEMENT_ADHOC SKU in your Office
365 organization
This article describes the conditions in which Active Directory Federation Services (AD
FS) doesn't behave as expected when you sign in to Office 365 services by using a single
sign-on (SSO)-enabled user ID.
Original product version: Cloud Services (Web roles/Worker roles), Azure Active
Directory, Microsoft Intune, Azure Backup, Office 365 Identity Management
Symptoms
When you sign in to a Microsoft cloud service such as Office 365, Microsoft Azure, or
Microsoft Intune by using a single sign-on (SSO) enabled user ID, the connection to
Active Directory Federation Services (AD FS) does not behave as expected. The
connection fails together with one of the following results:
Computers that sign in from inside the on-premises network connect to the AD FS
proxy IP address, and a forms-based authentication prompt appears. However, an
Integrated Windows Authentication experience is expected.
Computers that sign in from inside the on-premises network and then try to
connect to the AD FS proxy service are denied because of firewall settings.
Cause
These symptoms can be caused by a faulty split-brain DNS configuration that is required
for correct internal and external name resolution of DNS services. One of the following
causes is most likely:
The split-brain internal DNS resolution isn't set up for the domain in which the AD
FS service resides.
AD FS service name resolution isn't set in the split-brain internal DNS resolution of
the on-premises environment.
Resolution
To resolve this issue, follow these steps:
1. Open the DNS Management Console. To do this, open Administrative Tools, and
then double-click DNS.
2. In the left navigation pane, expand DNS, expand the server name, and then select
Forward Lookup Zones.
3. If there's no entry that's displayed for the DNS zone within which the AD FS service
endpoint is hosted, create the zone. To do this, right-click Forward Lookup Zones,
and then select New Zone.
4. Complete the wizard. When you do this, select Primary Zone, and then name the
zone for the DNS domain of the AD FS server.
2 Warning
1. Browse to and then select the DNS zone for the domain of the AD FS server.
2. Right-click the domain name, and then select New Host (A or AAAA).
3. Enter the following values:
2. On the client computer, select Start, select All Programs, select Accessories, right-
click Command Prompt, and then select Run As Administrator.
Console
Ipconfig /flushdns
More information
Split-brain DNS is a common configuration that's used to make sure that on-premises
client computers resolve a server name to internal IP addresses, even though public DNS
resolution resolves the same service name to a different public IP address. When you set
up AD FS for on-premises service, this configuration is needed to make sure that on-
premises client computers' authentication experience to the AD FS service is handled
differently (by the AD FS Federation Service farm) than external client computers that
are being serviced by the AD FS Proxy Service.
Without this configuration, all AD FS clients will be serviced by the same IP address
when they connect to the AD FS service, whether they are connected from the on-
premises network or are accessing remotely from an Internet location. This limits the
seamless authentication experience possible for on-premises, Active Directory-
authenticated clients, because the AD FS Proxy Service that is exposing the AD FS
service to the Internet does not expect the accessing client to be able to provide an
Integrated Windows Authentication response without a prompt (because remote
computers are not authentication to Active Directory).
To overcome this limitation, it's desirable to override the default name resolution that is
given to on-premises clients by creating an identically named domain in on-premises
DNS. Because the DNS distributed architecture returns the first response that is found to
a forward lookup query, this effectively masks the public DNS domain advertisements
for that domain for all on-premises client computer requests because their requests are
handled by on-premises DNS servers first.
Contact us for help
If you have questions or need help, create a support request , or ask Azure community
support.
A user is displayed as disabled or
enabled for Microsoft Azure Multi-
Factor Authentication but behaves as
the opposite
Article • 04/20/2022 • 2 minutes to read
Symptoms
Issue 1
When Microsoft Azure Multi-Factor Authentication is enabled, a user may be displayed
as disabled even though the user behaves as enabled.
Issue 2
When Microsoft Azure Multi-Factor Authentication is disabled, a user may be displayed
as enabled even though the user behaves as disabled
Cause
This problem occurs if the user is added in another directory as a guest user. Consider
the following example:
Resolution
This behavior is by design. Multi-Factor Authentication behavior is always based on the
user's home directory status. If you want to change the desired Multi-Factor
Authentication behavior, you or an administrator should make this change from the
user's home directory.
More information
Guest users are users from one directory who are added to another directory. For
example, a user from contoso.onmicrosoft.com may be added to
fabrikam.onmicrosoft.com . In this case, the user is still authenticated by using the
7 Note
To quickly check whether a user is a guest user, notice whether the check box next
to the user on the Manage Multi-Factor Auth screen is dimmed. A dimmed check
box indicates that the user is a guest user.
This article provides steps to troubleshoot an account lockout issue in Microsoft Active
Directory Federation Services (AD FS) on Windows Server.
Original product version: Windows Server 2019, Windows Server 2016, Windows Server
2012 R2, Windows Server 2012
If you have Azure Active Directory (Azure AD) Connect Health configured for AD FS
servers, go to the Use Connect Health to generate data for user login activities
section.
If you don't have Azure Active Directory (Azure AD) Connect Health configured for
AD FS servers, go to the Collect AD FS event logs from AD FS and Web Application
Proxy servers section.
Refer to the information in this article to analyze the list of user accounts and IPs of the
bad password attempt. Then, go to Analyze the IP and username of the accounts that
are affected by bad password attempts.
To configure AD FS servers for auditing, you can use the following method:
You can download the ADFS Account Lockout and Bad Cred Search (AD
FSBadCredsSearch.ps1)PowerShell script to search your AD FS servers for "411"
events. The script provides a CSV file that contains the UserPrincipalName, IP
address of the submitter, and time of all bad credential submissions to your AD FS
farm. Open the CSV file in Excel, and quickly filter by user name, IP address, or
time.
These events contain the user principal name (UPN) of the targeted user.
These events contain a message "token validation failed" message that states
whether the event indicates a bad password attempt or an account lockout.
If the server has "411" events displayed but the IP address field isn't in the event,
make sure that you have the latest AD FS hotfix applied to your servers. For more
information, see MS16-020: Security update for Active Directory Federation
Services to address denial of service: February 9, 2016 .
For Windows Server 2008 R2 or Windows Server 2012 AD FS, you won't have the
necessary Event 411 details. Instead, download and run the following PowerShell script
to correlate security events 4625 (bad password attempts) and 501 (AD FS audit details)
to find the details about the affected users.
You can download the ADFS Security Audit Events Parser (ADFSSecAuditParse.ps1)
PowerShell script to search your AD FS servers for events. The script provides a CSV
file that contains the UserPrincipalName, IP address of the submitter, and time of
all bad credential submissions to your AD FS farm.
You can also use this method to investigate which connections are successful for
the users in the "411" events. You can search the AD FS "501" events for more
details.
When you run the PowerShell script to search the events, pass the UPN of the user
who is identified in the "411" events, or search by account lockout reports.
The IP address of the malicious submitters is displayed in one of two fields in the
"501" events.
For web-based scenarios and most application authentication scenarios, the
malicious IP will be in the x-ms-client-ip field.
If the attempts are made from external unknown IPs, go to Update AD FS servers
with latest hotfixes.
If the attempts are not made from external unknown IPs, go to Make sure that
credentials are updated in the service or application.
Make sure that extranet lockout and internal lockout thresholds are configured correctly.
For more information, see Recommended security configurations. Generally, the
ExtranetLockoutThreshold should be less than the lockout threshold for AD so that user
gets locked out for extranet access only without also getting locked out in Active
Directory for internal access.
In addition to removing one of the attack vectors that are currently being used through
Exchange Online, deploying modern authentication for your Office client applications
enables your organization to benefit from multifactor authentication. Modern
authentication is supported by all the latest Office applications across the Windows, iOS,
and Android platforms.
For more information, see How to deploy modern authentication for Office 365 .
Because user name and password-based access requests will continue to be vulnerable
despite our proactive and reactive defenses, organizations should plan to adopt non-
password-based access methods as soon as possible.
The following non-password-based authentication types are available for AD FS and the
Web Application Proxy.
Certificate-based authentication
Because users do not use their passwords over the Internet, those passwords
are less susceptible to disclosure. User name and password endpoints can be
blocked completely at the firewall. This removes the attack vector for lockout or
brute force attacks.
Even if user name and password endpoints are kept available at the firewall,
malicious user name and password-based requests that cause a lockout do not
affect access requests that use certificates. Therefore, the legitimate user's
access is preserved.
Azure MFA is another non-password-based access method that you can use in the
same manner as certificate-based authentication to avoid using password and
user-name endpoints completely.
Azure MFA can be used to protect your accounts in the following scenarios.
Scenarios Advantage
For more information about how to configure Azure MFA by using AD FS, see
Configure AD FS 2016 and Azure MFA
Disable the legacy endpoints that are used by EAS clients through Exchange Online,
such as the following:
/adfs/services/trust/13/usernamemixed endpoint
7 Note
Doing this might disrupt some functionality. However, it can help reduce the
surface vectors that are available for attackers to exploit. Also, we recommend that
you disable unused endpoints.
To resolve this issue, check the service account configuration in the service or
application to make sure that the credentials are correct. If not, follow the next step.
# ADFSBadCredsSearch.ps1
# Version 1.0
# Date: 6-20-2016
# Description: This script will parse the ADFS server's (not proxy) security
ADFS
# past period to search the log for and it defaults to the past 24 hours.
Results will be placed into a CSV for
#************************************************
cls
if ($PastHours -gt 0)
{$PastPeriod = (Get-Date).AddHours(-($PastHours))}
else
{$PastPeriod = (Get-Date).AddDays(-($PastDays)) }
$Instances = @{}
[int]$BN = $OSVersion.Buildnumber
$Users = @()
$IPAddresses = @()
$Times = @()
$AllInstances = @()
$UPN = $_.Properties[2].Value
$UPN = $UPN.Split("-")[0]
$IPAddress = $_.Properties[4].Value
$Users += $UPN
$IPAddresses += $IPAddress
$Times += $_.TimeCreated
$Instance = $null
$AllInstances = $null
#************************************************
# ADFSSecAuditParse.ps1
# Version 1.0
# Date: 2-2-2016
# Description: This script will parse an ADFS Security event log file (EVTX)
# and search for audit events related to a specific user or other criteria.
# The script will work for the each ADFS login instance for a given
criteria during a stated time frame.
# If you need to locate a second then filter and save the event log to
focus in.
# Return an array of initial instance IDs with the criteria, run the search
function against each and output
#************************************************
cls
if ($PastHours -gt 0)
$PastPeriod = (Get-Date).AddHours(-($PastHours))
else
{$PastPeriod = $PastDays}
$Instances = @()
function FindADFSAuditEvents {
$_.Properties | FL *
$DateTimeExport = $_.TimeCreated
$DateTime = $DateTime.Replace(':','')
$Counter = 1
$Counter++
This article contains information to help you troubleshoot common issues that you may
encounter when you use Windows Multi-Factor Authentication for Microsoft Office 365
or Microsoft Azure.
Original product version: Cloud Services (Web roles/Worker roles), Azure Active
Directory, Microsoft Intune, Azure Backup, Office 365 Identity Management
Summary
Scenario Content
You don't receive a text or voice call that contains the verification code for Azure 2834956
Multi-Factor Authentication
"Sorry! We can't process your request" error when you try to set up security 2909939
verification settings for Azure Multi-Factor Authentication
Can't use Azure Multi-Factor Authentication to sign in to cloud services after you 2834954
lose your phone or the phone number changes
"We did not receive the expected response" error message when you try to sign in 2834968
by using Azure Multi-Factor Authentication
"Account verification system is having trouble" error message when you try to sign 2834966
in by using a work or school account
2412085
You can't sign in to Office 365, Azure, or Intune
Original product version: Cloud Services (Web roles/Worker roles), Azure Active
Directory, Microsoft Intune, Office 365 Identity Management
Symptoms
When you run the Azure Active Directory Sync tool Configuration Wizard, you receive
the following error message:
Level: Information
Description:
Cause
This problem occurs if the enterprise admin account credentials that are specified in the
wizard are not unique in the Active Directory forest. Password mismatches between two
or more identically named accounts in multi-domain forests can cause the wizard to fail.
Contoso\admin is the enterprise admin account that's specified in the Azure Active
Directory Sync tool Configuration Wizard.
Contoso\admin and Fabrikam\admin are two accounts that have the same name
but that exist in different domains.
Each account has a different password.
In this scenario, the password of Contoso\admin is used for all domains in the Active
Directory forest during the configuration process. For example, if the password is
"Password1," "Password1" is used for Fabrikam\admin. This causes the wizard to fail.
Resolution
To resolve this problem, do one of the following:
This article describes an issue in which you receive an error message when you try to
reset your password in Microsoft Azure, Office 365, or Microsoft Intune. To resolve this
problem, work with your administrator to update your telephone number(s).
Original product version: Azure Active Directory, Microsoft Intune, Cloud Services (Web
roles/Worker roles)
Symptoms
When you try to reset your password in Microsoft Azure, Microsoft Office 365, or
Microsoft Intune, you receive the following error message:
Cause
This issue occurs because the telephone number that we have on file may be incorrect,
and we were unable to reach you.
Resolution
To resolve this problem, work with your administrator to update your telephone
number(s).
7 Note
If available, try to use another method such as using your mobile phone, office
telephone, or mobile app.
Contact us for help
If you have questions or need help, create a support request , or ask Azure community
support.
Error when trying to reset password in
Azure, Office 365, or Intune: We could
not verify your account
Article • 04/20/2022 • 2 minutes to read
Original product version: Cloud Services (Web roles/Worker roles), Azure Active
Directory, Microsoft Intune, Azure Backup, Office 365 Identity Management
Symptoms
When a new user tries to reset password in Microsoft Azure, Microsoft Office 365, or
Microsoft Intune, the user receives the following error message:
Resolution
Assign a Microsoft Azure Active Directory Premium license to the user. Users must have
an Azure Active Directory Premium license to be able to reset their own password.
Original product version: Cloud Services (Web roles/Worker roles), Azure Active
Directory, Microsoft Intune, Azure Backup, Office 365 Identity Management
Symptoms
Consider the following scenario:
In this scenario, you can't sign in to your work or school account, such as Office 365,
Azure, or Microsoft Intune.
Resolution
To fix this problem, follow these steps:
1. If you have set up other options for security verification, select Other verification
options, and then try again by selecting a different option. Also, make sure that
your phone numbers are correct in your user account settings.
2. Ask another global admin to confirm whether your phone numbers are set
correctly in your user settings.
If steps 1 and 2 don't resolve the problem, your user account may be blocked from
using Azure AD MFA. To check whether your user account is blocked, ask a global admin
for your Microsoft cloud service to perform the following steps:
If you have Office 365 and don't have an Azure AD MFA or Azure Active Directory
Premium subscription, contact Office 365 Support.
Operation Characteristics
Password The user or administrator doesn't know or doesn't provide the current password.
reset
Password Only a user can initiate a password change. Users have to enter their current
change password before they can specify a new password.
1. Get information about certain Active Directory users by running the Ldifde
command or the Get-ADUser PowerShell cmdlet.
2. Run user commands in Azure Active Directory (Azure AD) PowerShell to get
information about those users in Azure AD.
3. Compare the Active Directory and Azure AD information about those two users
offline, especially in terms of:
1. Open the Synchronization Service Manager. To do this, select Start, enter azure ad,
select the Azure AD Connect group, and then select Synchronization Service.
2. Select the Connectors tab, and then select the applicable Active Directory
connector. In the Actions pane, select Properties to open the Properties dialog
box.
4. In the Domain controller connection settings group, select the Only use preferred
domain controllers checkbox. Then, select Configure.
5. Make the appropriate changes in the Configure Preferred DCs dialog box.
Depending on the issue, it might actually help to try different domain controllers,
instead. Then, you can determine whether the issue can be isolated to a specific domain
controller or occurs on any domain controller.
In addition, when you use the Active Directory Users and Computers snap-in, change
the connected domain controller to the same one that you used for Azure AD Connect.
Follow these steps:
1. Open the Active Directory Users and Computers snap-in. To do this, select Start,
search on dsa.msc, and then press Enter.
2. In the navigation pane, right-click the domain name, and then select the Change
Domain Controller menu item.
3. In the Change Directory Server dialog box, select the This Domain Controller or
AD LDS instance option.
4. In the list of domain controllers, select the domain controller that matches the one
that you selected for Azure AD Connect, and then select OK.
This article describes the access rights and permissions that are required in the domain
root, the user object, and the Builtin container in Active Directory. It also discusses the
following items:
This information can help you troubleshoot specific problems that involve password
writeback.
1. Open the Synchronization Service Manager. To do this, select Start, enter azure ad
connect, select Azure AD Connect in the search results, and then select
Synchronization Service.
2. Select the Connectors tab, and then select the applicable Active Directory
connector. In the Actions pane, select Properties to open the Properties dialog
box.
3. In the left pane of the Properties window, select Connect to Active Directory
Forest, and then copy the account name that appears as User name.
To check whether the AD DS Connector account (that is, the MSOL_ account) has the
correct permissions for a specific user, use one of the following tools:
1. Select Start, enter dsa.msc, and then select the Active Directory Users and
Computers snap-in in the search results.
3. In the console tree, find and select the user account that you want to check the
permissions for. Then, select the Properties icon.
4. In the Properties dialog box for the account, select the Security tab, and then
select the Advanced button.
5. In the Advanced Security Settings dialog box for the account, select the Effective
Permissions tab. Then, in the Group or user name section, select the Select
button.
6. In the Select User, Computer, or Group dialog box, select Advanced > Find Now
to show the selection list. In the Search results box, select the MSOL_ account
name.
7. Select OK two times to return to the Effective Permissions tab in the Advanced
Security Settings dialog box. Now, you can view the list of effective permissions
for the MSOL_ account that are assigned to the user account. The list of the default
permissions that are required for password writeback is shown in the Required
permissions on the user object section in this article.
Command prompt
Use the dsacls command to display the access control lists (ACLs, or permissions) of the
AD DS Connector account. The following command stores the command output in a
text file, although you can modify it to display the output on the console:
cmd
You can use this method to analyze the permissions for any Active Directory object.
However, it isn't useful to compare permissions between objects because the text
output isn't sorted.
PowerShell
Use the Get-Acl cmdlet to get the AD DS Connector account permissions, and then store
the output as an XML file by using the Export-Clixml cmdlet, as follows:
PowerShell
Set-Location AD:
The PowerShell method is useful for offline analysis. It lets you import the file by using
the Import-Clixml cmdlet. It also keeps the original structure of the ACL and its
properties. You can use this method to analyze the permissions for any Active Directory
object.
For a quick sanity check within Active Directory, run domain controller diagnostics by
using the dcdiag command. Then, run the repadmin /replsummary command to view a
summary of replication problems. The following commands store the command output
to text files, although you can modify them to display the output on the console:
cmd
You can view the existing Active Directory permissions in the security properties of the
domain root. Follow these steps:
2. In the console tree, locate and select the Active Directory domain root, and then
select the Properties icon.
3. In the Properties dialog box for the account, select the Security tab.
Each of the following subsections contains a table of domain root default permissions.
This table shows the required permission entries for the group or user name that's in the
subsection title. To view and modify the current permission entries to match the
requirements for each group or user name, follow these steps for each subsection:
1. On the Security tab, select the Advanced button to view the Advanced Security
Settings dialog box. The Permissions tab shows the current list of domain root
permissions for each Active Directory identity (Principal).
2. Compare the current permissions list against the list of default permissions for
each Active Directory identity (Principal).
3. If necessary, select Add to add required permission entries that are missing from
the current list. Or, select a permission entry, and then select Edit to modify that
entry to meet the requirement. Repeat this step until the current permission entries
match the subsection table.
4. Select OK to accept the changes in the Advanced Security Settings dialog box and
return to the Properties dialog box.
7 Note
The permissions on the Active Directory domain root aren't inherited from any
parent container.
Permission Apply to
Permission Apply to
Permission Apply to
Permission Apply to
2. Use the console tree or the Action > Find menu item to select the target user
object, and then select the Properties icon.
3. In the Properties dialog box for the account, select the Security tab.
Each of the following subsections contains a table of user default permissions. This table
shows the required permission entries for the group or user name that's in the
subsection title. To view and modify the current permission entries to match the
requirements for each group or user name, follow these steps for each subsection:
1. On the Security tab, select the Advanced button to view the Advanced Security
Settings dialog box.
2. Make sure that the Disable Inheritance button is displayed near the bottom of the
dialog box. If the Enable Inheritance button is displayed instead, select that
button. The enable inheritance feature allows all the permissions from parent
containers and organizational units to be inherited by this object. This change
resolves the issue.
3. On the Permissions tab, compare the current permissions list against the list of
default permissions for each Active Directory identity (Principal). The Permissions
tab displays the current list of user permissions for each Active Directory identity
(Principal).
4. If necessary, select Add to add required permission entries that are missing from
the current list. Or, select a permission entry, and then select Edit to modify that
entry to meet the requirement. Repeat this step until the current permission entries
match the subsection table.
5. Select OK to accept the changes in Advanced Security Settings dialog box and
return to the Properties dialog box.
7 Note
Unlike for the Active Directory domain root, the required permissions for the user
object are usually inherited from the domain root, or from a parent container or
organizational unit. Permissions that were set directly on the object will indicate an
inheritance from None. The inheritance of the access control entry (ACE) isn't
important as long as the values in the Type, Principal, Access, and Applies to
columns for the permission are the same. However, certain permissions can be set
only in the domain root. These entities are listed in the subsection tables.
Read Exchange information <domain root> This object and all descendant objects
List contents <domain root> This object and all descendant objects
3. Locate and select Server (the samServer object), and then select the Properties
icon.
4. In the Properties dialog box for the object, select the Security tab.
5. Select the Advanced Security Settings dialog box. The Permissions tab displays
the current list of samServer object permissions for each Active Directory identity
(Principal).
6. Verify that at least one of the following principals is listed in the access control
entry for the samServer object. If only Pre-Windows 2000 Compatible Access is
listed, make sure that Authenticated Users is a member of this built-in group.
2. In the console tree, locate and select the Builtin container, and then select the
Properties icon.
3. In the Properties dialog box for the account, select the Security tab.
4. Select the Advanced button to view the Advanced Security Settings dialog box.
The Permissions tab displays the current list of Builtin container permissions for
each Active Directory identity (Principal).
5. Compare this current permissions list against the list of required allow permissions
for the MSOL_ account, as follows.
6. If necessary, select Add to add required permission entries that are missing from
the current list. Or, select a permission entry, and then select Edit to modify that
entry to meet the requirement. Repeat this step until the current permission entries
match the subsection table.
7. Select OK to exit the Advanced Security Settings dialog box and return to the
Properties dialog box.
1. Select Start, enter secpol.msc, and then select Local Security Policy in the search
results.
2. In the console tree, under Security Settings, expand Local Policies, and then select
User Rights Assignment.
3. In the list of policies, select Impersonate a client after authentication, and then
select the Properties icon.
4. In the Properties dialog box, make sure that the following groups are listed on the
Local Security Setting tab:
Administrators
LOCAL SERVICE
NETWORK SERVICE
SERVICE
For more information, see the default values for the Impersonate a client after
authentication policy.
This article describes how to troubleshoot a password writeback error that occurs when
Azure AD Connect tries to make a password change or reset in an insecure
configuration. This situation occurs specifically when Azure AD Connect tries to do a
password change or reset without having a 128-bit Transport Layer Security (TLS) or
Secure Sockets Layer (SSL) connection.
Symptoms
When a user or administrator tries to change or reset a password in Azure AD, password
writeback to the on-premises directory fails and returns an "8023062C (0x8023062c)"
error code and the following error message:
The password could not be set because the server is not configured for insecure
setting of passwords, or a 128 bit TLS or SSL connection is required.
Cause
Microsoft Azure AD Connect has been configured not to require that Lightweight
Directory Access Protocol (LDAP) traffic be signed and encrypted.
Solution
Make sure that the Sign and Encrypt LDAP Traffic setting is enabled in three places
within Synchronization Service Manager by following these steps:
1. Open the Synchronization Service Manager. To do this, open the Start menu, go to
the Azure AD Connect group, and then select Synchronization Service.
2. Select the Connectors tab, and then select the applicable Active Directory
connector. In the Actions pane, select Properties.
3. On the left side of the Properties dialog box, select Connect to Active Directory
Forest, and then select the Options button. In the Connection Options dialog box,
turn on Sign and Encrypt LDAP Traffic, and then select OK.
4. On the left side of the Properties dialog box, select Configure Directory Partitions.
Then, in the Configure Directory Partitions pane, select a directory partition from
the list.
5. In the Domain controller connection settings group, select the Options button. In
the Connection Options dialog box, turn on Sign and Encrypt LDAP Traffic, and
then select OK.
6. In the Credentials group, check whether the Alternate credentials for this
directory partition option is selected. If that option isn't selected, go to step 8.
Otherwise, select the Set Credentials button, and then select Options in the
Credentials dialog box.
7. In the Connection Options dialog box, turn on Sign and Encrypt LDAP Traffic, and
then select OK two times to return to the Properties dialog box.
9. Select Start, enter services.msc, and then select the Services snap-in. Select
Microsoft Azure AD Sync from the list of services, and then select the Restart
Service icon.
This article explains how to troubleshoot a password reset error that occurs when a
synchronized user who has an Azure Active Directory (Azure AD) Administrator role tries
unsuccessfully to reset their password.
This scenario occurs after the user visits the sign-in page at
https://login.microsoftonline.com and selects Can't access your account?, Forgot my
password, or reset it now. Then, the browser redirects the user to the self-service
password reset (SSPR) page at https://passwordreset.microsoftonline.com to start the
SSPR process. This process requires that the user enter a "captcha" code. If the
operation is successful, password writeback sends a password reset request for the user
to an on-premises Active Directory domain. Simultaneously, SSPR sets the new
password in Azure AD. If the operation is unsuccessful, an "SSPR_009" error is returned
instead. If the error occurs, use this article to fix the problem.
Symptoms
After a synchronized user tries unsuccessfully to reset a password by entering a captcha
code, the browser displays the following error message:
You can't reset your own password because password reset isn't turned on for your
organization.
7 Note
This scenario occurs only for Azure AD users who have an Azure AD Administrator
role assigned to them. The password change or reset flow works as expected for
standard accounts.
Cause
SSPR for Administrators isn't enabled on the tenant. SSPR for Administrators (SSPR-A)
was the first implementation of SSPR. After SSPR for Users (SSPR-U) was introduced,
users could have two separate configurations.
The old SSPR-A implementation is used when an Azure AD account has an admin role,
such as Global Administrator or Billing Administrator. However, the SSPR management
on the Azure portal is for SSPR-U only. Therefore, SSPR-A might not be enabled on the
tenant.
Solution
Enable SSPR-A on the tenant by running the Set-MsolCompanySettings PowerShell
cmdlet, as follows:
PowerShell
This article helps you troubleshoot the self-service password reset (SSPR) error
"SSPR_0029: Your organization hasn't properly set up the on-premises configuration for
password reset" that occurs after the user or admin enters and confirms a new password
on the SSPR page.
Symptoms
A user or administrator takes the following steps, and then receives an SSPR_0029 error:
2. The user or admin selects the Work or school account account type. Then, they're
redirected to the SSPR page at https://passwordreset.microsoftonline.com to
start the Get back into your account flow.
3. On the Who are you? screen, the user or admin enters their user ID, completes a
case-insensitive captcha security challenge, and then selects Next.
4. On the Why are you having trouble signing in? screen, the user or admin selects I
forgot my password > Next.
5. On the choose a new password screen, the user or admin enters and confirms a
new password string, and then selects Finish. Then, a We're sorry screen appears
and presents the following message:
7 Note
1. On the Start menu, search for and select Synchronization Service Manager.
3. Right-click the Active Directory connector from the list of connectors, and then
select Properties.
4. In the Connector Designer pane of the Properties dialog box, select Configure
Directory Partitions.
5. In the Configure Directory Partitions pane, select the Only use preferred domain
controllers option, and then select Configure.
6. In the Configure Preferred DCs dialog box, add one or more server names that
point to a different domain controller (or domain controllers) than the local host.
7. To save your changes and return to the main window, select OK three times,
including in the Warning dialog box that shows an advanced configuration
disclaimer.
This situation can occur if the Azure AD Connect server or the domain controller has or
had a hardening security setting applied with a Domain Group Policy Object (GPO) or in
the Local Security Policy of the server. To check whether this is the case, follow these
steps:
md C:\Temp
gpresult /h C:\Temp\GPreport.htm
start C:\Temp\GPreport.htm
2. Open the C:\Temp\gpresult.htm file in your web browser, and expand Computer
Details > Settings > Policies > Windows Settings > Security Settings > Local
Policies/Security Options > Network Access. Then, check whether you have a
setting that's named Network access: Restrict clients allowed to make remote calls
to SAM.
3. To open the Local Security Policy snap-in, select Start, enter secpol.msc, press Enter,
and then expand Local Policies > Expand Security Options.
4. In the list of policies, select Network access: Restrict clients allowed to make
remote calls to SAM. The Security Setting column will show Not Defined if the
setting isn't enabled, or it displays an O:BAG:... security descriptor value if the
setting is enabled. If the setting is enabled, you can also select the Properties icon
to see the Access Control List (ACL) that's currently applied.
7 Note
By default, this policy setting is turned off. When this setting is applied on a
device through a GPO or a Local Policy setting, a registry value that's named
RestrictRemoteSam is created in the
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa\ registry
path. However, this registry setting can be difficult to clear after it's defined
and applied to the server. Disabling the Group Policy setting or clearing the
Define this policy setting option in Group Policy Management Console
(GPMC) doesn't remove the registry entry. Therefore, the server still restricts
which clients are allowed to make remote calls to SAM.
How do you accurately verify that the Azure AD Connect server or the domain
controller is still restricting remote calls to SAM? You check whether the
registry entry remains present by running the Get-ItemProperty cmdlet in
PowerShell:
PowerShell
Does the PowerShell output show that a RestrictRemoteSam registry entry is still
present? If so, you have two possible solutions.
1. If you don't know the name of your AD DS Connector account, see Identify the AD
DS Connector account.
2. In the GPMC or Local Security Policy snap-in, go back to the property dialog box
for that policy setting.
3. Select Edit Security to display the Security Settings for Remote Access to SAM
dialog box.
4. In the Group or user names list, select Add to display the Select Users or Groups
dialog box. In the Enter the object names to select box, enter the name of the AD
DS Connector account (MSOL_ account), and then select OK to exit that dialog box.
5. Select the AD DS Connector account in the list. Under Permissions for <account
name>, in the Remote Access row, select Allow.
6. Select OK two times to accept the policy setting changes and return to the list of
policy settings.
Console
gpupdate /force
3. Expand Computer Configuration > Policies > Windows Settings > Security
Settings > Computer Configuration > Local Policies > Security Options.
4. In the list of security options, select Network access: Restrict clients allowed to
make remote calls to SAM, open Properties, and then disable Define this policy
setting.
Console
gpupdate /force
6. To generate a new Group Policy result report (GPreport.htm), run the gpresult
command, and then open the new report in a web browser:
Console
md C:\Temp
gpresult /h C:\Temp\GPreport.htm
start C:\Temp\GPreport.htm
7. Check the report to make sure that the policy setting for Network access: Restrict
clients allowed to make remote calls to SAM isn't defined.
PowerShell
7 Note
This article describes a password writeback issue that occurs after an administrator
resets a user password in the Microsoft 365 admin center.
Symptoms
A user who recently had an administrator reset their password can't sign in to on-
premises Active Directory by using the new password. Additionally, the previous
password might still work.
Cause
An administrator has reset the password of a user in the Microsoft 365 admin center .
Although the user can sign in online by using the new password, the new password isn't
synchronized back to on-premises Active Directory.
Currently, the Microsoft 365 admin center doesn't use the self-service password reset
(SSPR) and password writeback libraries. When an administrator resets a user password
in the Microsoft 365 admin center, the password is reset in Azure AD, but the new
password isn't updated in on-premises Active Directory. Therefore, the user password is
now out-of-sync between on-premises Active Directory and Azure AD.
Solution
To make sure that password writeback updates the new password in on-premises Active
Directory, the administrator who changes or resets the password must use the Azure
portal instead of the Microsoft 365 admin center .
For more information, see How does self-service password reset writeback work in Azure
Active Directory?.
This article describes how to troubleshoot a password writeback issue when a user is
forced to change their password on first sign-in.
Symptoms
After a user makes a required password change on first sign-in, they receive this
warning message:
Your password was successfully updated, but our servers take a little time to catch
up. Please try signing in again in a few minutes.
Cause
When a user is forced to change their password on first sign-in in Azure Active Directory
(Azure AD), the password writeback process accepts the temporary password for sign-in,
and the user is prompted to provide a new password. Password writeback tries to
change the password on-premises, and then waits. If the on-premises update succeeds,
password writeback tries to change the password in Azure AD. During a password
change operation, password writeback verifies the current password, and then provides
the new password to be updated in the respective directory.
However, a timing issue might cause this warning if an attempt to sign in occurs
immediately after the on-premises Active Directory password was reset. This issue
occurs if the user has the User must change password at next logon option selected,
and the domain authentication is configured for Pass-through Authentication (PTA).
In this scenario, the user tries to sign in before password hash synchronization finishes
syncing the temporary password to Azure AD. But because PTA is configured, the
authentication is redirected to on-premises Active Directory. The user can now sign in to
Azure AD successfully and is then forced to change the password on the first sign-in. If
the password change is successful, password writeback updates the new password in
on-premises Active Directory and in Azure AD. However, the sign-in message says "our
servers take a little time to catch up." This is because the temporary password didn't
match the current password in Azure AD.
Solution
After an Active Directory administrator resets the password on-premises, Azure AD
Connect takes at least two minutes to sync that temporary password to Azure AD. To
avoid receiving this warning message, the user has to wait at least two minutes to sign
in and update the password. This provides time for password hash synchronization to
sync the temporary password.
This article helps you troubleshoot a scenario in which a user or administrator can't reset
or change a password because the on-premises Active Directory password policy
disallows it.
Symptoms
In the Azure portal , you take the following steps:
Unfortunately, you cannot reset this user's password because your on-premises
policy does not allow it. Please review your on-premises policy to ensure that it is
setup correctly.
Cause
The error message is sent by an on-premises domain controller. To obtain more
information about the problem, follow these steps.
7 Note
This procedure requires that you enable your domain controller's audit policy for
Account Management - Failure events. For more information, see Audit account
management.
2. Open the Event Viewer snap-in. To do this, select Start, enter eventvwr.msc, and
then press Enter.
3. Under the Event Viewer (Local) node in the sidebar, expand Windows Logs, and
then select Security.
4. Look for audit events that contain Event ID 4724, Audit Failure (in the Keywords
column) and User Account Management (in the Task Category column). These
events should resemble the following example:
Output
Source: Microsoft-Windows-Security-Auditing
Level: Information
User: N/A
Computer: ADDS01.Contoso.net
Description:
Subject:
Target Account:
Event Xml:
<Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
<System>
...
</System>
</Event>
This example confirms that password writeback is working as expected. However, the
password that's entered doesn't meet the local Active Directory password policy. The
policy might be violated because of password length, complexity, age, or other
requirements.
Solution
Provide a password that meets the local Active Directory password policy.
First, verify the current settings for the password policy to be able to determine any
violations. Then, go to the domain controller, and use one or more of the following
methods:
Output
C:\>net accounts
Alternatively, open an administrative PowerShell window, and then run the Get-
ADDefaultDomainPasswordPolicy cmdlet:
Output
PS C:\WINDOWS\system32> Get-ADDefaultDomainPasswordPolicy
ComplexityEnabled : True
DistinguishedName : DC=contoso,DC=net
LockoutDuration : 00:30:00
LockoutObservationWindow : 00:30:00
LockoutThreshold : 0
MaxPasswordAge : 42:00:00
MinPasswordAge : 00:00:00
MinPasswordLength : 7
objectClass : {domainDNS}
objectGuid : 01234567-89ab-cdef-0123-456789abcdef
PasswordHistoryCount : 24
ReversibleEncryptionEnabled : False
Output
Comment
User's comment
Logon script
User profile
Home directory
Is the entered password compliant with the local Active Directory password policy, but
the issue persists? If so, check whether you're using Azure AD Password Protection in
your on-premises AD DS environment, or if you have any third-party password filter
software installed on your domain controllers.
Original product version: Cloud Services (Web roles/Worker roles), Azure Active
Directory, Microsoft Intune, Azure Backup, Office 365 Identity Management
Symptoms
When you try to run the Microsoft Azure Active Directory Sync Tool Configuration
Wizard, you receive the following error message:
The Enterprise Administrator credentials that you supplied are not valid. Supply valid
credentials and try again.
Cause
This issue may occur if you entered incorrect credentials on the Active Directory
Credentials page of the Directory Sync Tool Configuration Wizard.
Resolution
To resolve this issue, follow these steps:
1. Make sure that you provide credentials for an account that has enterprise admin
permissions for your company's local Active Directory installation.
2. Make sure that you enter the correct user name and password for the user
account.
3. Make sure that the computer on which the Directory Sync Tool Configuration
Wizard is installed can communicate with your company's domain controllers and
can authenticate to the local Active Directory.
7 Note
The account must have enterprise admin permissions in the Active Directory forest
to which the computer that's running the Directory Sync Tool Configuration Wizard
is joined.
To check whether an account has enterprise admin permissions, follow these steps:
3. In the Name box, type enterprise admins, and then click Find Now.
4. Double-click Enterprise Admins, and then click the Members tab.
5. Check whether the user is listed in the Members list. If the user isn't in the list, one
of the members of this list must log on and add the user to this list. Or, a member
of this list can use their credentials in the Directory Sync Tool Configuration Wizard.
This article describes an issue that prevents Microsoft Azure Active Directory (Azure AD)
Connect services from starting.
Original product version: Azure Active Directory, Office 365 Identity Management
Symptoms
You discover that one or more Azure AD Connect services don't start. For example, the
Microsoft Azure AD Sync service (ADSync) doesn't start.
1. Select Start, enter gpedit.msc in the search box, and then press Enter to open the
Local Group Policy Editor snap-in.
2. In the console tree, under Computer Configuration, expand Windows Settings >
Security Settings > Local Policies, and then select User Rights Assignment.
3. Verify that the ADSync service account is added for the following policy settings:
5. Run the following gpresult command, which generates a group policy report:
cmd
gpresult /H gpresult.htm
7. If User Rights Assignment settings are applied through any domain group policy
object (GPO), use the Group Policy Management console (gpmc.msc) from a
domain controller to take one of the following actions:
8. If you made any changes to the local group policy or domain group policy, restart
the computer to apply the changes.
For example, if you use the Azure Active Directory Sync tool, remove and then reinstall
it. Or, if you use Azure AD Sync, remove and then reinstall it.
This article provides a resolution to an issue in which the Azure Active Directory (Azure
AD) Management Agent stops responding with error
System.Collections.Generic.KeyNotFoundException.
Symptoms
When you run a Full Import or a Delta Import on the Microsoft Azure AD Connector,
one of the following actions occur:
at System.Collections.Generic.Dictionary`2.get_Item(TKey key)
at System.Collections.ObjectModel.KeyedCollection`2.get_Item(TKey key)
at
Microsoft.Azure.ActiveDirectory.Connector.Connector.GetConnectorSpaceEn
tryChange(SyncObject syncObject)
at System.Linq.Enumerable.WhereSelectListIterator`2.MoveNext()
at System.Collections.Generic.List`1.InsertRange(Int32 index,
IEnumerable`1 collection)
at
Microsoft.Azure.ActiveDirectory.Connector.Connector.GetImportEntriesCor
e()
at
Microsoft.Azure.ActiveDirectory.Connector.Connector.GetImportEntries(Ge
tImportEntriesRunStep getImportEntriesRunStep)
at System.Collections.Generic.Dictionary`2.get_Item(TKey key)
at System.Collections.ObjectModel.KeyedCollection`2.get_Item(TKey key)
at
Microsoft.Azure.ActiveDirectory.Connector.Connector.GetConnectorSpaceEn
tryChange(SyncObject syncObject)
at System.Linq.Enumerable.WhereSelectListIterator`2.MoveNext()
at System.Collections.Generic.List`1.InsertRange(Int32 index,
IEnumerable`1 collection)
at
Microsoft.Azure.ActiveDirectory.Connector.Connector.GetImportEntriesCor
e()
at
Microsoft.Azure.ActiveDirectory.Connector.Connector.GetImportEntries(Ge
tImportEntriesRunStep getImportEntriesRunStep).
Resolution
To resolve this problem, select the missing object type (device). To do this, follow these
steps:
1. Open Management Agent for the Azure AD directory in the Forefront Identity
Manager (FIM) Sync console.
7 Note
5. In the Select Object Types pane, locate and then select the device check box.
Status
Microsoft has confirmed that this is a problem in the Microsoft products that are listed
in the "Applies to" section.
This article discusses an issue in which Azure AD Connect is only partially upgraded or
the password synchronization and the password writeback features are disabled.
Symptoms
When you run Azure AD Connect 1.1.443.0 or an earlier version, you experience one of
the following issues:
Cause
A problem in the automatic upgrade feature for Azure AD Connect causes the
Microsoft.Azure.ActiveDirectory.Synchronization.Upgrader.exe process to terminate
because of an unhandled exception. Therefore, the automatic upgrade does not finish.
To verify this, follow these steps:
To check the version of Azure AD Connect in the server configuration, run the following
command in Windows PowerShell, and look for the value of the
Microsoft.Synchronize.ServerConfigurationVersion property:
PowerShell
PowerShell
Get-ADSyncScheduler
Workaround
To work around this issue, follow these steps:
2. After the upgrade is complete, verify that the installed version of Azure AD
Connect matches the version in the server configuration.
7 Note
This article resolves an issue where you can't connect to the Azure Information
Protection Service using Windows PowerShell in Office 365.
Symptoms
When you try to connect to Microsoft Azure Information Protection using Windows
PowerShell in Microsoft Office 365, you get an error message that resembles the
following:
PS C:\> Connect-AipService
service failed. Verify that the user name and password you are using are
correct and try again. If you have continued problems, see
http://go.microsoft.com/fwlink/?LinkId=251909.
At line:1 char:1
+ Connect-AipService
+ ~~~~~~~~~~~~~~~~~~
ApplicationFailedException
+ FullyQualifiedErrorId :
NotSpecified,Microsoft.RightsManagementServices.Online.Admin.PowerShell.Connect
AipServiceCommand
Cause
This issue occurs if one or more of the following conditions are true:
Resolution
7 Note
If Azure Information Protection isn't enabled for your company, you use the
Microsoft 365 admin center to enable it. For more info about how to do this, read
Azure Information Protection deployment road map.
To resolve this issue, make sure that the following are true:
Make sure that you enter the correct user name and password. To check that you
entered them correctly, sign in to the Office 365 portal .
You must be a global administrator to connect to Azure Information Protection.
To use Azure Information Protection, you must have a subscription that includes
Azure Information Protection.
Work with the network administrator to make sure that the network meets the
requirements for connecting to Azure Information Protection. The requirements
are as follows:
Incoming and outgoing connections to *.aadrm.com are enabled.
Incoming and outgoing connections to *.cloudapp.net ( rmsoprod*-b-
rms*.cloudapp.net ) are enabled.
Port 443 is open.
More information
For more information on Azure Information Protection, visit AIPService.
Contact us for help
If you have questions or need help, create a support request , or ask Azure community
support.
Can't enable the Device writeback
option in Azure AD Connect
Article • 04/20/2022 • 3 minutes to read
Original product version: Cloud Services (Web roles/Worker roles), Azure Active
Directory, Office 365 Identity Management, Microsoft Intune
Symptoms
When you run the Azure Active Directory (Azure AD) Connect configuration wizard, you
can't enable the Device writeback option on the Customize synchronization options
page.
Cause
This issue can occur if one of the following conditions is true:
Resolution
Console
c. Examine the Replication.csv file, and then troubleshoot and correct any errors.
2. Seize the FSMO role. In some instances, the server that holds an FMSO role may
not be advertising itself correctly. Seizing itself may fix the issue. To do this, follow
these steps:
Console
3. For each computer that's listed in the output, follow the steps in the "Seize FSMO
roles" section of Using Ntdsutil.exe to transfer or seize FSMO roles to a domain
controller .
1. Make sure that the Remote Server Administration Tools Pack is installed. For more
information, see Installing or Removing the Remote Server Administration Tools
Pack .
Console
Import-module .\AdSyncPrep.psm1
Console
5. Open the Azure AD Connect configuration wizard. You should now be able to
enable device writeback.
More information
On the server on which Azure AD Connect is installed, review the logs in the following
location:
ForestFqdn : <Forest_Name>
AdConnectorId : <ID>
PropertiesToRetrieve : msDS-
DeviceLocation,name,displayName,distinguishedName,objectClass
NamingContextType : Configuration
BaseDnType : Relative
AdConnectorUserName : <Domain>\MSOL_d95558f154ee
BaseDn : CN=Services
LdapFilter : (objectClass=msDS-DeviceRegistrationService)
SearchScope : Subtree
Exception Details :
Level: Warning
Description:
This server is the owner of the following FSMO role, but does not consider it valid.
For the partition which contains the FSMO, this server has not replicated successfully
with any of its partners since this server has been restarted. Replication errors are
preventing validation of this role.
This article describes an issue that you can't manage or remove objects that were
created through directory synchronization from Azure AD. It provides two resolutions
for this issue according to different reasons.
Original product version: Cloud Services (Web roles/Worker roles), Azure Active
Directory, Microsoft Intune, Azure Backup, Office 365 Identity Management
Symptoms
You try to manually manage or remove objects that were created through directory
synchronization from Azure Active Directory (Azure AD):
For example, you want to remove an orphaned user account that was synced to Azure
AD from your on-premises Active Directory Domain Services (AD DS).
In this scenario, you can't remove the orphaned user account by using the Microsoft
cloud service portal in Office 365, Azure, or Microsoft Intune, or by using Windows
PowerShell.
Cause
This issue may occur if one or more of the following conditions are true:
Resolution
1. If you're not running Windows 10, install the 64-bit version of the Microsoft Online
Services Sign-in Assistant: Microsoft Online Services Sign-in Assistant for IT
Professionals RTW .
2. Install the Microsoft Azure Active Directory Module for Windows PowerShell:
a. Open an elevated Windows PowerShell command prompt (run Windows
PowerShell as an administrator).
b. Run the Install-Module MSOnline command.
PowerShell
4. Check that directory synchronization was fully disabled by using the Windows
PowerShell. To do it, run the following command periodically:
PowerShell
(Get-MSOLCompanyInformation).DirectorySynchronizationEnabled
This command will return True or False. Continue to run this command periodically
until it returns False, and then go to the next step.
It may take 72 hours for deactivation to be completed. The time depends on the
number of objects that are in your cloud service subscription account.
5. Try to update an object by using Windows PowerShell or by using the cloud service
portal.
Step 4 may take a while to be completed. There's a process in the cloud service
environment that computes attribute values. The process must be completed
before the objects can be changed by using Windows PowerShell or by using
the cloud service portal.
If some updates and deletions are propagated, but some deletions aren't
synchronized to the cloud service, follow typical directory synchronization
troubleshooting procedures.
If all updates and deletions aren't synchronized to the cloud service, contact
Support.
7 Note
More information
To re-enable directory synchronization, run the following command:
PowerShell
It's important to plan carefully when you re-enable directory synchronization. If you
used the cloud service portal or Windows PowerShell to make any changes directly to
the objects that were originally synchronized from on-premises AD DS, the changes will
be overwritten by on-premises attributes and settings the first time that synchronization
occurs after directory synchronization is re-enabled.
This article describes a scenario in which you receive an error when you run
DirSyncConfigShell.psc1 after you install version 6765.0006 of the Directory Sync tool
on a Windows Server 2008 R2-based computer.
Original product version: Azure Active Directory, Cloud Services (Web roles/Worker
roles), Microsoft Intune, Azure Backup, Office 365 Identity Management
Symptoms
When you run DirSyncConfigShell.psc1 after you install version 6765.0006 of the
Microsoft Azure Active Directory Sync Tool on a Windows Server 2008 R2-based
computer, you receive the following error message:
Cause
This issue occurs if Windows Management Framework 3.0 is not installed on the
Windows Server 2008 R2-based computer.
Resolution
Do one of the following:
Install Windows Management Framework 3.0 on the Windows Server 2008 R2-
based computer. For more information, see Windows Management Framework
3.0 .
Run the Directory Sync tool from a Windows Server 2012 R2-based computer. To
install the Directory Sync tool, see Install or upgrade the Directory Sync tool.
This article provides information about troubleshooting an issue in which users can no
longer access Office 365, Azure, or Microsoft Intune after running the Convert-
MSOLDomaintoFederated command to convert an existing domain from standard
Original product version: Cloud Services (Web roles/Worker roles), Azure Active
Directory, Microsoft Intune, Azure Backup, Office 365 Identity Management
Symptoms
During setup of single sign-on (SSO) in a Microsoft cloud service such as Office 365,
Microsoft Azure, or Microsoft Intune, you run the Convert-MSOLDomaintoFederated
command to convert an existing domain from standard authentication to federated
authentication. However, after you do this, users who are associated with that domain
can no longer access the cloud service.
Cause
This issue occurs if SSO isn't set up correctly or if the setup isn't completed.
2 Warning
It's a Microsoft best practice to always have at least one administrator user ID that's
associated with the default domain so that administrative access to the
organization isn't lost if SSO is compromised.
Resolution
To resolve this issue, use one of the following methods, as appropriate for your
situation.
To diagnose and troubleshoot SSO setup, see Troubleshoot single sign-on setup issues
in Office 365, Intune, or Azure .
The problem is caused by a service outage that requires immediately restoring user
access.
The AD FS server is unavailable.
If these conditions are true, reset the authentication setting for the domain and for each
user account to use standard authentication. To do this, follow these steps:
1. Start the Azure Active Directory Module for Windows PowerShell. To do this, select
Start, select All Programs, select Windows Azure Active Directory, right-click
Windows Azure Active Directory Module for Windows PowerShell, and then
select Run as administrator.
2. To convert the domain, run the following commands in the order in which they are
presented. Press Enter after you type each command.
PowerShell
$cred = Get-Credential
When you're prompted, enter cloud service administrator credentials that are not
SSO-enabled.
PowerShell
PowerShell
7 Note
3. For each user who has a user principal name (UPN) suffix that's associated with the
domain, run the following command:
PowerShell
7 Note
In this command, the placeholder <string> represents the value of the UPN
for the user who is being converted.
More information
) Important
If this problem occurs, contact Microsoft Support to have the domain federation
reversed temporarily so that the administrator (who is no longer SSO-enabled) can
regain access to troubleshoot SSO-related problems.
Contact us for help
If you have questions or need help, create a support request , or ask Azure community
support.
Can't sync SystemMailbox or
DiscoveryMailboxSearch accounts using
Azure Active Directory Sync tool
Article • 04/20/2022 • 2 minutes to read
This article provides information about resolve a problem in which you receive errors
when trying to use the Azure Active Directory Sync tool to synchronize the
SystemMailbox and DiscoverySearchMailbox user accounts.
Original product version: Cloud Services (Web roles/Worker roles), Azure Active
Directory, Microsoft Intune, Azure Backup, Office 365 Identity Management
Symptoms
When you use the Microsoft Azure Active Directory Sync tool to sync the following user
accounts, you receive directory synchronization errors:
SystemMailbox{1f05a927-beed-480c-b962-
da8d1d7e16a8}@<DomainNameName>
SystemMailbox{e0dc1c29-89c3-4034-b678-e6c29d823ed9}@<DomainName>
DiscoverySearchMailbox{D919BA05-46A6-415f-80AD-
7E09334BB852}@<DomainNameName>
Cause
This issue occurs if the three user accounts that were created during Microsoft Exchange
Server 2010 installation are missing the attribute data. In this case, the attribute data is
used by the Azure Active Directory Sync tool to filter out these user accounts and stop
them from being synced to the cloud.
Resolution
To resolve this issue, use one of the following methods, as appropriate for your
situation.
Method 1
On the domain controller or a computer on which the Active Directory Domain Services
Administration Tools are installed, follow these steps:
4. Double-click each SystemMailbox user account, and then follow these steps for
each account:
a. Select Attribute Editor.
b. Find the mailNickName attribute, and then populate the attribute by using the
value that's included in the mail attribute.
c. Select OK.
Method 2
On the computer on which the Directory Sync tool is installed, follow these steps:
2. Open Windows PowerShell, type Import-Module DirSync , and then press Enter.
3. After the Windows PowerShell session starts, run the following cmdlet:
PowerShell
Start-OnlineCoexistenceSync
If the methods did not work, see Recreate missing arbitration mailboxes.
This article describes a problem in which you receive an error message "We could not
verify your account" when you try to reset your password in Microsoft Azure, Office 365,
or Microsoft Intune. To resolve this problem, work with your administrator to update
your telephone number.
Original product version: Azure Active Directory, Microsoft Intune, Cloud Services (Web
roles/Worker roles)
Symptoms
When you use Microsoft Azure, Microsoft Office 365, or Microsoft Intune, you may
receive the following error message when you try to reset your password:
Cause
This problem may occur because there are no telephone numbers on file for you.
Resolution
To resolve this problem, work with your administrator to update your telephone
number(s).
This article provides information about resolving an issue in which a security group
remains mail-enabled after it is disabled through a sync in on-premises AD.
Symptoms
Consider the following scenario:
You have a security group that has an email address that is specified in on-
premises Active Directory (on-premises AD).
The security group is synchronized to Azure Active Directory (Azure AD).
You remove the email address from the security group in on-premises AD.
You run a synchronization.
In this scenario, the security group remains mail-
enabled, and it still has the original email address that was assigned to it in Azure
AD.
Cause
When a mail-enabled security group is synchronized to Azure AD, the email address that
uses the original domain ( onmicrosoft.com ) is appended to the group as the secondary
email address. If you delete the primary email address, the email address that has the
original domain becomes the primary email address.
The affected group does not exist in Global Address List (GAL) for on-premises
users, so the user cannot choose the group in the From filed when they send
emails.
For Exchange Online users, the affected group can be found in GAL to choose
from. However, email does not reach the recipient since the group's mail address
was changed to alias@contoso.onmicrosoft.com .
On-premises users cannot use the affected group to set permission such as access
to a shared calendar.
For Exchange Online users, the affected group can be used to set access to a
calendar.
Workaround
To work around this issue, use one of the following methods:
Delete the security group from the Admin Portal, and then run the synchronization
again.
Move the security group to another organizational unit (OU) that has not been
synchronized (filtered out). When you do this, the group is removed from the
cloud. Then, move the group back to the original OU.
Symptoms
Consider the following scenario:
1. You are using Azure AD Connect to federate (synchronize) users from an on-
premises Active Directory domain to Azure AD.
2. The computer is Azure AD joined, and the workgroup name is the same as the on-
premises domain's NetBIOS name.
3. You have logged on to this computer with a federated user at least once.
In this case, the computer takes approximately three hours to progress to the logon
screen when you restart the OS. During this time, you will see a black screen that
displays an activity icon (a spinning circle of dots). Approximately three hours after
starting, the startup process finishes, and the interactive logon screen is displayed and
the user can log in without issues.
Cause
This issue occurs because Windows unexpectedly evaluates a condition in which a wait
time of 10,000 seconds is initiated. This timeout condition is manifested as a three-hour
startup delay.
7 Note
This article describes a performance problem in Azure Active Directory Sync Tool. The
tool either stops syncing, or reports that sync hasn't run in more than 24 hours.
Original product version: Azure Active Directory, Microsoft Intune, Azure Backup, Office
365 Identity Management
Symptoms
You experience one of the following symptoms:
7 Note
Cause
This issue may occur if one or more of the following conditions are true:
The work or school account that was used in the configuration wizard to set up
directory synchronization has one of the following problems:
The account was deleted.
The account was disabled.
The account password expired.
The logon account for one or more directory synchronization services has one of
the following problems:
The account was deleted.
The account was disabled.
The account password expired.
7 Note
The admin account that's used for directory synchronization was changed.
Resolution
2. Locate the Azure Active Directory Synchronization appliance service, and then
check whether the service is started. If the service isn't started, right-click it, and
then select Start.
If you're using the Azure Active Directory Sync Tool, look for Azure Active
Directory Sync Service.
If you're using Azure Active Directory Connect, look for Microsoft Azure AD
Sync.
3. Verify that the admin account that's being used for directory synchronization still
exists. And verify that the account is allowed to sign in. If the account still exists,
reset the password, and then verify that you can sign in. If you're prompted,
change the password.
If you don't know the global administrator account that's used to configure
directory synchronization, follow these steps on the server on which you installed
the directory synchronization appliance:
a. Go to %ProgramFiles%\Microsoft Azure AD Sync\UIShell\ , and then run
Miisclient.exe.
7 Note
If you're using Azure Active Directory Connect or the Azure Active Directory
Sync Service, select Start, and then search for and open Synchronization
Service.
b. Select Connectors, and then double-click the Azure Active Directory connector.
c. Select Connectivity.
d. Make note of the UserName value. It's the global administrator account that's
used to configure directory synchronization.
5. When you're prompted, select the Force directory synchronization check box.
If you're using the Azure Active Directory Sync Tool, look for Azure Active
Directory Sync Service.
If you're using Azure Active Directory Connect, look for Microsoft Azure AD
Sync. Right-click the service, and then select Properties. On the Log On tab,
note the account name that's listed.
7 Note
4. Right-click the account, and then select Properties. On the Account tab, under
Account options, follow these steps:
a. Make sure that the Password never expires check box is selected.
b. Make sure that the Account is disabled check box is cleared. Then, take one of
the following actions:
5. If the Account is disabled check box is already cleared, it's possible that the
password for the account was manually changed. To set a new password, open
Active Directory Users and Computers, locate and right-click the account, and then
select Reset Password to reset the password. Note the password that you set
because you'll have to use it in the next step.
6. Set the password on the logon account for the directory synchronization services:
a. select Start, select Run, type Services.msc, and then select OK.
b. Set the password for the following services, depending on the client that you're
using. To do so, right-click the appropriate service, select Properties, select the
Log On tab, and then type the password.
c. Start the service or services for which you set the new password.
This article describes an issue in which users are synced to Azure AD but one or more
SMTP proxy addresses aren't synced. This issue occurs if duplicate SMTP proxy
addresses exist.
Symptoms
Although your users are synced to Azure Active Directory (Azure AD), one or more SMTP
proxy addresses aren't synced. Additionally, you may see a message that resembles one
of the following:
There is an error on one or more user accounts. To see which users are affected and
the detailed error message, select the "users with errors" view, and then select the
user's display name.
We detected a duplicate Proxy address conflict on the value <value>. All attribute
values need to be unique across objects. To resolve this conflict, first determine
which object should be using the conflicting value. Then, update or remove the
conflicting value from the other object(s). This error was detected on <Date and
Time>.
This object has been updated in your Azure Active Directory, but with some
modified properties, because the following attributes are associated with another
object [ProxyAddresses SMTP: john@contoso.com ;].
This issue occurs if another object has the same SMTP proxy address.
Resolution
To resolve this issue, find the users who have duplicate SMTP proxy addresses, and then
change the addresses so that they are unique. To do this, follow these steps.
To resolve duplicate attributes by using the IdFix Tool, see "Duplicate" is displayed in the
ERROR column.
For more information about the IdFix tool, go to IdFix DirSync Error Remediation Tool .
7 Note
The report in the Office 365 portal only displays user objects that have these errors.
The report doesn't show information about conflicts between groups, contacts, or
public folders. See Method 2 to learn how to view conflicts for the other objects.
2. In the Microsoft 365 admin center, go to Users, and then select Active users.
A warning at the top of the page is displayed if there are duplicate attribute
conflicts on any object in your organization.
3. To filter the view to display only users with errors, select Users with errors.
4. Select an object to view details about the conflict. This information is displayed in
the lower-right corner of the page.
This article can help you fix a problem in which Password Hash Synchronization is
automatically enabled in Azure AD connector.
The following versions of Microsoft Azure Active Directory (AD) Connect have issues that
affect the Change user sign-in task:
1.1.557.0
1.1.558.0
1.1.561.0
1.1.614.0
These issues affect the Pass-through Authentication users who don't want to use
Password Hash Synchronization.
Scenario 1
You have an existing Azure AD Connect deployment that has both Password
Synchronization and Pass-through Authentication disabled.
After you enable Pass-through Authentication by using the Change user sign-in
task, Password Hash Synchronization is automatically enabled.
Scenario 2
You have an existing Azure AD Connect deployment that has Password
Synchronization disabled and Pass-through Authentication enabled.
After you enable or disable the Seamless Single Sign-on option by using the
Change user sign-in task, Password Hash Synchronization is automatically enabled.
1. Run Azure AD Connect, and then select View current configuration. In the details
pane, check whether Password synchronization is enabled on your tenant.
Optionally, if you want to clear password hashes that are already synchronized to Azure
AD, follow these steps:
1. Make sure that the Password writeback feature is disabled on your tenant. To do
that, follow these steps:
a. Run Azure AD Connect, and then select Configure.
b. Select the Customize synchronization options task.
c. On the Optional features page, clear the Password writeback feature check
box.
d. Complete the wizard.
2. Use the Set-MsolUserPassword cmdlet to set random passwords on all affected
users. You have to run this cmdlet five times for each user because Azure AD stores
the last four password hashes in the password hash history.
7 Note
The Set-MsolUserPassword cmdlet does not work if the user is using a federated
domain. To clear password hashes for the user in the federated domain, you must
change the UPN of the user to a non-federated domain, and then run the cmdlet to
set the random password. After that, revert the UPN of the user to the original
state.
To improve the security posture of your tenant, and to remain in compliance with industry standards,
Microsoft Azure Active Directory (Azure AD) will soon stop supporting the following Transport Layer
Security (TLS) protocols and ciphers:
TLS 1.1
TLS 1.0
3DES cipher suite (TLS_RSA_WITH_3DES_EDE_CBC_SHA)
Azure AD Connect
Azure AD PowerShell
Azure AD Application Proxy connectors
PTA agents
Legacy browsers
Applications that are integrated with Azure AD
To follow the latest compliance standards for the Federal Risk and Authorization Management
Program (FedRAMP) .
To improve security when users interact with our cloud services.
TLS 1.0, 1.1 and 3DES Cipher suite in U.S. government instances starting on March 31, 2021.
TLS 1.0, 1.1 and 3DES Cipher suite in public instances starting January 31, 2022. (This date has been
postponed from June 30th, 2021 to January 31st, 2022, to give administrators more time to remove
the dependency on legacy TLS protocols and ciphers (TLS 1.0,1.1 and 3DES).)
Update the Windows OS and the default TLS that you use for
WinHTTP
These operating systems natively support TLS 1.2 for client-server communications over WinHTTP:
Windows 10
Windows 8.1
Windows Server 2016
Windows Server 2012 R2
Later versions of Windows and Windows Server
Verify that you haven't explicitly disabled TLS 1.2 on these platforms.
By default, earlier versions of Windows (such as Windows 8 and Windows Server 2012) don't enable TLS
1.2 or TLS 1.1 for secure communications by using WinHTTP. For these earlier versions of Windows:
You can configure those values to add TLS 1.2 and TLS 1.1 to the default secure protocols list for WinHTTP.
7 Note
By default, an OS that supports TLS 1.2 (for example, Windows 10) also supports legacy versions of
the TLS protocol. When a connection is made by using TLS 1.2 and it doesn’t get a timely response, or
when the connection is reset, the OS might try to connect to the target web service by using an older
TLS protocol (such as TLS 1.0 or 1.1). This usually occurs if the network is busy, or if a packet drops in
the network. After the temporary fallback to the legacy TLS, the OS will try again to make a TLS 1.2
connection.
What will be the status of such fallback traffic after Microsoft stops supporting the legacy TLS? The OS
might still try to make a TLS connection by using the legacy TLS protocol. But if the Microsoft service
is no longer supporting the older TLS protocol, the legacy TLS-based connection won’t succeed. This
will force the OS to try the connection again by using TLS 1.2 instead.
Identify and reduce dependency on clients that don't support TLS 1.2
Update the following clients to provide uninterrupted access:
For more information, see Handshake Simulation for various clients connecting to www.microsoft.com,
courtesy SSLLabs.com.
Enable TLS 1.2 on common server roles that communicate with Azure
AD
Azure AD Connect (install the latest version)
Do you also want to enable TLS 1.2 between the sync engine server and a remote SQL Server?
Then make sure you have the required versions installed for TLS 1.2 support for Microsoft SQL
Server .
Azure AD Connect Authentication Agent (pass-through authentication) (version 1.5.643.0 and later
versions)
Azure Application Proxy (version 1.5.1526.0 and later versions enforce TLS 1.2)
Active Directory Federation Services (AD FS) for servers that are configured to use Azure Multi-Factor
Authentication (Azure MFA)
NPS servers that are configured to use the NPS extension for Azure AD MFA
Action required
1. We highly recommend that you run the latest version of the agent, service, or connector.
2. By default, TLS 1.2 is enabled on Windows Server 2012 R2 and later versions. In rare instances,
the default OS configuration might have been modified to disable TLS 1.
To make sure that TLS 1.2 is enabled, we recommend that you explicitly add the registry values
from the Enable TLS 1.2 on client or server operating systems section on servers that are
running Windows Server and that communicate with Azure AD.
3. Most of the previously listed services are dependent on .NET Framework. Make sure it's
updated as described in the Update and configure .NET Framework to support TLS 1.2 section.
Registry strings
To manually configure and enable TLS 1.2 at the operating system level, you can add the following
DWORD values.
For Windows 2012 R2, Windows 8.1, and later OS, TLS 1.2 is enabled by default. Thus, the following
registry values aren't required unless they were set with different values.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS
1.2\Client
"DisabledByDefault": 00000000
"Enabled": 00000001
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS
1.2\Server
"DisabledByDefault": 00000000
"Enabled": 00000001
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v4.0.30319
"SchUseStrongCrypto": 00000001
To enable TLS 1.2 by using a PowerShell script, see TLS 1.2 enforcement for Azure AD Connect.
For more information, see Determine which versions and service pack levels of .NET Framework are
installed.
.NET Framework 4.6.2 and later versions support TLS 1.2 and TLS 1.1. Check the registry settings. No
other changes are required.
Update .NET Framework 4.6 and earlier versions to support TLS 1.2 and TLS 1.1.
Do you use .NET Framework 4.5.2 or 4.5.1 on Windows 8.1 or Windows Server 2012? Then the
relevant updates and details are also available from Microsoft Update Catalog .
Also see Microsoft Security Advisory 2960358.
For any computer that communicates across the network and runs a TLS 1.2-enabled system, set the
following registry DWORD values.
For 32-bit applications that are running on a 32-bit OS and 64-bit applications that are running on a
64-bit OS, update the following subkey values:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v2.0.50727
"SystemDefaultTlsVersions": 00000001
"SchUseStrongCrypto": 00000001
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v4.0.30319
"SystemDefaultTlsVersions": 00000001
"SchUseStrongCrypto": 00000001
For 32-bit applications that are running on 64-bit OSs, update the following subkey values:
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\.NETFramework\v2.0.50727
"SystemDefaultTlsVersions": dword:00000001
"SchUseStrongCrypto": dword:00000001
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v4.0.30319
"SystemDefaultTlsVersions": dword:00000001
"SchUseStrongCrypto": dword:00000001
To find the sign-in attempts that used legacy TLS protocols, an administrator can review the logs by:
Azure Monitor
You can query the sign-in logs using Azure Monitor. Azure Monitor is a powerful log analysis,
monitoring, and alerting tool. Use Azure Monitor for:
Azure AD logs
Azure resources logs
Logs from independent software tools
7 Note
You need an Azure AD Premium license to export reporting data to Azure Monitor.
1. In Integrate Azure AD logs with Azure Monitor logs, follow the instructions for how to access the
Azure AD sign-in logs in Azure Monitor.
2. In the query definition area, paste the following Kusto Query Language query:
Kusto
SigninLogs
| mv-apply JsonAuthProcDetails on (
| project HasLegacyTls=JsonAuthProcDetails.value
// Non-interactive sign-ins
AADNonInteractiveUserSignInLogs
| mv-apply JsonAuthProcDetails on (
| project HasLegacyTls=JsonAuthProcDetails.value
AADServicePrincipalSignInLogs
| mv-apply JsonAuthProcDetails on (
| project HasLegacyTls=JsonAuthProcDetails.value
3. Select Run to execute the query. The log entries that match the query appear in the Results tab
below the query definition.
4. To learn more about the source of the legacy TLS request, look for the following fields:
UserDisplayName
AppDisplayName
ResourceDisplayName
UserAgent
1. In the Azure portal , search for and select Azure Active Directory.
4. Select the Additional details tab. (If you don't see this tab, first select the ellipsis (...) in the right
corner to view the full list of tabs.)
5. Check for a Legacy TLS (TLS 1.0, 1.1, or 3DES) value that's set to True. If you see that particular field
and value, the sign-in attempt was made using legacy TLS. If the sign-in attempt was made using TLS
1.2, that field doesn't appear.
Original product version: Office 365 Identity Management, Azure Active Directory
Symptoms
When you try to upgrade Azure Active Directory Connect, you receive the following
error message:
An Error occurred while Upgrading from Azure Active Directory Sync. Unable to
upgrade the Synchronization Service. Please see the Event log for additional details.
Resolution
To resolve this issue, follow these steps:
Original product version: Azure Active Directory, Microsoft Intune, Azure Backup, Office
365 Identity Management
Symptoms
When you run the Azure Active Directory Sync (AAD Sync) Services config wizard, you
receive the following message:
Retrieving the COM class factory for remote component with CSLID {...} from
machine ... failed due to the following error: 80070005
Cause
This issue may occur if you're not a member of the ADSyncAdmins group on the local
computer or if you have just installed AAD Sync Services.
Resolution
To resolve this issue, sign out and then sign in to the computer. If the issue persists,
follow these steps:
1. Select Start, type compmgmt.msc in the search box, and then press Enter to open
Computer Management.
2. Under Computer Management, expand Local Users and Groups, and then expand
Groups.
3. Make sure that the ADSyncAdmins group exists. If this group is missing, create a
new group, and name it ADSyncAdmins.
4. Add yourself to the ADSyncAdmins group.
5. Sign out, and then sign in to the computer again.
This article describes a problem in which synchronization errors appear after Microsoft
Azure AD Connect is installed on Windows Server 2019-based servers.
Symptoms
You experience one or more of various symptoms, such as password hash sync failures
or receiving "staging-error" discovery errors during the import cycle (shown in the
following screenshot).
When this problem occurs, Event ID 6301 is logged in the server Application log, as
follows:
Source: ADSync
Level: Error
Keywords: Classic
User: N/A
Computer: AADConnect.contoso.com
This event indicates that an error occurs when Azure AD Connect attempts a read or
write operation over the LocalDB database by using table-valued parameters.
For more information about table-valued parameters, see Use Table-Valued Parameters
(Database Engine).
Cause
This problem is caused by incompatible language settings for programs that do not
support Unicode.
The service account defaults to UTF-8 for worldwide language support when it is
enabled. The LocalDB database version in Windows Server 2019 does not support this
format.
Resolution
To resolve this problem, clear the checkbox next to Beta: Use Unicode UTF-8 for
worldwide language support (shown in the previous screenshot), and then restart the
server.
1. On the Azure AD Connect server, open Control Panel, and then select Clock,
Language and Region.
2. Select Region.
3. Select the Administrative tab, and then select Change System locale.
4. If the Use Unicode UTF-8 for worldwide language support setting is enabled,
clear it.
5. Select OK, and then restart the server.
Original product version: Cloud Services (Web roles/Worker roles), Azure Active
Directory, Microsoft Intune, Azure Backup, Office 365 Identity Management
Symptoms
When you run the Microsoft Azure Active Directory Sync tool configuration wizard, you
receive the following error message:
Cause
This problem occurs if you're running an earlier version of the Microsoft Online Services
Sign-in Assistant.
Resolution
To resolve this issue, follow these steps:
1. Uninstall any versions of the Microsoft Online Services Sign-in Assistant that are
currently installed on the directory synchronization computer.
2. Install the latest version of the Microsoft Online Services Sign-In Assistant from
Microsoft Online Services Sign-In Assistant for IT Professionals RTW .
This article describes an issue in which you can't install Azure Active Directory Module
for Windows PowerShell. It provides a resolution.
Original product version: Azure Active Directory, Office 365 User and Domain
Management, Office 365 Identity Management
Symptoms
When you try to install Azure Active Directory Module for Windows PowerShell, you
receive the following error message:
In order to install Windows Azure Active Directory Module for PowerShell, you must
have Windows PowerShell 2.0 or greater installed on this computer.
Resolution
To resolve this issue, try one of the following methods. If one doesn't work for you, try
another one.
This article describes an issue in which changes to domain-based filtering in the Active
Directory management agent or the Active Directory Connector fail to sync.
Original product version: Azure Active Directory, Cloud Services (Web roles/Worker
roles), Microsoft Intune, Azure Backup, Office 365 Identity Management
Symptoms
After you make a change to domain-based filtering in the Active Directory management
agent or the Active Directory Connector, the run profile action fails to sync. In this
situation, you receive the following error message:
missing-partition-for-run-step
Source: FIMSynchronization
Description:
The management agent "Active Directory Connector" failed on run profile "Delta
Sync" because a partition specified in the configuration could not be located.
User Action
Refresh and verify the partition configuration for the management agent and the
target partition.
Cause
This issue may occur if the run profile isn't updated.
Resolution
If you're removing a domain from the sync process
1. In Synchronization Service Manager, select the Management Agents tab or the
Connectors tab.
2. Right-click the management agent or the Connector type for Active Directory
Domain Services, and then select Configure Run Profiles.
3. Look for the step that has a Partition value that contains a string of alphanumeric
characters (for example, {B3C9A66A-4C9C-457A-97B9-A0107037A416}), and then
select Delete Step.
4. Select Apply, and then select OK.
5. Repeat steps 3-4 for each run profile.
6. Right-click the same management agent or Connector again, and then select Run.
7. Select Full Sync, and then select OK.
This article provides information about resolving an issue in which high CPU usage
occurs in Azure Active Directory Connect Health for Sync.
Symptoms
You experience slow performance and high CPU usage (up to 100 percent) on a
computer that runs the Azure Active Directory (Azure AD) Connect Health for Sync
monitoring agent. In Task Manager, you notice that the
Microsoft.Online.Reporting.MonitoringAgent.Startup process is causing the high CPU
usage.
7 Note
Cause
This issue occurs because the June 2018 update for .NET Framework 4.7.2 is installed on
the computer, and the Azure AD Connect Health for Sync monitoring agent does not
fully support this update.
The following .NET Framework update would cause the high CPU issue by the
monitoring agent.
Resolution
This article provides information about troubleshooting a problem in which your identity
sync client cannot authenticate to Microsoft Azure Active Directory if there is an
unauthenticated proxy server.
Symptoms
If your environment includes an unauthenticated proxy server, your identity sync client
may not authenticate to Microsoft Azure Active Directory.
For example, you experience this issue when you use an identity sync client such as
Azure AD Connect, Azure Active Directory Sync Services (Azure AD Sync), or the Azure
Active Directory Sync Tool.
Ready to configure.
We have gathered enough information to configure Azure AD Sync and will now
create a default configuration.
When this problem occurs, an "Error 906" entry that resembles the following is logged in
the Azure AD Connect or Azure AD Sync log. This entry indicates that the identity sync
appliance tries to make a direct connection to the Internet.
Event ID: 0
Level: Error
Description:
Additionally, a Network Monitor (Netmon.exe) trace indicates that the Microsoft Online
Services Sign-in Assistant uses the proxy and accesses login.microsoftonline.com .
Cause
This problem occurs because the Microsoft .NET Framework on which your identity sync
appliance is based doesn't recognize your proxy settings.
Resolution
To fix this issue, follow these steps:
7 Note
More information
For more information, see Error on .NET client that consumes a web service through an
HTTP proxy server .
Original product version: Cloud Services (Web roles/Worker roles), Azure Active
Directory, Microsoft Intune, Azure Backup, Office 365 Identity Management
Symptoms
After you enter your enterprise admin credentials in the Microsoft Azure Active
Directory Sync Tool Configuration Wizard, you receive the following error message:
Cause
This issue typically occurs when the computer on which you're running the Directory
Sync tool can't authenticate with Active Directory.
Resolution
To resolve this issue, use one or more of the following methods:
This article describes a known issue in the SQLLocalDB utility that can prevent the
ADSync service from starting because of a corrupted Model database. This issue mainly
affects Azure Active Directory (Azure AD) Connect 2.x servers that run on a Microsoft
SQL Server 2019 LocalDB.
The issue is caused by a bug in the SQL Server backup logic that creates an inconsistent
state in the SQL Server Model database start page. After a backup occurs, the Model
database is set to FULL recovery mode ( dbi_status == 0x40010000), and the
dbi_dbbackupLSN (the log sequence number (LSN) for the database backup) is set to a
value that points to a log file. However, the actual recovery mode that is governed by
the Master database is SIMPLE .
In SIMPLE recovery mode, database logs are truncated automatically. In FULL recovery
mode, logs are truncated only after a backup. When SQLLocalDB is restarted after the
log file is truncated, it detects a backup LSN that's earlier than the earliest log file.
Therefore, it won't start the service.
Review the guidance in the next sections to learn how to do the following tasks:
Correctly identify whether the Azure AD Connect service (ADSync) doesn't start
because of Model database corruption.
Mitigate the issue by recovering the Model database from a corrupted state.
Apply a permanent fix to make sure that this Model database corruption doesn't
occur again.
Symptoms
You can verify that the issue is based on the following events in the Azure AD Connect
server:
Output
WaitForMultipleObjects
575
{Application Error}
3714
Output
0x8023044a
Output
Mitigation
) Important
Only apply the mitigation steps that are described here if all of these conditions
occur:
The version of Azure AD Connect is 2.0.x.x.
To recover the Model database from a corrupted state, follow these steps:
C:\Users\<service account>\
C:\Users\ADSyncMSAxxxx$\
C:\Windows\ServiceProfiles\ADSync\
2. Open the error.log file from the ADSync2019 instance folder in the following
directory path:
3. Find the following error entry in the log to verify that the Model database is
corrupted:
Output
4. If error "9003" exists in this entry, rename the model.mdf and modellog.ldf files in
this folder to old_model.mdf and old_modellog.ldf, respectively.
6. Copy the model.mdf and modellog.ldf files to the ADSync2019 instance folder from
step 2.
To prevent the corruption issues in the SQLLocalDB Model database, install the latest
Azure AD Connect build, which is available at Azure AD Connect: Version release history.
Original product version: Cloud Services (Web roles/Worker roles), Azure Active
Directory, Microsoft Intune, Azure Backup, Office 365 Identity Management
Symptoms
When you try to install the Microsoft Azure Active Directory Sync Tool, you may receive
the following error message:
Cause
This issue may occur if the computer isn't joined to an Active Directory Domain Services
(AD DS) domain or if the computer doesn't register a host (A) resource record with its
Domain Name System (DNS).
Resolution
To resolve this issue, use one of the following methods.
1. On the computer that you want to join to a domain, select Start, select Control
Panel, and then double-click System.
2. Under Computer name, domain, and workgroup settings, select Change settings.
3. On the Computer Name tab, select Change.
4. Under Member of, select Domain, type the name of the domain that this
computer will join, and then select OK.
5. Select OK, and then restart the computer.
Method 2: Computer is already joined to an AD DS
domain
If the computer is already joined to an AD DS domain, make sure that the computer's
DNS settings are correct and that a host (A) resource record for the computer is
registered with DNS. To do this, follow these steps:
2. Right-click the network connection that you want to set up, and then select
Properties.
3. Do one of the following, as appropriate for the connection that you want to set up:
For a local area connection: On the General tab, select Internet Protocol
(TCP/IP), and then select Properties.
For all other connections: On the Networking tab, select Internet Protocol
(TCP/IP), and then select Properties.
4. If you want to obtain DNS server addresses from a Dynamic Host Configuration
Protocol (DHCP) server, select Obtain DNS server address automatically.
5. If you want to configure DNS server addresses manually, select Use the following
DNS server addresses. In the Preferred DNS server box, type the IP addresses of
the preferred DNS server. In the Alternate DNS server box, type the IP addresses
of the alternative DNS server.
7. At a command prompt, type the following commands, and press ENTER after each
command:
Console
ipconfig /flushdns
Console
ipconfig /registerdns
8. If the issue isn't resolved, restart the computer that has Directory Sync Tool
installed.
9. If the issue still isn't resolved, make sure that the computer that has the Directory
Sync Tool is installed can communicate with the computer that's running AD DS.
Symptoms
When users are synced to Azure Active Directory (Azure AD), a number is added to their
UPN and SMTP proxy address. For example: john1234@contoso.onmicrosoft.com .
7 Note
When users are created in Azure AD, their user principal name (UPN) will also be
used as one of the SMTP proxy addresses. Therefore, the SMTP proxy address will
also contain the number.
There is an error on one or more user accounts. To see which users are affected and
the detailed error message, select the "users with errors" view, and then click the
user's display name.
[DIRSYNC ERROR]: This User has been synced to your Azure Active Directory, but we
had to modify the UserPrincipalName property from john@contoso.com to
john1234@contoso.onmicrosoft .com because an existing user, john@contoso.com , was
This object has been updated in your Azure Active Directory, but with some
modified properties, because the following attributes are associated with another
object [ProxyAddresses SMTP: john@contoso.com ;].
This object has been updated in your Azure Active Directory, but with some
modified properties, because the following attributes are associated with another
object [UserPrincipalName john@contoso.com ;].
Resolution
To resolve this issue, find the users who have duplicate UPNs, and then change the
UPNs so that they are unique. To do this, follow these steps.
To resolve duplicate attributes by using the IdFix Tool, see "Duplicate" is displayed in the
ERROR column .
For more information about the IdFix tool, go to IdFix DirSync Error Remediation Tool .
2. In the Microsoft 365 admin center, go to Users, and then select Active users.
A warning at the top of the page is displayed if there are duplicate attribute
conflicts on any object in your organization.
3. Select an object to view details about the conflict. This information is displayed in
the lower-right corner of the page.
This article describes how to increase the Active Directory directory service quota for
directory synchronization in an Office 365, Azure, or Microsoft Intune environment.
Original product version: Cloud Services (Web roles/Worker roles), Azure Active
Directory, Microsoft Intune, Azure Backup, Office 365 User and Domain Management
Symptoms
You receive an email message from MSOnlineServicesTeam@MicrosoftOnline.com that
contains the following error message:
Error 016: Synchronization has been stopped. This company has exceeded the
number of objects that can be synchronized. Contact Microsoft Online Services
Support.
7 Note
This article can also be used if you just want to request to increase the directory
service quota in case you're planning to have more than the allowed number of
objects in a Microsoft cloud service such as Office 365, Azure, or Microsoft Intune,
and you don't use Active Directory synchronization. The current directory service
quota in Azure Active Directory (Azure AD) is 50,000 objects.
Cause
This issue occurs because the number of objects that you created in your Azure AD
exceed your directory service limit. Azure AD limits how many objects can be created by
each organization. Groups, contacts, and user objects in your Azure AD organization are
counted as part of your organization's directory usage.
Your default directory service quota is calculated according to the following guidelines:
If you don't have any verified domains, the current directory service quota in Azure
AD is 50,000 objects.
If you have at least one verified domain, the default directory service quota in
Azure AD is 300,000 objects.
Resolution
When the number of groups, contacts, and user objects in your on-premises Active
Directory exceed your directory service quota, you can request an increase to the
directory service quota limitation for your company. This increase lets you sync more
objects than the current default limit when you use directory synchronization.
To continue to create objects in your organization, you must either add a domain or
request an increase to your directory service quota. To do this, use the following
methods.
Method 1
If you don't have a verified domain, you must add a domain to increase your quota limit
to 300,000 objects. For more information, see Add your domain .
Method 2
If you have more than 300,000 objects in your on-premises Active Directory directory
service, to increase the number of objects that can be synced beyond 300,000, contact
Microsoft Support.
More information
A directory service quota is implemented by using the cloud service as a method to limit
the maximum number of objects that can be created and owned by a single security
principal. All objects that are synced by using directory synchronization to a company
have the creator/owner value set to the default admins group for that company. For
example, the admins group is set as follows: admins@contoso1.microsoftonline.com .
Therefore, this configuration prevents users from creating an unlimited number of
objects by using directory synchronization. If a company has a legitimate need to sync
more than the directory service quota limit, submit a service request to technical
support.
Answer 1: Yes.
Answer 2: Yes. When a cloud service customer deletes an object from an online
company, the deleted object is put into a deleted objects container in the directory
service. The object remains in the deleted objects container until the tombstone lifetime
expires. The expiration is currently set to 30 days.
For example, consider the following scenario. An online company is evaluating a cloud
service by using a nonproduction on-premises Active Directory environment. The cloud
service organization was created before October 5, 2011, and the default sync limit is
10,000 objects. The company performs a bulk sync of 8,000 group objects and contact
objects by using the Directory Sync tool. Later, the online company decides to do the
following:
1. Delete those group objects and contact objects from the company's on-premises
nonproduction Active Directory DS environment.
2. Add 8,000 user objects to its on-premises nonproduction Active Directory DS
environment.
3. Sync the updates to its online company.
The 8,000 group objects and contact objects are moved to the deleted objects container
in the directory service. And these objects continue to consume up to 25 percent of the
online company quota until they are permanently removed after the 30-day tombstone
period. (This percentage is equal to 2,000 objects, or 8,000 × 25 percent.) Therefore,
after syncing the 5,000 new user objects, the online company will consume 10,000
objects of its available Active Directory quota, 2,000 from deleted objects plus 8,000
from new user objects. During the 30-day tombstone period (and this period may
coincide with the online company evaluation period), the online company may be
unable to add any additional objects by using directory synchronization. This condition
occurs because the online company's directory service quota has been reached.
In this scenario, the online company that's performing the evaluation of the cloud
service must reduce the number of objects in its nonproduction on-premises Active
Directory DS environment to complete the product evaluation. However, if the online
company can't reduce the number of objects, the company must request an increase in
its directory service quota.
Question 3: Does having more than one verified domain mean that I can have a quota
that's higher than 300,000 objects?
Answer 3: No. You're granted a directory quota of 300,000 objects if you have one or
more verified domains. You're not granted a quota of 300,000 objects for each verified
domain that you register.
Original product version: Cloud Services (Web roles/Worker roles), Azure Active
Directory, Microsoft Intune, Azure Backup, Office 365 Identity Management
Symptoms
Consider the following scenario:
In this scenario, the linked object isn't removed from Azure AD.
Cause
This issue may occur if one of the following conditions is true:
Resolution
To fix this issue, follow these steps:
2. Check that directory synchronization occurred correctly. For more information, see
Verify directory synchronization .
3. If sync is working correctly but the Active Directory object deletion is still not
propagated to Azure AD, manually remove the orphaned object. To do so, use one
of the following cmdlets in Azure Active Directory Module for Windows
PowerShell:
PowerShell
Remove-MsolContact
PowerShell
Remove-MsolGroup
PowerShell
Remove-MsolUser
PowerShell
This article resolves an issue that one or more Active Directory Domain Services (AD DS) object
attributes don't sync to Azure Active Directory (Azure AD) through the Azure Active Directory Sync tool.
Original product version: Cloud Services (Web roles/Worker roles), Azure Active Directory, Microsoft
Intune, Azure Backup, Office 365 Identity Management
Symptoms
One or more AD DS objects or attributes don't sync to Microsoft Azure AD as expected. When Active
Directory synchronization runs, an object doesn't sync, and you experience one of the following
symptoms:
You receive an error message that states that an attribute has a duplicate value.
You receive an error message that states that one or more attributes violate formatting
requirements such as character set or character length.
You don't receive an error message, and directory synchronization seems to be completed.
However, some objects or attributes aren't updated as expected.
A synchronized object with the same proxy address already exists in your Microsoft Online Services
directory.
Unable to update this object in Microsoft Online Services because the following attributes
associated with this object have values that may already be associated with another object in your
local directory.
Cause
This issue occurs for one of the following reasons:
One or more object attributes that require a unique value have a duplicate attribute value (such as
the proxyAddresses attribute or the U serPrincipalName attribute) in an existing user account.
One or more object attributes violate formatting requirements that restrict the characters and the
character length of attribute values.
One or more object attributes match exclusion rules for directory synchronization.
The following table shows the default sync scoping rules:
Mail-enabled groups
proxyAddresses
Has no "SMTP:" address entry
and
and
isCriticalSystemObject Is present
and
contains "}"
and
contains "}"
The user principal name (UPN) was changed after the initial synchronization and must be updated
manually.
Exchange Online Simple Mail Transfer Protocol (SMTP) addresses of synced users aren't populated
appropriately in the on-premises Active Directory schema.
Resolution
To resolve this issue, use one of the following methods, as appropriate for your situation.
If you see "Blank" in the ERROR column after you run IdFix, the displayName attribute of the
object isn't defined. To resolve this issue, specify a value for the displayName attribute of the
object using these steps:
1. In the UPDATE column for the object, type the name of its displayName attribute.
2. In the ACTION column, click EDIT, and then click Apply.
3. Repeat steps 1 and 2 for each object that has a "blank" entry in the ERROR column.
4. Run IdFix again to look for more object errors.
If you see "Duplicate" in the ERROR column after you run IdFix, two or more objects have the
same email address. To resolve this problem, specify a unique email address for the object using
these steps:
1. In the UPDATE column for the object, type an email address that isn't already used.
2. In the ACTION column, click EDIT, and then click Apply.
3. Run IdFix again to look for more object errors.
1. Determine the unique attributes of the on-premises AD DS user account. To do it, on a computer
that has Windows Support Tools installed, follow these steps:
a. Select Start, select Run, type ldp.exe, and then select OK.
b. Select Connection, select Connect, type the computer name of an AD DS domain controller,
and then select OK.
d. Select View, select Tree View, select the AD DS domain in the BaseDN drop-down list, and
then select OK.
e. In the navigation pane, locate and then double-click the object that isn't syncing correctly. The
Details pane on the right side of the window lists all object attributes. The following example
shows the object attributes:
f. Record the values of the userPrincipalName attribute and each SMTP address in the multivalue
proxyAddresses attribute. You'll need these values later.
2. Each
distinct
proxy
address
value is
indicated
by a
semicolon
(;).
3. The
primary
SMTP proxy
address
value is
indicated
by
uppercase
"SMTP:"
userPrincipalName 7628376@contoso.com
7 Note
Ldp.exe is included in Windows Server 2008 and in the Windows Server 2003 Support
Tools. The Windows Server 2003 Support Tools are included in the Windows Server 2003
installation media. Or, to obtain the Support Tools, go to the following Microsoft website:
Windows Server 2003 Service Pack 2 32-bit Support Tools
2. Connect to Azure AD by using the Azure Active Directory Module for Windows PowerShell. For
more info, go to Manage Azure AD using Windows PowerShell.
Leave the console window open. You'll need to use it in the next step.
3. Check for the duplicate userPrincipalName attributes.
In the console connection that you opened in step 2, type the following commands in the order in
which they are presented. Press Enter after each command:
PowerShell
7 Note
PowerShell
Leave the console window open. You'll use it again in the next step.
4. Check for duplicate proxyAddresses attributes. In the console connection that you opened in step
2, run the following command:
PowerShell
Import-Module ExchangeOnlineManagement
5. For each proxy address entry that you recorded in step 1f, type the following commands in the
order in which they are presented. Press Enter after each command:
PowerShell
7 Note
PowerShell
Items that are returned after you run the commands in step 3 and 4 represent user objects that weren't
created through directory synchronization and that have attributes that conflict with the object that
isn't syncing correctly.
After a specific attribute value is identified, edit the attribute value using one of these methods:
Use the Active Directory Users and Computers tool to edit the attribute value.
1. Open Active Directory Users and Computers, and then select the root node of the AD DS domain.
2. Select View, and then make sure that the Advanced Features option is selected.
3. In the left navigation pane, locate the user object, right-click it, and then select Properties.
4. On the Object Editor tab, locate the attribute that you want. Select Edit, and then edit the
attribute value to the value that you want.
5. Select OK two times.
Use Active Directory Service Interfaces (ADSI) Edit to update object attributes in AD DS.
You can
download and install ADSI Edit as a part of the Windows Server Toolkit. To use ADSI Edit to edit
attributes, follow these steps.
2 Warning
This procedure requires ADSI Edit. Using ADSI Edit incorrectly can cause serious problems that
may require you to reinstall your operating system. Microsoft cannot guarantee that problems that
result from the incorrect use of ADSI Edit can be resolved. Use ADSI Edit at your own risk.
1. Select Start, select Run, type ADSIEdit.msc, and then select OK.
2. Right-click ADSI Edit in the navigation pane, select Connect to, and then select OK to load the
domain partition.
3. Locate the user object, right-click it, and then select Properties.
4. In the Attributes list, locate the attribute that you want. Select Edit, and then edit the attribute
value to the value that you want.
5. Select OK two times, and then exit ADSI Edit.
Create a new group and add it to the built-in group that's not
being synced
To resolve the issue in the scenario that some built-in groups (such as the Domain Users group) aren't
synced, create a new group that contains all the applicable members and appropriate permissions of
the built-in group. Then, add that group as a member to the built-in group that's not synced. Use the
new group instead of the built-in group to manage members. By using this method, you still manage
only one group.
You don't want to change the attributes of the built-in group or change the scoping rules of the
identity sync appliance to allow critical system objects to be synced. It may trigger other unexpected
behavior.
1. Install Azure Active Directory V2 PowerShell Module. For more information, see Azure Active
Directory V2 PowerShell Module .
2. Run the following cmdlets at the Azure Active Directory V2 PowerShell prompt:
PowerShell
$cred = get-credential
7 Note
PowerShell
Connect-AzureAD
PowerShell
On-premises Active Example On-premises Active Example Exchange Online email addresses
Directory attribute name Directory attribute value
On-premises Active Example On-premises Active Example Exchange Online email addresses
Directory attribute name Directory attribute value
The Microsoft Online Email Routing Address (MOERA) entry that's associated with the default domain
(such as user1@contoso.onmicrosoft.com ) is an interpreted value that's based on a user account's alias.
This specialty email address is inextricably linked to each Exchange Online recipient. You can't manage,
delete, or create additional MOERA addresses for any recipient. However, the MOERA address can be
over-ridden as the primary SMTP address by using the attributes in the on-premises Active Directory
user object.
7 Note
The presence of data in the proxyAddresses attribute completely masks data in the mail attribute
for Exchange Online email address population.
7 Note
The presence of data in the proxyAddresses attribute, the mail attribute, or both attributes
completely mask UserPrincipalName data for Exchange Online email address population. The UPN
can be used to manage email addresses. However, an admin can decide to manage the email
address and UPN separately by populating proxyAddresses or mail attributes.
We highly recommend that one of these attributes is used consistently to manage Exchange Online
email addresses for synced users.
More information
The Windows PowerShell commands that are mentioned in this article require the Azure Active
Directory Module for Windows PowerShell. For more information about the Azure Active Directory
Module for Windows PowerShell, see the following article:
List of Attributes that are Synced by the Azure Active Directory Sync Tool
This article discusses an issue in which Azure AD Connect Health shows outdated
information about the on-premises Azure AD Connect server.
Symptoms
Azure AD Connect Health blade no longer shows up-to-date information (for example,
synchronization errors) about the on-premises Azure AD Connect server. In some cases,
the Azure AD Connect Health Insight Service that is running on the Azure AD Connect
server crashes and generates the following Windows Application event:
Level: Error
Keywords: Classic
User: N/A
Computer: XXXXXXX
To verify that an existing Azure AD Connect server has a version compatibility issue
between the two applications, follow these steps:
1. Get the version of the applications from the Programs item in Control Panel.
Resolution
To resolve this issue, use one of the following methods.
Method 1
Manually upgrade your Azure AD Connect server to version 1.1.649.0 or a later version.
During the manual upgrade, both applications will be upgraded to the versions that are
compatible with each other.
For more information about how to upgrade Azure AD Connect server, see the following
Azure article: Azure AD Connect: Upgrade from a previous version to the latest
Method 2
Manually reinstall Health Agent for Sync to a version that is compatible with the
Synchronization Service version that is installed on the Azure AD Connect server. For
example, you have an existing Azure AD Connect server that has Synchronization Service
version 1.1.647.0 and Health Agent for Sync version 3.0.68.0. To resolve the
incompatibility issue, you can reinstall Health Agent for Sync version 3.0.129.0.
1. Determine the version of Health Agent that is compatible with the version of Azure
AD Connect Synchronization Service that you have installed. If you have Azure AD
Connect Synchronization Service version 1.1.647.0 or a later version, use Health
Agent Version 3.0.129.0.
7 Note
) Important
PowerShell
Register-AzureADConnectHealthSyncAgent -AttributeFiltering:$false -
StagingMode:$false
e. When you are prompted for credentials, provide your Azure AD Global Admin
credentials.
f. Wait about two hours, and then verify that the Health panel is showing up-to-
date information about Sync.
This article describes an issue in which password hash synchronization stops working in
an Azure environment. This occurs after you update your global administrator
credentials in Microsoft Forefront Identity Manager (FIM).
Original product version: Azure Active Directory, Cloud Services (Web roles/Worker
roles), Microsoft Intune, Azure Backup, Office 365 Identity Management
Symptoms
After you update your global administrator credentials in FIM for directory
synchronization, password hash synchronization stops working. Additionally, one of the
following events may be logged in the Application log in Event Viewer:
655 Directory Synchronization Error The user name or password is incorrect. Verify
your user name, and then type your password
again.
More information
Alternatively, you can restart the Forefront Identity Manager Synchronization Service. To
do this, follow these steps:
This article describes an issue in which password isn't synced from Azure AD to on-
premises directory after the password is changed or reset.
Symptoms
When a password reset or a password change action is performed, the password isn't
synchronized from Azure Active Directory (Azure AD) to the on-premises directory using
Azure AD Connect.
Additionally, you may see the following message, or the password will not write back to
your on-premises directory:
We're sorry but we cannot reset your password at this time. This is due to a
temporary connectivity issue, so if you try again later, resetting your password may
succeed. If the issue persists, please contact your admin to reset your password for
you.
Cause
This issue can occur for many reasons. The following is a list of known causes:
Resolution
Before troubleshooting this issue, it's important to know which scenarios allow password
writeback. The following table lists scenarios in which password writeback occurs and
doesn't occur.
Scenario Password
writeback
Admins who perform password resets by using the Azure Management Portal Yes
Admins who perform password resets by using the Microsoft 365 admin center No
Original product version: Cloud Services (Web roles/Worker roles), Azure Active
Directory, Microsoft Intune, Azure Backup, Office 365 Identity Management
Symptoms
Password hash synchronization for Microsoft Azure Active Directory stops working after
several days. Additionally, in Event Viewer, the following event ID 611 error is logged in
the Application log:
Resolution
Install the latest version of the Azure Active Directory Synchronization tool. For more
information, see Install or upgrade the Directory Sync tool.
More information
You may see one or more of the following error details for Event ID 611.
Microsoft.Online.PasswordSynchronization.
Windows Server Update to
SynchronizationManagerException: Recovery task failed. ---> 2003 domain the latest
Microsoft.Online.PasswordSynchronization.
controllers version of
DirectoryReplicationServices.DrsException: RPC Error 8439: The handle certain Azure AD
distinguished name specified for this replication operation is scenarios Connect to
invalid. There was an error calling _IDL_DRSGetNCChanges . unexpectedly. resolve this
issue.
Description Cause More
information
Microsoft.Online.PasswordSynchronization.
It's a known Update to
DirectoryReplicationServices.DrsException: RPC Error 8593: The issue that was the latest
directory service cannot perform the requested operation fixed in Azure version of
because the servers involved are of different replication epochs Active Directory Azure AD
(which is related to a domain rename that is in progress). Sync tool build Connect to
1.0.6455.0807. resolve this
issue.
System.ArgumentException: An item with the same key has It's a known Update to
already been added. issue that was the latest
fixed in Azure version of
Active Directory Azure AD
Sync tool build tool to
1.0.6455.0807. resolve this
issue.
Description Cause More
information
DeltaSynchronizationTask.SynchronizeCredentialsToCloud()
at Microsoft.Online.PasswordSynchronization.
PasswordSynchronizationTask.SynchronizeSecrets()
at Microsoft.Online.PasswordSynchronization.
SynchronizationExecutionContext.SynchronizeDomain()
at Microsoft.Online.PasswordSynchronization.
SynchronizationManager.SynchronizeDomain(
SynchronizationExecutionContext syncExecutionContext).
This article describes how the proxyAddresses attribute is populated in Azure Active
Directory (Azure AD) and discusses common scenarios to help you understand how the
proxyAddresses attribute is populated in Azure AD.
Set or update the Primary SMTP address and additional secondary addresses
based on the on-premises ProxyAddresses or UserPrincipalName.
Set or update the Mail attribute based on the calculated Primary SMTP address.
Set or update the MailNickName attribute based on the on-premises
MailNickName or Primary SMTP address prefix.
Discard on-premises addresses that have a reserved domain suffix, e.g.
@*.onmicrosoft.com, @*.microsoftonline.com;
Discard on-premises ProxyAddresses with legacy protocols like MSMAIL, X400, etc;
Discard malformed on-premises addresses or not compliant with RFC 5322, e.g.
missing protocol prefix "SMTP:", containing a space or other invalid character;
Remove ProxyAddresses with a non-verified domain suffix, if the user is assigned
an Exchange Online license.
Therefore, the values of the Mail and ProxyAddresses attributes for the object in Active
Directory may not be the same as the values of the ProxyAddresses attribute in Azure
AD.
Terminology
The following terminology is used in this article:
Initial domain: The first domain provisioned in the tenant. For example,
Contoso.onmicrosoft.com .
Microsoft Online Email Routing Address (MOERA): The address constructed from
the user's userPrincipalName prefix, plus the initial domain suffix, which is
automatically added to the proxyAddresses in Azure AD. For example,
smtp:john.doe@Contoso.onmicrosoft.com .
UserPrincipalName (UPN): The sign-in address of the user.
Primary SMTP address: The primary email address of an Exchange recipient object,
including the SMTP protocol prefix. For example, SMTP:john.doe@Contoso.com .
Secondary smtp address: Additional email address(es) of an Exchange recipient
object. For example, smtp:john.doe@Contoso.com .
Mail attribute: Holds the primary email address of a user, without the SMTP
protocol prefix. For example, john.doe@Contoso.com .
MailNickName attribute: Holds the alias of an Exchange recipient object. For
example, john.doe .
AD:userPrincipalName : user1upn@Contoso.com
Next, it's synchronized to Azure AD and only the mailNickName attribute is populated
by using the prefix of the UPN, because it's a mandatory attribute:
AAD:mailNickName : user1upn
AAD:UserPrincipalName : user1upn@Contoso.com
Then, it's assigned an Exchange Online license. In this scenario, the following operations
are performed due to proxy calculation:
Set the primary SMTP address in the proxyAddresses attribute by using the UPN
value.
Populate the mail attribute by using the primary SMTP address.
Add the MOERA as a secondary smtp address in the proxyAddresses attribute, by
using the format of mailNickName@initial domain.
The following attributes are set in Azure AD on the synchronized user object with
Exchange Online license:
AAD:mail : user1upn@Contoso.com
AAD:mailNickName : user1upn
AAD:proxyAddresses : {smtp:user1upn@Contoso.onmicrosoft.com;
SMTP:user1upn@Contoso.com}
AAD:userPrincipalName : user1upn@Contoso.com
AD:mail : user2mail@Contoso.com
AD:userPrincipalName : user2upn@Contoso.com
Next, it's synchronized to Azure AD and the following operations are performed due to
proxy calculation:
Set the primary SMTP using the same value of the mail attribute.
Populate the mailNickName attribute by using the primary SMTP address prefix.
Populate the mail attribute by using the primary SMTP address.
The following attributes are set in Azure AD upon initial user provisioning:
AAD:mail : user2mail@Contoso.com
AAD:mailNickName : user2mail
AAD:proxyAddresses : {SMTP:user2mail@Contoso.com}
AAD:userPrincipalName : user2upn@Contoso.com
Then, it's assigned an Exchange Online license. In this scenario, the following operation
is performed as a result of proxy calculation:
The following attributes are set in Azure AD on the synchronized user object with
Exchange Online license:
AAD:mail : user2mail@Contoso.com
AAD:mailNickName : user2mail
AAD:proxyAddresses : {smtp:user2upn@Contoso.com;
smtp:user2mail@Contoso.onmicrosoft.com; SMTP:user2mail@Contoso.com}
AAD:userPrincipalName : user2upn@Contoso.com
AD:userPrincipalName : user3upn@Contoso.com
Next, it's synchronized to Azure AD and assigned an Exchange Online license. In this
scenario, the following operation is performed as a result of proxy calculation:
Discard addresses that have a reserved domain suffix. In this example, the
following addresses are skipped:
smtp:user3pa2@Contoso.onmicrosoft.com
smtp:user3pa3@Fabrikam.microsoftonline.com
Set the primary SMTP using the same address that's specified in the on-premises
proxyAddresses attribute.
Populate the mailNickName attribute by using the primary SMTP address prefix.
Populate the mail attribute by using the primary SMTP address.
Add the MOERA as a secondary smtp address in the proxyAddresses attribute, by
using the format of mailNickName@initial domain.
Add the UPN as a secondary smtp address in the proxyAddresses attribute.
The following attributes are set in Azure AD on the synchronized user object:
AAD:mail : user3pa1@Contoso.com
AAD:mailNickName : user3pa1
AAD:proxyAddresses : {smtp:user3upn@Contoso.com;
smtp:user3pa1@Contoso.onmicrosoft.com; SMTP:user3pa1@Contoso.com}
AAD:userPrincipalName : user3upn@Contoso.com
Then, you change the values of the on-premises proxyAddresses attribute to the
following ones:
AD:userPrincipalName : user3upn@Contoso.com
Discard addresses that have a reserved domain suffix. For example, the following
addresses are skipped:
smtp:user3new2@Contoso.onmicrosoft.com
smtp:user3new3@Fabrikam.microsoftonline.com
Replace the new primary SMTP address that's specified in the proxyAddresses
attribute.
Update the mail attribute by using the value of te new primary SMTP address
specified in the proxyAddresses attribute.
Keep the old mailNickName since the on-premises mailNickName is not set nor its
value have changed.
Keep the old MOERA as a secondary smtp address in the proxyAddresses attribute.
Keep the UPN as a secondary SMTP address in the proxyAddresses attribute.
The following attributes are set in Azure AD on the synchronized user object:
AAD:mail : user3new1@Contoso.com
AAD:mailNickName : user3pa1
AAD:proxyAddresses : {SMTP:user3new1@Contoso.com;
smtp:user3upn@Contoso.com; smtp:user3pa1@Contoso.onmicrosoft.com}
AAD:userPrincipalName : user3upn@Contoso.com
AD:userPrincipalName : user4upn@Contoso.com
Next, it's synchronized to Azure AD and assigned an Exchange Online license. In this
scenario, the following operation is performed as a result of proxy calculation:
Set the primary SMTP address in the proxyAddresses attribute by using the UPN
value.
Populate the mailNickName attribute by using the primary SMTP address prefix.
Populate the mail attribute by using the primary SMTP address.
Add the MOERA as a secondary smtp address in the proxyAddresses attribute, by
using the format of mailNickName@initial domain.
The following attributes are set in Azure AD on the synchronized user object:
AAD:mail : user4upn@Contoso.com
AAD:mailNickName : user4upn
AAD:proxyAddresses : {smtp:user4upn@Contoso.onmicrosoft.com;
SMTP:user4upn@Contoso.com}
AAD:userPrincipalName : user4upn@Contoso.com
Then, you remove the Exchange Online license and the following operation is performed
as a result of proxy calculation:
AAD:mail : user4upn@Contoso.onmicrosoft.com
AAD:mailNickName : user4upn
AAD:proxyAddresses : {SMTP:user4upn@Contoso.onmicrosoft.com}
AAD:userPrincipalName : user4upn@Contoso.com
Then, you add a secondary smtp address in the on-premises proxyAddresses attribute:
AD:userPrincipalName : user4upn@Contoso.com
When the object is synchronized to Azure AD, the following operation is performed as a
result of proxy calculation:
AAD:mail : user4upn@Contoso.onmicrosoft.com
AAD:mailNickName : user4upn
AAD:proxyAddresses : {smtp:user4upn@Contoso.com;
smtp:user4new@Contoso.com; SMTP:user4upn@Contoso.onmicrosoft.com}
AAD:userPrincipalName : user4upn@Contoso.com
AD:userPrincipalName : user5upn@Contoso.com
Next, it's synchronized to Azure AD and assigned an Exchange Online license. In this
scenario, the following operation is performed as a result of proxy calculation:
Set the primary SMTP address in the proxyAddresses attribute by using the UPN
value.
Populate the mailNickName attribute by using the primary SMTP address prefix.
Populate the mail attribute by using the primary SMTP address.
Add the MOERA as a secondary smtp address in the proxyAddresses attribute, by
using the format of mailNickName@initial domain.
The following attributes are set in Azure AD on the synchronized user object:
AAD:mail : user5upn@Contoso.com
AAD:mailNickName : user5upn
AAD:proxyAddresses : {smtp:user5upn@Contoso.onmicrosoft.com;
SMTP:user5upn@Contoso.com}
AAD:userPrincipalName : user5upn@Contoso.com
Then, you change the value of the on-premises mailNickName attribute to the following:
AD:mailNickName : user5new1
AD:userPrincipalName : user5upn@Contoso.com
Update the mailNickName attribute by using the same value as the on-premises
mailNickName attribute.
Keep the mail attribute unchanged.
Keep the proxyAddresses attribute unchanged.
The following attributes are set in Azure AD on the synchronized user object:
AAD:mail : user5upn@Contoso.com
AAD:mailNickName : user5new1
AAD:proxyAddresses : {smtp:user5upn@Contoso.onmicrosoft.com;
SMTP:user5upn@Contoso.com}
AAD:userPrincipalName : user5upn@Contoso.com
AD:userPrincipalName : user6a@Contoso.com
AD:userPrincipalName : user6b@Contoso.com
Next, they are synchronized to Office 365 and assigned an Exchange Online license. In
this scenario, the following operation is performed as a result of proxy calculation:
Set the primary SMTP address in the proxyAddresses attribute by using the UPN
value.
Populate the mailNickName attribute by using the same value as the on-premises
mailNickName attribute.
Populate the mail attribute by using the primary SMTP address.
For the first user provisioned - Add the MOERA as the secondary smtp address in
the proxyAddresses attribute, by using the format mailNickName@initial domain.
For the second user provisioned, MOERA is already in use by another object - Add
the MOERA as the secondary smtp address, by appending 4 random digits to the
mailNickName as a prefix, plus @initial domain suffix.
The following attributes are set in Azure AD on the synchronized user object:
AAD:mail : user6a@Contoso.com
AAD:mailNickName : user6mnn
AAD:proxyAddresses : {smtp:user6mnn@Contoso.onmicrosoft.com;
SMTP:user6a@Contoso.com}
AAD:userPrincipalName : user6a@Contoso.com
AAD:mail : user6b@Contoso.com
AAD:mailNickName : user6mnn
AAD:proxyAddresses : {smtp:user6mnn5236@Contoso.onmicrosoft.com;
SMTP:user6b@Contoso.com}
AAD:userPrincipalName : user6b@Contoso.com
This article describes a problem in which you receive a "Your request could not be
processed" message when you reset your password in Microsoft Azure, Office 365, or
Microsoft Intune. To resolve this problem, work with your administrator to update your
telephone number(s).
Original product version: Azure Active Directory, Microsoft Intune, Cloud Services (Web
roles/Worker roles)
Symptoms
When you try to reset your password in Microsoft Azure, Microsoft Office 365, or
Microsoft Intune, you receive the following error message:
There was an error processing your request. Please try resetting your password
again by clicking here.
If you are unable to reset your password after retrying, please contact Support for
assistance.
Cause
This problem occurs because the telephone number that we have on file may be
incorrect, and we were unable to reach you.
Resolution
To resolve this problem, work with your administrator to update your telephone
number(s).
7 Note
If available, try to use another method such as using your mobile phone, office
telephone, or mobile app.
Contact us for help
If you have questions or need help, create a support request , or ask Azure community
support.
RPC errors affecting AADConnect
Article • 04/20/2022 • 6 minutes to read
Customers may experience issues where they cannot configure AADConnect and or
enable features due to Remote Procedure Call (RPC) related errors.
Customers may also experience features previously enabled stop working due to these
types of errors.
In the vast majority of cases, the issue is affecting AADConnect and not caused by
AADConnect, so finding the exact underlying problem is crucial to correctly define
troubleshooting steps and identify the right underlying issue causing the errors.
For these types of errors, Application events include information about the RPC error
such as in the following examples:
Example 1
Snippet from the Application error event seen in the previous image:
dos
Level: Error
Keywords: Classic
User: N/A
Computer: server1.contoso.com
Details:
Microsoft.Online.PasswordSynchronization.SynchronizationManagerException:
Unable to open connection to domain: contoso.com. Error: There was an error
establishing a connection to the directory replication service. Domain
controller hostname: server1.contoso.com, domain controller IP address:
10.0.0.202 --->
Microsoft.Online.PasswordSynchronization.DirectoryReplicationServices.DrsCom
municationException: There was an error establishing a connection to the
directory replication service. Domain controller hostname:
server1.contoso.com, domain controller IP address: 10.0.0.202 --->
Microsoft.Online.PasswordSynchronization.DirectoryReplicationServices.
In this case, the RPC communication failed with error "1722 : The RPC server is
unavailable".
Troubleshooting Example 1
The error in Example 1 is a common networking related error for which troubleshooting
steps can be found in Troubleshoot TCP/IP RPC Errors.
In this scenario, investigating a network trace reveals retransmit packets being sent for
communication with destination port 135, so traffic on this port is being blocked on the
destination server.
These errors can manifest intermittently, which adds complexity to the process of
collecting data, like a network trace, for investigation and troubleshooting.
The following steps allow you to automatically collect a network trace, when the error
event id is generated.
7 Note
Download Netmon
dos
2. To stop the trace when the error is generated, send a Ping with the correct size.
Prepare the Ping Command in a script (cmd file for instance) that you execute
when the AADConnect throws the Error in Event log.
Ping command:
dos
3. Attach a task that runs the cmd file created in the previous step to the event that is
generated when the issue reproduces. That will trigger the ping command that
stops the trace.
Example 2
Snippet from the Application error event seen in the previous image:
dos
Level: Error
Keywords: Classic
User: N/A
Computer: server1.contoso.com
Details:
Microsoft.Online.PasswordSynchronization.SynchronizationManagerException:
Recovery task failed. --->
Microsoft.Online.PasswordSynchronization.DirectoryReplicationServices.
DrsException: RPC Error 8333 : Directory object not found. There was an
error calling _IDL_DRSGetNCChanges.
It's important to note the error number for appropriate investigation and
troubleshooting.
Troubleshooting Example 2
In Example 2 the Remote Procedure Call returned error is 8333, an error for "Directory
object not found"
AADConnect server was not able to find the user object for which it is trying to perform
Password Hash Synchronization in Active Directory.
Example 3
Snippet from the Application error event seen in the previous image:
dos
Source: ADSync
Level: Error
Keywords: Classic
User: N/A
Computer: server1.contoso.com
ERR_: MMS(4984):
X:\bt\1016372\repo\src\dev\sync\ma\shared\inc\MAUtils.h(58): Failed getting
registry value 'ADMADoNormalization', 0x2
BAIL: MMS(4984):
X:\bt\1016372\repo\src\dev\sync\ma\shared\inc\MAUtils.h(59): 0x80070002 (The
system cannot find the file specified.): Win32 API failure: 2
BAIL: MMS(4984):
X:\bt\1016372\repo\src\dev\sync\ma\shared\inc\MAUtils.h(114): 0x80070002
(The system cannot find the file specified.)
ERR_: MMS(4984):
X:\bt\1016372\repo\src\dev\sync\ma\shared\inc\MAUtils.h(58): Failed getting
registry value 'ADMARecursiveUserDelete', 0x2
BAIL: MMS(4984):
X:\bt\1016372\repo\src\dev\sync\ma\shared\inc\MAUtils.h(59): 0x80070002 (The
system cannot find the file specified.): Win32 API failure: 2
BAIL: MMS(4984):
X:\bt\1016372\repo\src\dev\sync\ma\shared\inc\MAUtils.h(114): 0x80070002
(The system cannot find the file specified.)
ERR_: MMS(4984):
X:\bt\1016372\repo\src\dev\sync\ma\shared\inc\MAUtils.h(58): Failed getting
registry value 'ADMARecursiveComputerDelete', 0x2
BAIL: MMS(4984):
X:\bt\1016372\repo\src\dev\sync\ma\shared\inc\MAUtils.h(59): 0x80070002 (The
system cannot find the file specified.): Win32 API failure: 2
BAIL: MMS(4984):
X:\bt\1016372\repo\src\dev\sync\ma\shared\inc\MAUtils.h(114): 0x80070002
(The system cannot find the file specified.)
It's important to know that errors can be represented in their hexadecimal code, like in
this example.
You can also use the hexadecimal error code to search the error symbolic name.
The error "0x6ba" translates to an "RPC Server Unavailable" error 1722. The
troubleshooting steps used in Example 1 also apply here.
Example 4
Another example with the RPC error represented in its hexadecimal form:
In this case, the error returned "0x5" translates to an access denied error:
More information
System Error codes can be found through Error Codes.
This article describes an issue in which you receive an error message when you try to run
scripts in Azure Active Directory Module for Windows PowerShell.
Original product version: Azure Active Directory, Microsoft Intune, Azure Backup, Office
365 User and Domain Management, Office 365 Identity Management
Symptoms
When you try to run a script in Microsoft Azure Active Directory Module for Windows
PowerShell, you receive one of the following error messages:
Cause
This issue may occur if one of the following factors is true:
The PowerShell version that you are using is higher than 5.1. The Azure Active
Directory Module only works with PowerShell 3 to 5.1.
The execution policy is set to Restricted. Certain Windows PowerShell cmdlets
can't run if the policy is too restricted.
Resolution
To resolve this issue, follow these steps:
3. Set the execution policy to Unrestricted. To do it, type the following cmdlet, and
then press Enter:
PowerShell
Set-ExecutionPolicy Unrestricted
5. Set the execution policy to Restricted. To do it, type the following cmdlet, and then
press Enter:
PowerShell
Set-ExecutionPolicy Restricted
More information
To help deliver a more secure command-line administration experience, Windows
PowerShell uses "execution policies" to control how Windows PowerShell can be used.
Execution policies define the restrictions under which Windows PowerShell loads files for
execution and configuration. Windows PowerShell runs in the Restricted execution
policy by default. This mode is its most secure mode. In this mode, Windows PowerShell
operates as an interactive shell only.
Restricted is the default execution policy. This policy doesn't run scripts and is
interactive only.
AllSigned policy runs scripts. All scripts and configuration files must be signed by a
publisher that you trust. This policy opens you to the risk of running signed but
malicious scripts, after you confirm that you trust the publisher.
RemoteSigned policy runs scripts. All scripts and configuration files downloaded
from communication applications must be signed by a publisher that you trust.
These communication applications include Microsoft Outlook, Windows Internet
Explorer, Outlook Express, and Windows Messenger. This policy opens you to the
risk of running malicious scripts that aren't downloaded from these applications.
And you aren't prompted in this situation.
Unrestricted policy runs scripts. All scripts and configuration files downloaded from
communication applications run after you confirm that you understand that the file
originated from the Internet. These communication applications include Outlook,
Internet Explorer, Outlook Express, and Windows Messenger. No digital signature
is required. This policy opens you to the risk of running unsigned, malicious scripts
that are downloaded from these applications.
Original product version: Cloud Services (Web roles/Worker roles), Azure Active
Directory, Microsoft Intune, Azure Backup, Office 365 Identity Management
Symptoms
Users have to use different passwords to sign in to their work or school account in a
Microsoft cloud service such as Office 365, Microsoft Azure, or Microsoft Intune and to
log on to their computers. This problem occurs even though you've take the following
actions:
Cause
This problem occurs if users' cloud service passwords change. Password synchronization
doesn't sync the cloud service password. Therefore, users in this scenario have different
passwords for their local computer and for the cloud service.
Resolution
To resolve this problem, do one of the following:
This article describes an issue that causes slow performance and high CPU usage in
Azure AD Connect Health for Sync monitoring agent on a system that has installed .NET
Framework 4.7.2 or the July 2018 updates for .NET Framework 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1,
or 4.7.2.
Symptoms
Assume that you run the Microsoft Azure Active Directory (Azure AD) Connect Health
for Sync monitoring agent on a system that has installed .NET Framework 4.7.2 or the
July 2018 updates for .NET Framework 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, or 4.7.2. In this scenario,
the system may experience slow performance and high CPU usage.
To see the high CPU usage, start Task Manager, and view the CPU usage of the
MIcrosoft.Online.Reporting.MonitoringAgent.Startup process on the Processes tab.
Cause
This issue occurs because the Azure AD Connect Health for Sync monitoring agent does
not fully support .NET Framework 4.7.2 or the July 2018 updates for .NET Framework 4.6,
4.6.1, 4.6.2, 4.7, 4.7.1, or 4.7.2.
The following updates may cause high CPU usage of the
monitoring agent.
Resolution
To resolve this issue, install the update that is appropriate for your environment.
Install the Azure AD Connect Health Agent, version 3.1.7.0 that was released in July
2018. This update is available for [download here]/azure/active-
directory/hybrid/how-to-connect-health-agent-install#download-and-install-the-
azure-ad-connect-health-agent).
Install the latest version of Azure AD Connect that contains the fix for this high
CPU usage issue. This version is available for download here .
7 Note
If you have enabled the auto-upgrade feature on your AAD Connect server,
the latest version will be installed automatically.
Virus-scan claim
Microsoft scanned this file for viruses, using the most current virus-detection software
that was available on the date that the file was posted. The file is stored on security-
enhanced servers that help prevent any unauthorized changes to it.
This article describes how to troubleshoot problems that can occur when you upgrade
to the latest version of Azure Active Directory Connect from previous installations of
Azure AD Connect, Azure AD Sync, or DirSync.
2 Warning
You might find some online documentation that includes steps to directly edit the
Windows registry. However, editing the registry can cause serious problems if you
modify the registry incorrectly. The Microsoft Azure Active Directory Connect
product team doesn't support editing the Windows registry.
Symptoms
Every time that you start the Azure AD Connect setup wizard, the program evaluates all
the related products and Windows Installer packages (.msi) that are currently installed.
To trace this activity, follow these steps:
1. Start the Azure AD Connect wizard, and wait for the first page to open.
Output
You can find two similar symptoms near this part of the trace log:
Product was uninstalled but an inconsistent product code is still present in Windows
The wizard is detecting an old installation of the sync engine: "Product Azure AD Sync
Engine (version 1.1.343.0) is installed, needs to be upgraded to version 1.1.380.0."
Output
However, the Windows Installer information might be inconsistent after this product is
uninstalled and the sync engine is no longer present.
Because the setup wizard is still detecting an old product code, it decides to upgrade
Azure AD Sync Engine instead of doing a clean installation. Later in the upgrade process,
while the installer is checking for the current service status, the installation fails because
the ADSync service isn't present:
Output
Product was uninstalled but a stale product code is still present in Windows
A stale product code that you find in Windows Installer packages can also cause
upgrade issues.
Output
Azure AD Connect Setup wizard can't detect that an Azure AD Sync Engine is installed.
Setup fails and returns the following error message:
Output
...
--->
Microsoft.Azure.ActiveDirectory.Client.Framework.ProcessExecutionFailedExcep
tion: Exception: Execution failed with errorCode: 1603.
This error occurs because the MSIEXEC process still tries to upgrade the Azure AD Sync
Engine, as shown in the Synchronization Service_Install-20170525-155217.log file:
Output
...
As in the previous case, the Windows Installer upgrading process fails because the
ADSync service entries in the registry aren't present. The product has been previously
uninstalled, leaving the Windows Installer database inconsistent.
Solution
You can clean up the inconsistency on the Windows Installer database for the Azure AD
Sync Engine product code that's identified in the trace log. (The product code can vary.
For the previous examples, the problematic product code is 7c4397b7-9008-4c23-8cda-
3b3b8faf4312.)
After you identify the problematic product code from the trace log, use the following
methods, as appropriate.
Fix Windows Installer issues (if applicable)
The KB3139923 Windows hotfix can cause these Windows Installer issues. Therefore, we
recommend that you uninstall it.
To check whether KB3139923 is installed, go to Settings > Windows Update > Update
history. Or use PowerShell to export a list of all installed hotfixes:
PowerShell
Get-Hotfix |
1. If the KB3139923 hotfix is present, uninstall it, and then restart the server.
2. Download and install the KB3072630 Windows hotfix , and then restart again.
Use the Windows Installer command-line tool to uninstall product code
To uninstall the product code for the Azure AD Sync Engine, run the Windows Installer
command-line tool (MsiExec.exe) as follows:
1. Identify the inconsistent or stale product code from the trace log (GUID), as shown
in the "Symptoms" section.
3. Enter the following line by susbtituting the actual GUID of the problematic product
code:
cmd
SET productcode={<12345678-0000-abcd-0000-0123456789ab>}
4. Enter the following command, repeat the command, and then restart the server.
7 Note
You might see numerous reported errors because of the corrupted Windows
Installer database. For any dialog box that appears, select Yes.
cmd
SET /a counter+=1
5. Start the Azure AD Connect wizard, and wait for the first page to open.
7. If the inconsistent or stale product code is no longer present in the log file,
continue the wizard, and complete the installation. Otherwise, go to the next
solution.
The Program Install and Uninstall troubleshooter helps you automatically repair issues if
you're blocked from installing or removing programs. It also fixes corrupted registry
keys.
Fix problems that block programs from being installed or removed (microsoft.com)
After you run the tool, restart the server, and then follow these steps:
1. Start the Azure AD Connect wizard, and wait for the first page to open.
3. If the inconsistent or stale product code is no longer present in the log file,
continue the wizard, and complete the installation. If the stale product code is
present, we recommend that you reinstall the Windows operating system because
you can't recover the Windows Installer database from an inconsistent state.
This article describes how to troubleshoot Azure Active Directory Sync tool installation
and Directory Sync tool Configuration Wizard issues.
As you apply this troubleshooting method to your environment, over time, you'll be able
to do the following steps:
Prerequisites
For a better understanding of this article, first read the following prerequisite articles for
a better understanding of how to search for an object in different sources (AD, AD CS,
MV, and so on), and to understand how to check the connectors and lineage of an
object.
PowerShell
However, this can be catastrophic because it triggers a complex and lengthy back-end
operation to transfer SoA from local AD to Azure AD/Exchange Online for all the synced
objects on the tenant. This operation is necessary to convert each object from
DirSyncEnabled to cloud-only, and clean up all the shadow properties that are synced
from on-premises AD (for example, ShadowUserPrincipalName and
ShadowProxyAddresses). Depending on the size of the tenant, this operation can take
more than 72 hours. Also, it's not possible to predict when the operation will finish.
Never use this method to troubleshoot a sync issue because this will cause additional
harm and won't fix the issue. You'll be blocked from enabling DirSync again until this
disabling operation is complete. Also, after you re-enable DirSync, AADC must again
match all the on-premises objects with existent Azure AD objects. This process can be
disruptive.
The only scenarios in which this command is supported to disable DirSync are as follows:
You are decommissioning your on-premises synchronization server, and you want
to continue managing your identities entirely from the cloud instead of from
hybrid identities.
You have some synced objects in the tenant that you want to keep as cloud-only in
Azure AD and remove from on-premises AD permanently.
You are currently using a custom attribute as the SourceAnchor in AADC (for
example, employeeId), and you are re-installing AADC to start using ms-Ds-
Consistency-Guid/ObjectGuid as the new SourceAnchor attribute (or vice versa).
You have some scenarios that involve risky mailbox and tenant migration
strategies.
PowerShell
And when you're ready, manually start a sync cycle by running the following cmdlet:
PowerShell
Start-ADSyncSyncCycle
Glossary
Acronym/abbreviation Name/description
CS Connector Space
MV Metaverse
If the connection with AD is successful, but the object or attribute is not present in ADCS
(assuming the domain or object is in sync scope), the issue most likely involves ADDS
permissions. The ADCA requires ay least read permissions on the object in AD in order
to import data to ADCS. By default, the MSOL account has explicit read/write
permissions for all user, group, and computer properties. However, this situation might
still be problematic if the following conditions are true:
AADC uses a custom ADCA, but it was not provided sufficient permissions in AD.
A parent OU has blocked inheritance, which prevents propagation of permissions
from the root of the domain.
The object or attribute itself has blocked inheritance, which prevents propagation
of permissions.
The object or attribute has an explicit Deny permission that prevents ADCA from
reading it.
Connectivity with AD
In the Synchronization Service Manager, the "Import from AD" step shows which domain
controller is contacted under Connection Status. You will most likely see an error here
when there is a connectivity issue that affects AD.
If you have to further troubleshoot connectivity for AD, especially if no errors surfaced in
AADConnect server or if you are still in the process of installing the product, start by
using the ADConnectivityTool.
Invalid AD credentials. For example, the ADCA has expired or the password has
changed.
A "failed-search" error, which occurs when DirSync Control doesn't communicate
with the AD Replication Service, typically because of high-network packet
fragmentation.
A "no-start-ma" error, which occurs when there are name resolution issues (DNS)
in AD.
Other problems that can be caused by name resolution issues, network routing
problems, blocked network ports, high network packet fragmentation, no writable
DCs available, and so on. In such cases, you will likely have to involve the Directory
Services or networking support teams to help troubleshoot.
Troubleshooting summary
AD Permissions
A lack of AD permissions can affect both directions of the synchronization:
When you import from ADDS to ADCS, a lack of permissions can cause AADC to
skip objects or attributes so that AADC cannot get ADDS updates in the import
stream. This error occurs because the ADCA does not have enough permissions to
read the object.
When you export from ADCS to ADDS, a lack of permissions generates a
"permission-issue" export error.
To check permissions, open the Properties window of an AD object, select Security >
Advanced, and then examine the object's allow/deny ACLs by selecting the Disable
Inheritance button (if inheritance is enabled). You can sort the column contents by Type
to locate all the "deny" permissions. AD permissions can vary widely. However, by
default, you might only see one "Deny ACL" for "Exchange Trusted Subsystem." Most
permissions will be marked as Allow.
Authenticated Users
Everyone
SELF
The best way to troubleshoot permissions is to use the "Effective Access" feature in AD
Users and Computers console. This feature checks the effective permissions for a given
account (the ADCA) on the target object or attribute that you want to troubleshoot.
) Important
For example:
Make sure that you are making the necessary changes directly to the closest
domain controller (see the "Connectivity with AD" section):
Wait for ADDS replications to occur.
If possible, restart ADSync service to clear the cache.
Troubleshooting summary
After you verify the permissions issue, remove the ADCA from any highly privileged
groups, and provide the required AD permissions directly to the ADCA.
Engage Directory Services or a network support team to help you troubleshoot the
situation.
AD replications
This issue is less likely to affect AADConnect because it causes greater problems.
However, when AADConnect is importing data from a domain controller by using
delayed replication, it will not import the latest information from AD, which causes sync
issues in which an object or attribute that was recently created or changed in AD does
not sync to AAD because it was not replicated to the domain controller that
AADConnect is contacting. To verify that this is the issue, check the domain controller
that AADC uses for import (see "Connectivity to AD"), and use the AD Users and
Computers console to directly connect to this server (see Change Domain Controller in
the next image). Then, verify that the data on this server corresponds to the latest data,
and whether it is consistent with the respective ADCS data. At this stage, AADC will
generate a greater load on the domain controller and networking layer.
Another approach is to use the RepAdmin tool to check the object's replication
metadata on all domain controllers, get the value from all domain controllers, and check
replication status between domain controllers:
/filter:"sAMAccountName=User01" /attrs:pwdLastSet,UserPrincipalName
AD Replication Summary
repadmin /replsummary
Troubleshooting summary
This situation does not occur as commonly for users and groups. However, if all the
objects of a specific object type are missing in ADCS, it might be useful to examine
which object types enabled in ADDS Connector configuration.
You can use the Get-ADSyncConnector cmdlet to retrieve the object types that are
enabled on the Connector, as shown in the next image. The following are the
object types that should be enabled by default:
The following are the object types that should be enabled by default:
7 Note
The publicFolder object type is present only when the Mail Enabled Public
Folder feature is enabled.
In the same manner, if the attribute is missing for all objects, check whether the
attribute is selected on the AD Connector.
Troubleshooting summary
Main resources:
ADConnectivityTool
LDIFDE - Dump object from ADDS to compare data between ADDS and ADCS
LDP - Test AD Bind connectivity and permissions to read object in the security
context of ADCA
DSACLS - Compare and evaluate ADDS permissions
An object that is present in ADCS but missing in MV indicates that there were no
scoping filters on any of the provisioning sync rules that applied to that object.
Therefore, the object was not projected to MV. This issue might occur if there are
disabled or customized sync rules.
To get a list of inbound provisioning sync rules, run the following command:
Get-ADSyncRule | where {$_.Name -like "In From AD*" -and $_.LinkType -eq
You can retrieve the failing object from the ADCS by searching on "DN or Anchor"
in "Search Connector Space." On the Lineage tab, you will probably see that the
object is a Disconnector (no links to MV), and the lineage is empty. Also, check
whether the object has any errors, in case there is a sync error tab.
Select Preview > Generate Preview > Commit Preview to see whether the object
is projected to MV. If that's the case, then a full sync cycle should fix the issue for
other objects in the same situation.
Export the object to XML
For a more detailed analysis (or for offline analysis), you can collect all the
database data that's related to the object by using the Export-ADSyncObject
cmdlet. This exported information will help determine which rule is filtering out the
object. In other words, which Inbound Scoping Filter in the Provisioning Sync Rules
is preventing the object from being projected to the MV.
Connect\Tools\AdSyncTools.psm1"
Export-ADsyncObject -DistinguishedName
'CN=TestUser,OU=Sync,DC=Domain,DC=Contoso,DC=com' -ConnectorName
'Domain.Contoso.com'
Each attribute has its own set of transformations rules that are responsible for
directing the value from ADCS to MV. The first step is to identify which sync rules
contain the transformation rule for the attribute that you're troubleshooting.
The best way to identify which sync rules have a transformation rule for a given
attribute is to use the built-in filtering capabilities of the Synchronization Rules
Editor.
Each connector (or link) between the CS and MV will have a lineage that contains
information about the sync rules that are applied to that CS object. The previous
step will tell you which set of inbound sync rules (whether provisioning or joining
sync rules) must be present in the object's lineage to flow the correct value from
ADCS to MV. By examining the lineage on the ADCS object, you'll be able to
determine whether that sync rule was applied to the object.
If there are multiple connectors (multiple AD forests) linked to the MV object, you
might have to examine the Metaverse Object Properties to determine which
connector is contributing the attribute value to the attribute that you're trying to
troubleshoot. After you've identified the connector, examine the lineage of that
ADCS object.
If a sync rule is enabled but not present in the object's lineage, the object should
be filtered out by the sync rule's scoping filter. By checking the sync rule's scoping
filters, the data on the ADCS object, and whether the sync rule is enabled or
disabled, you should be able to determine why that sync rule was not applied to
the ADCS object.
If you can't determine why the sync rule missing in the ADCS object's lineage, run
a preview by using Generate Preview and Commit Preview for a full
synchronization of the object. If the attribute is updated in the MV and has a
preview, then a full sync cycle should fix the issue for other objects in the same
situation.
For a more detailed analysis or offline analysis, you can collect all the database
data that's related to the object by using the Export-ADSyncObject script. This
exported information can help you determine which sync rule or transformation
rule missing on the object that's preventing the attribute from being projected to
the MV (see the Export-ADSyncObject examples earlier in this article).
Identify the correct sync rules and transformation rules responsible for flowing the
attribute to the MV.
Check the lineage of the object.
Check whether sync rules have been enabled.
Check the scoping filters of the sync rules that are missing in the object's lineage.
An object that is present in MV but missing in AADCS indicates that there were no
scoping filters on any of the provisioning sync rules that applied to that object. For
example, see the "Out to AAD" sync rules shown in the next image. Therefore, the
object was not provisioned in AADCS. This error can occur if there are disabled or
customized sync rules.
To get a list of inbound provisioning sync rules, run the following command:
To retrieve the failing object from the MV, use a Metaverse Search, and then
examine the connectors tab. On this tab, you can determine whether the MV
object is linked to an AADCS object. Also, check whether the object has any errors,
in case a sync error tab is present.
For a more detailed analysis or offline analysis, you can collect all the database
data that's related to the object by using the Export-ADSyncObject script. This
exported information, together with the (outbound) sync rules configuration, can
help determine which rule is filtering out the object, and can determine which
outbound scoping filter in the provisioning sync rules is preventing the object from
connecting with the AADCS).
{2B4B574735713744676B53504C39424D4C72785247513D3D}' -ConnectorName
'Contoso.onmicrosoft.com - AAD'
Each attribute has its own set of transformation rules that are responsible to flow
the value from MV to AADCS. Begin by identifying which sync rules contain the
transformation rule for the attribute that you're troubleshooting.
The best way to identify which sync rules have a transformation rule for a given
attribute is to use the built-in filtering capabilities of the Synchronization Rules
Editor.
2. Check the lineage of the ADCS object
Each connector (or link) between the CS and MV will have a lineage that contains
information about the sync rules applied to that CS object. The previous step will
tell you which set of outbound sync rules (whether provisioning or joining sync
rules) must be present in the object's lineage to flow the correct value from MV to
AADCS. By examining the lineage on the AADCS object, you can determine
whether that sync rule has been applied to the object.
If a sync rule is enabled but not present in the object's lineage, it should be filtered
out by the sync rule's scoping filter. By checking the presence of the sync rule's
scoping filters, and the data on the MV object, and whether the sync rule is
enabled or disabled, you should be able to determine why that sync rule wasn't
applied to the AADCS object.
4. Run a preview on AADCS object
If you determine why the sync rule is missing from the ADCS object's lineage, run a
preview that uses Generate Preview and Commit Preview for a full
synchronization of the object. If the attribute is updated in the MV by having a
preview, then a full sync cycle should fix the issue for other objects in the same
situation.
For a more detailed analysis or offline analysis, you can collect all the database
data that's related to the object by using the "Export-ADSyncObject" script. This
exported information, together with the (outbound) sync rules configuration, can
help you determine which sync rule or transformation rule is missing from the
object that's preventing the attribute from flowing to AADCS (see the "Export-
ADSyncObject" examples earlier).
Resources
Synchronization Service Manager UI
Synchronization Rules Editor
Export-ADsyncObject script
Start-ADSyncSyncCycle -PolicyType Initial
ETW tracing SyncRulesPipeline (miiserver.exe.config)
Step 4: Synchronization between AADCS and
AzureAD
Fortunately, the issues that affect these components usually generate an error in event
logs that can be traced by Microsoft Support. Therefore, these issues are out of scope
for this article. Nevertheless, there are still some "silent" issues that can be examined.
Troubleshooting AADCS
Multiple Active AADC servers exporting to AAD
In a common scenario in which objects in Azure AD flip attribute values back and
forth, there are more than one active AADConnect servers, and one of these
servers loses contact with the local AD but is still connected to the internet and
able to export data to Azure AD. Therefore, every time that this "stale" server
imports a change from AAD on a synchronized object that's made by the other
active server, the sync engine reverts that change based on the stale AD data that's
in the ADCS. A typical symptom in this scenario is that you make a change in AD
that's synced to Azure AD, but the change reverts to the original value a few
minutes later (up to 30 minutes). To quickly mitigate this issue, return to any old
servers or virtual machines that have been decommissioned, and check whether
the ADSync service is still running.
When the Admin uses MSOnline or AzureAD PowerShell module, or if the user
goes to the Office Portal and updates the Mobile attribute, the updated phone
number will be overwritten in AzureAD despite the object being synced from on-
premises AD (also known as DirSyncEnabled).
Together with this update, Azure AD also sets a DirSyncOverrides on the object to
flag that this user has the mobile phone number "overwritten" in Azure AD. From
this point on, any update to the mobile attribute that originates from on-premises
will be ignored because this attribute will no longer be managed by on-premises
AD.
Before this feature was added, any updates to the UPN that came from on-
premises after the user was provisioned in Azure AD and assigned a license were
"silently" ignored. An admin would have to use MSOnline or Azure AD PowerShell
to update the UPN directly in Azure AD. After this feature is updated, any updates
to UPN will flow to Azure AD regardless of whether the user is licensed (managed).
7 Note
UserPrincipalName updates will work if the user is NOT licensed. However, without
the SynchronizeUpnForManagedUsers feature, UserPrincipalName changes after
the user is provisioned and is assigned a licensed that will NOT be updated in AAD.
Notice that Microsoft does not disable this feature on behalf of the customer.
Issues that involve invalid characters that don't produce any sync error are more
troublesome in UserPrincipalName and ProxyAddresses attributes because of the
cascading effect in ProxyCalc processing that will silently discard the value from
on-premises AD. This situation occurs as follows:
There is a general misconception that after you sync ThumbnailPhoto from AD for
the first time, you can no longer update it, which is only partly true.
1. Make sure that the image is correctly stored in AD and doesn't exceed the
size limit of 100 KB.
3. If the AD (or AzureAD) thumbnailPhoto has the correct image but is not
correct on other online services, the following conditions might apply:
Additional resources
Troubleshooting Errors during synchronization
Troubleshoot object synchronization with Azure AD Connect sync
Troubleshoot an object that is not synchronizing with Azure Active Directory
Azure AD Connect Single Object Sync
Contact us for help
If you have questions or need help, create a support request , or ask Azure community
support. You can also submit product feedback to Azure community support.
Troubleshoot Azure AD Certificate-
Based Authentication issues
Article • 04/20/2022 • 7 minutes to read
General requirements
Certificate-Based Authentication supports only Federated environments by using
Modern Authentication (ADAL). The one exception is Exchange ActiveSync (EAS)
for Exchange Online that can be used by Managed Accounts.
The user certificate that's issued in the user's profile requires the user's routable
email address to be listed in the Subject Alternative Name. This can be in either
the UserPrincipalName or RFC822 format. Azure AD maps the RFC822 value to the
Proxy Address attribute in the directory.
7 Note
The browser cache must be cleared before you try the connection in order for
the user to see the certificate approval prompt.
2. Type the user's email address. This redirects to the ADFS authentication page.
3. Instead of typing a password (if the forms-based authentication method is enabled
in ADFS), select Sign in using an X.509 certificate, and approve the use of the
client certificate when you are prompted.
PowerShell
Install-Module AzureAD
7 Note
PowerShell
$new_ca=New-Object -TypeName
Microsoft.Open.AzureAD.Model.CertificateAuthorityInformation
$new_ca.AuthorityType=0 $new_ca.TrustedCertificate=$cert
$new_ca.crlDistributionPoint="<CRL Distribution URL>"
New-AzureADTrustedCertificateAuthority -CertificateAuthorityInformation
$new_ca
3. Make sure that the following values are correctly defined on the
TrustedCertificateAuthority objects according to the following guidelines:
AuthorityType = IntermediateAuthority
AuthorityType = 0 = RootAuthority
AuthorityType = 1 = IntermediateAuthority
7 Note
4. Run the following commands to make sure that the ADFS settings are not set to
PromptLoginBehavior: true. Otherwise, users will be prompted to enter their user
name and password for some modern apps.
PowerShell
Connect-msolService
PowerShell
7 Note
PowerShell
7 Note
2. The Root *.CER file must be in the computer's Trusted Root Certificate
Authority\Certificates container. Also, all Intermediate *.CER files must be in the
computer's Intermediate Root Certificate Authority\Certificates container. You
can verify this by running certlm.msc or by running the following certutil.exe
commands at an elevated command prompt:
Console
Console
3. The client devices, the ADFS servers, and the Web Application Proxy must be able
to resolve the CRL endpoints that exist on the Intermediate CA *.CER and on the
user certificates that were issued to the user profile on the devices.
To verify that the ADFS servers and the Web Application Proxy can resolve these,
follow these steps:
a. Export the Intermediate CA *.CER:
i. View the computer certificate store. To do this, run certlm.msc, expand
\Intermediate Certification Authorities\Certificates, and then double-click
the Intermediate CA certificate.
ii. Click the Details tab, and then click the Copy to file button.
iii. Click Next two times and accept all the defaults in the wizard.
iv. Specify a file name and location, click Next, and then click Finish.
b. On the issuing CA, export one of the user certificates that was issued to a
device. To do this, follow these steps:
ii. In the Issued Common Name column, locate the certificate that was issued
to the user who cannot connect.
iii. Double-click the certificate, and then click the Details tab to export the
certificate to a *.CER file.
7 Note
iv. Download PSEXEC.EXE , and then copy psexec.exe together with the *.CER
files from the Intermediate CA and user to all ADFS and Web Application
Proxy servers.
Console
psexec -s -i -d cmd.exe
Console
certutil.exe -verify -urlfetch SubCA.cer >
%computername%_%username%_SubCA.txt
Console
viii. If the ADFS servers cannot resolve the HTTP URL, make sure that the Group
Managed Service Accounts that ADFS is running under has access through
the firewall and proxy. The Web Application Proxy service runs under
Network Service, so the ComputerName$ account requires access through
the firewall and proxy.
PowerShell
@RuleTemplate = "PassThroughClaims"
c:[Type ==
http://schemas.microsoft.com/ws/2008/06/identity/claims/serialnumber]
@RuleTemplate = "PassThroughClaims"
c:[Type ==
http://schemas.microsoft.com/2012/12/certificatecontext/field/issuer]
PowerShell
@RuleTemplate = "PassThroughClaims"
c:[Type ==
http://schemas.microsoft.com/ws/2008/06/identity/claims/serialnumber]
@RuleTemplate = "PassThroughClaims"
c:[Type ==
http://schemas.microsoft.com/2012/12/certificatecontext/field/issuer]
5. Because most devices that use certificate authentication are likely to be located
on the extranet (out of the corporate network), you could enable Certificate-Based
Authentication only for the extranet or also for the Intranet, as necessary. To
determine whether the "Certificate Authentication" method is enabled for either or
both options, run the following cmdlet from an elevated PowerShell command
prompt:
PowerShell
Get-AdfsAuthenticationProvider:
----------Output sample----------
AllowedForPrimaryExtranet : True
AllowedForPrimaryIntranet : True
AllowedForAdditionalAuthentication : True
AuthenticationMethods : {urn:ietf:rfc:2246,
urn:oasis:names:tc:SAML:1.0:am:X509-PKI,
urn:oasis:names:tc:SAML:2.0:ac:classes:TLSClient,
urn:oasis:names:tc:SAML:2.0:ac:classes:X509...}
Descriptions : {}
DisplayNames : {}
Name : CertificateAuthentication
IdentityClaims : {}
IsCustom : False
RequiresIdentity : False
6. TCP port 49443 must be accessible between the client device and ADFS, also
between the client device and Web Application Proxy servers. To verify that TCP
49443 is listening and bound to ADFS on the ADFS servers and Web Application
Proxy, run the following command:
Console
If the TCP port 49443 is accessible, you should see output such as the following:
Console
User: NT SERVICE\adfssrv
Listen: Yes
Delegate: Yes
SDDL: D:(A;;GA;;;S-1-5-80-2246541699-21809830-3603976364-117610243-
975697593)
https://sts.contoso.com:49443/adfs/services/trust/2005/certificatetransport
7 Note
If the endpoint is accessible and listening, the connection attempt should spin
indefinitely while it waits for an answer.
More information
Azure AD: Certificate based authentication for iOS and Android now in preview.
Get started with certificate based authentication on iOS - Public Preview
ADFS: Certificate Authentication with Azure AD & Office 365
This article helps you troubleshoot common issues that you may encounter when you synchronize passwords from the on-
premises environment to Azure Active Directory (Azure AD) by using Azure AD Connect.
Original product version: Cloud Services (Web roles/Worker roles), Azure Active Directory, Microsoft Intune, Azure Backup,
Office 365 Identity Management
Additionally, make sure that directory synchronization is in a healthy state. For more information, see Troubleshoot object
synchronization with Azure AD Connect sync.
Scenario 1: The "User must change password at next logon" check box is
selected for the user's account
To resolve this issue, follow these steps:
In the user account properties in Active Directory Users and Computers, clear the User must change password
at next logon check box.
Have the user change their on-premises user account password.
Enable the ForcePasswordChangeOnLogOn feature on the Azure AD Connect server.
2. Wait a few minutes for the change to sync between the on-premises Active Directory Domain Services (AD DS) and
Azure AD.
Scenario 2: The user changed their password in the cloud service portal
To resolve this issue, follow these steps:
To resolve this issue, use the IdFix DirSync Error Remediation Tool (IdFix) to help identify potential object-related issues in
the on-premises AD DS. You can install IdFix at the following Microsoft website: IdFix DirSync Error Remediation Tool
For more info about how to troubleshoot this issue, see One or more objects don't sync when using the Azure Active
Directory Sync tool
Scenario 4: Users are moved between filtered and unfiltered scopes
In this scenario, the user is moved to a scope that now allows the user to be synced. It could be when filtering is set up for
domains, organizational units, or attributes.
To resolve this issue, see the How to perform a full password sync section.
Scenario 5: Users can't sign in by using a new password but they can sign in by
using their old password
In this scenario, you're using the Azure AD Sync Service together with password synchronization. After you disable and
then re-enable directory synchronization, users can't sign in by using a new password. However, their old password still
works.
To resolve this issue, re-enable password synchronization. To do it, start the Azure AD sync appliance Configuration Wizard,
and then continue through the screens until you see the option to enable password synchronization.
) Important
Password sync will not start until a full directory sync has completed.
To resolve this issue, first make sure that you enable password synchronization. To do it, start the Azure AD sync appliance
Configuration Wizard, and then continue through the screens until you see the option to enable password synchronization.
After password synchronization is enabled, you must do a full password sync. See How to perform a full password sync
section.
For more information, see Troubleshoot password hash synchronization with Azure AD Connect sync.
650 Provision credentials batch start. Count: 1 Password synchronization starts retrieving updated passwords from the
on-premises AD DS.
651 Provision credentials batch end. Count: 1 Password synchronization finishes retrieving updated passwords from the
on-premises AD DS.
653 Provision credentials ping start. Password synchronization starts informing Azure AD that there are no
passwords to be synced. It occurs every 30 minutes if no passwords have
been updated in the on-premises AD DS.
654 Provision credentials ping end. Password synchronization finishes informing Azure AD that there are no
passwords to be synced. It occurs every 30 minutes if no passwords were
updated in the on-premises AD DS.
656 Password Change Request - Anchor : Password synchronization indicates that a password change was detected
H552hI9GwEykZwosf74JeOQ==, Dn : CN=Viola and tries to sync it to Azure AD. It identifies the user or users whose
Hanson,OU=Cloud Objects,DC=contoso,DC=local, password changed and will be synced. Each batch contains at least one
Change Date : 05/01/2013 16:34:08 user and at most 50 users.
657 Password Change Result - Anchor : Users whose password successfully synced.
eX5b50Rf+UizRIMe2CA/tg==, Dn : CN=Viola
Hanson,OU=Cloud Objects,DC=contoso,DC=local,
Result : Success.
657 Password Change Result - Anchor : Users whose password didn't sync.
eX5b50Rf+UizRIMe2CA/tg==, Dn : CN=Viola
Hanson,OU=Cloud Objects,DC=contoso,DC=local,
Result : Failed.
0 The following password changes User or users whose Configure directory synchronization
115 Access to Windows Azure Active Azure AD credentials were Run the Azure AD Configuration Wizard again. See
Directory has been denied. Contact updated through Forefront Password hash synchronization stops working after you
Technical Support. Identity Manager (FIM). update Azure Active Directory credentials in FIM
657 Password Change Result - Anchor : User or users whose Configure directory synchronization
0 The user name or password is incorrect. Verify your user name, and then type your password again. Azure AD Run the Azure
credentials AD
were updated Configuration
through Wizard again.
Forefront See Password
Identity hash
Manager (FIM). synchronization
stops working
after you
update Azure
Active Directory
credentials in
FIM
652 Failed credential provisioning batch. Error: Microsoft.Online.Coexistence. ProvisionRetryException : It was a known To resolve this
An error occurred. Error Code: 81. Error Description: Windows Azure Active Directory is currently issue that was issue, update to
busy. This operation will be retried automatically. fixed in Azure latest version of
Active Directory the Azure
Sync tool build Active Directory
1.0.6455.0807 Sync tool.
Event Description Cause More
ID information
655 Failed credential provisioning ping. Error: Microsoft.Online.Coexistence.ProvisionException: An error Password Configure
occurred. Error Code: 90. Error Description: Password Synchronization has not been activated for synchronization directory
this company. Tracking ID: 0744fa31-1d9b-453a-83d8-c2555d843802 Server Name: BL2GR1BBA005. failed to inform synchronization
---> Azure AD that
System.ServiceModel.FaultException1[Microsoft.Online.Coexistence.Schema.AdminWebServiceFault]: there are no One or more
Password Synchronization has not been activated for this company. (Fault Detail is equal to passwords to objects don't
Microsoft.Online.Coexistence.Schema.AdminWebServiceFault). be synced. It sync when
occurs every 30 using Azure
minutes. Active Directory
Sync tool
655 The user name or password is incorrect. Verify your user name, and then type your password again. Azure AD Run the Azure
credentials AD
were updated Configuration
through FIM. Wizard again.
See the
following
Microsoft
Knowledge
Base article:
Password hash
synchronization
stops working
after updating
Azure Active
Directory
credentials in
FIM
6900 The server encountered an unexpected error while processing a password change notification:
Azure AD Run the Azure
credentials AD
"The user name or password is incorrect. Verify your user name, and then type your password again. were updated Configuration
through FIM. Wizard again.
See the
following
Microsoft
Knowledge
Base article:
Password hash
synchronization
stops working
after updating
Azure Active
Directory
credentials in
FIM
6900 The server encountered an unexpected error while processing a password change notification:
Password sync See the
isn't enabled following
"An error occurred. Error Code: 90. Error Description: Password Synchronization has not been for the Microsoft
activated for this company organization. Knowledge
Base article:
User passwords
aren't synced,
and "Password
Synchronization
has not been
activated for
this company"
error is logged
in Event Viewer
More information
a. On the server where the tool is installed, open PowerShell, and then run the following command:
PowerShell
Import-Module DirSync
PowerShell
Set-FullPasswordSync
PowerShell
2. If you're using the Azure AD Sync Service or Azure AD Connect, run the script that's on this page: Azure AD Sync: How
to Use PowerShell to Trigger a Full Password Sync
Original product version: Cloud Services (Web roles/Worker roles), Azure Active
Directory, Microsoft Intune, Azure Backup, Office 365 User and Domain Management,
Office 365 Identity Management
Symptoms
You try to add a subdomain to an existing domain in a Microsoft cloud service such as
Office 365, Microsoft Intune, or Microsoft Azure by using the New-MSOLDomain
command. However, you receive the following error message:
Cause
This issue occurs if you try to use the New-MSOLDomain command to add a subdomain
to an existing domain that's set up for federated authentication. The New-MSOLDomain
command tries to add the subdomain as a standard authentication domain.
Resolution
To add a subdomain to a domain that's set up for federated authentication, follow these
steps:
1. Connect to Azure Active Directory (Azure AD) by using Windows PowerShell. For
more information, see Connect to Azure AD Using Windows PowerShell.
New-MSOLFederatedDomain -DomainName:<subdomain>
Original product version: Azure Active Directory, Cloud Services (Web roles/Worker
roles), Microsoft Intune, Azure Backup, Office 365 User and Domain Management, Office
365 Identity Management
Symptoms
When you try to connect to Microsoft Azure Active Directory (Azure AD) by using the
Azure Active Directory Module for Windows PowerShell, you receive the following error
message:
Console
contact Support.
At line:1 char:1
+ Connect-MsolService
+ ~~~~~~~~~~~~~~~~~~~
rosoftOnlineException
+ FullyQualifiedErrorId : 0x80048862,Microsoft.Online.Administration.Autom
ation.ConnectMsolService
Cause
This issue occurs if one of the following conditions is true:
You used an incorrect format when you entered your user name.
Your user account is enabled for Azure AD Multi-Factor Authentication.
Resolution
Do one of the following, as appropriate for your situation.
<user_name >@<domain>
To perform administrative tasks by using the Azure Active Directory Module for
Windows PowerShell, use either of the following methods:
Disable Azure Active Directory Multi-Factor Authentication for the user account.
Use a different admin account that isn't enabled for Azure Active Directory Multi-
Factor Authentication.
This article describes an issue in which an error message appears when you run the
Azure AD Connect wizard to set up password writeback.
Symptoms
When you run the Azure AD Connect wizard, you receive the following error message
during configuration of password writeback:
Unable to configure password writeback. Ensure you have the required license.
Cause
This issue occurs if one of the following conditions are true:
The administrator account that's used to set up Azure AD Connect does not have
the appropriate license.
The time on the server on which Azure AD Connect is installed is out of sync.
The TLS setting is configured correctly.
Resolution
To reoslve this problem, follow these steps:
Make sure that the time on the server on which Azure AD Connect is installed matches
the time on the authoritative time server.
More information
If the issue you're experiencing is a scenario in which there's a large time difference
between your local environment and Microsoft cloud services,
you may see the following entries in the Azure AD Connect sync logs. The logs are
located in the %appdata%\Local\AADConnect folder.
Console
Error <Date> <Time> ADSync 6306 Server "The server encountered an unexpected
error while performing an operation for the client.
This article provides a resolution to resolve an issue where you receive an error message
when you run the Azure Active Directory Sync Tool Configuration Wizard.
Original product version: Office 365 Identity Management, Azure Active Directory,
Cloud Services (Web roles/Worker roles), Microsoft Intune, Azure Backup
Symptoms
When you run the Azure Active Directory Sync Tool Configuration Wizard, the tool fails,
and you receive the following error message:
Error
Cause
This problem occurs if the Azure Active Directory Sync Tool Configuration Wizard cannot
configure the domain.
Resolution
To resolve this problem, make sure that all domain controllers are running in a healthy
state. To determine which domain or domain controller is causing the problem, follow
these steps:
1. On the server on which the Azure Active Directory Sync Tool is installed, start
Windows PowerShell.
PowerShell
$Forest =
[System.DirectoryServices.ActiveDirectory.Forest]::GetCurrentForest().d
omains
PowerShell
$Forest
Forest : contoso.com
DomainControllers : {ContosoDC01.contoso.com}
Children : {dev.contoso.com}
DomainMode : Windows2008R2Domain
Parent :
PdcRoleOwner : ContosoDC01.contoso.com
RidRoleOwner : ContosoDC01.contoso.com
InfrastructureRoleOwner : ContosoDC01.contoso.com
Name : contoso.com
Forest :
DomainControllers :
Children :
DomainMode :
Parent :
PdcRoleOwner :
RidRoleOwner :
InfrastructureRoleOwner :
Name : dev.contoso.com
4. Investigate and resolve the problem. Most likely, the domain controller that's
hosting the domain is not running or is not in the network.
Original product version: Azure Active Directory, Cloud Services (Web roles/Worker
roles), Microsoft Intune
Introduction
Sometimes you may have to transfer the source of authority for a user account if that
account was originally authored by using Microsoft cloud services management tools.
These tools include:
You can transfer the source of authority,so the account can be managed through your
local directory service when using identity synchronization with Azure Active Directory
(Azure AD).
This article discusses how to perform the transfer by using a process known as UPN
matching. This process uses the user principal name (UPN) to match the on-premises
user account to a work or school account in Azure AD.
UPN matching can be run only when SMTP matching fails. For more information
about SMTP matching, see How to use SMTP matching to match on-premises user
accounts to Office 365 user accounts for directory synchronization . For UPN
matching to work, make sure that there are no primary SMTP address matches
between on-premises user accounts and user accounts in Azure AD.
UPN matching can be used only one time for user accounts that were originally
authored by using Office 365 management tools. After that, the work or school
account is bound to the on-premises user by an immutable identity value, not the
UPN.
The cloud user's UPN can't be updated during the UPN matching process. It's
because the UPN is the value that's used to link the on-premises user to the cloud
user.
UPNs are considered unique values. Make sure that no two users have the same
UPN. Otherwise, the sync process fails, and you may receive an error message that
resembles the following example:
Unable to update this object in Microsoft Online Services because the user
principal name that is associated with this object in the local Active Directory is
already associated with another object. To resolve this error, remove the
associated object in your local Active Directory.
1. If you started syncing to Azure AD before March 30, 2016, run the following Azure
AD PowerShell cmdlet to enable UPN soft match for your organization only:
PowerShell
7 Note
2. Obtain the UPN from the user account in Azure AD. To do so, use one of the
following methods:
More information
For more information about UPN soft match, see Azure AD Connect sync service
features.
This article describes an issue that blocks synchronization for a user object from on-
premises to Azure. A workaround is provided.
Symptoms
When you try to sync a user object to Microsoft Azure Active Directory (Azure AD), the
operation is unsuccessful.
When you search for the user object in the metaverse objects, you see only the Active
Directory connector listed on the Connectors tab. The Windows Azure Active Directory
(AAD) connector is not listed. Additionally, no error is returned for this particular user.
You may also notice that the msExchRecipientTypeDetails value for the user object that's
not synchronized correctly is 2. This corresponds with the Linked Mailbox type, and the
user does not have this value.
7 Note
The following value is the only value that triggers filtering of a user object:
msExchRecipientTypeDetails == (0x1000 OR 0x2000 OR 0x4000 OR 0x400000 OR
0x800000 OR 0x1000000 OR 0x20000000) .
For more information about user objects that are filtered, see
How directory
synchronization determines what isn't synced from the on-premises environment to
Windows Azure AD .
Cause
This issue occurs because there is a rule for the sourceAnchor attribute. The rule is used
to determine whether the value of msexchRecipientTypeDetails is 2.
7 Note
You can view this rule in the following location: Sync Rules Configuration
Editor\Inbound\In From AD\Common\Transformation. You can also see the target
sourceAnchor attribute and the expression rule as follows:
IIF(IsPresent([msExchRecipientTypeDetails]),IIF([msExchRecipientTypeDetails]=2,NULL,
IIF(IsString([objectGUID]),CStr([objectGUID]),ConvertToBase64([objectGUID]))),IIF(IsStri
ng([objectGUID]),CStr([objectGUID]),ConvertToBase64([objectGUID])))
Workaround
To work around this issue, do one of the following:
Make sure that the Master user account (in Account forest) is synchronized first.
Change the attribute value of msExchRecipientTypeDetails to 1. Use any value
that's not supposed to be filtered by either of the rules.
More information
According to DirSync: List of attributes that are synced by the Azure Active Directory
Sync Tool , one reason a user object is filtered is because of the following:
Console
In the scenario that you do not have an account-resource forest topology, and a user
has msExchRecipientTypeDetails value is 2, changing the value to a value that is similar
to a usual object will sync the user object.
Summary
Microsoft Azure Active Directory (Azure AD) Connect doesn't support primary group
functionality. Therefore, it does not query the PrimaryGroupID attribute to build the
group membership of a user. This may cause problems for users who are still using the
primary group feature.
When you set the primary group for a user, that user is excluded from the
corresponding group membership in Active Directory. Instead, the PrimaryGroupID
attribute is set with that group.
For example:
1. User1 belongs to Group1, which means that Group1 has User1 as a member.
2. The primary group is changed on User1 from Domain Users to Group1:
a. User1 is excluded from Group1 Members.
b. User1 is added as a member of Domain Admins (because it's no longer the
primary group).
c. The User1 PrimaryGroupID attribute is set with the Group1 reference.
Programs that need to query groups to give users access that is based on group
membership should also query for the PrimaryGroupID attribute. However, Azure AD
Connect does not support PrimaryGroupID because of the complexity of group
membership synchronization.
This article describes an issue in which users in a federated domain who aren't synced to
Azure Active Directory (Azure AD) see a yellow exclamation mark in Office 2013
applications.
Original product version: Azure Active Directory, Office Professional 2013, Office
Standard 2013
Symptoms
When a user who is in a federated domain but isn't synchronized to Azure AD opens an
Office 2013 application, they see a yellow exclamation mark.
Cause
By default, Office 2013 uses the Microsoft Online Services Sign-in Assistant (also known
as IDCRL). IDCRL detects that the user's domain is federated and therefore tries to
authenticate the user to Azure AD. Because the user isn't synced to Azure AD, the user
doesn't exist in Azure AD, and this triggers the yellow exclamation mark in the Office
2013 application.
Resolution
Do one of the following.
) Important
Follow the steps in this section carefully. Serious problems might occur if you
modify the registry incorrectly. Before you modify it, back up the registry for
restoration in case problems occur.
7 Note
Use this procedure for only those users who aren't synced to Azure AD. Using this
procedure for synced users may cause those users to experience sign-in failures.
To resolve this issue for only those users who aren't synced to Azure AD, follow these
steps:
1. Select Start, select Run, type regedit, and then select OK.
2. Locate the following registry subkey:
HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Common\SignIn\ .
3. Right-click the SignInOptions registry key, select Modify, type 3 in the Value data
box, and then select OK.
4. Exit Registry Editor. Set the SignInOptions registry key to 3 forces Office 2013 to
authenticate only against the user's local Active Directory service instead of trying
to sign the user in to Azure AD.
Original product version: Cloud Services (Web roles/Worker roles), Azure Active
Directory, Microsoft Intune, Azure Backup, Office 365 Identity Management
Symptoms
When you try to sign out of online services that use Microsoft Azure Active Directory
(Azure AD), you receive the following error message:
Resolution
Use one of the following methods.
Method 1
To sign out, close all web browsers.
Method 2
Clear cookies from the web browser, and then try signing out again. The steps for doing
this vary, depending on the browser that you're using. For more information, see the
following resources:
If you're using Internet Explorer, see How to delete cookie files in Internet
Explorer .
If you're using Safari, go to the following Apple websites:
Safari on Mac
Safari on iOS
If you're using Google Chrome, go to the following Google website: Manage your
cookies and site data .
If you're using Mozilla Firefox, go to the following Mozilla website: Clear cookies
and site data in Firefox .
Microsoft provides third-party contact information to help you find technical support.
This contact information may change without notice. Microsoft does not guarantee the
accuracy of this third-party contact information.
More information
This problem occurs if third-party cookies are turned on in your web browser. We do not
recommend turning on the use of third-party cookies.
The third-party products that this article discusses are manufactured by companies that
are independent of Microsoft. Microsoft makes no warranty, implied or otherwise, about
the performance or reliability of these products.
This article discusses how to enable and disable a trace for the Microsoft Online Services
Sign-in Assistant. The log files that are generated can help troubleshoot issues that may
occur when you use the Sign-in Assistant in a Microsoft Office 365 environment.
Original product version: Cloud Services (Web roles/Worker roles), Azure Active
Directory, Microsoft Intune, Azure Backup, Office 365 User and Domain Management
7 Note
Use this article only with applications that use the Microsoft Online Services Sign-In
Assistant to assist in authentication to Azure Active Directory (Azure AD).
) Important
Follow the steps in this section carefully. Serious problems might occur if you
modify the registry incorrectly. Before you modify it, back up the registry for
restoration in case problems occur.
1. Start Notepad, copy and paste the following text to a new file, and then save the
file as Enable_SIA_Debug_Tracing.reg:
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSOIdentityCRL\Trace]
"Folder"="C:\\MSOTrace"
"Flags"=dword:00000001
"level"=dword:00000099
"maxsize"=dword:10485760
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\MSOIdentityCRL\Trace
]
"Folder"="C:\\MSOTrace"
"Flags"=dword:00000001
"level"=dword:00000099
"maxsize"=dword:10485760
[HKEY_CURRENT_USER\Software\Microsoft\MSOIdentityCRL\Trace]
"Folder"="C:\\MSOTraceLite"
"Flags"=dword:00000001
"level"=dword:00000099
"maxsize"=dword:10485760
3. Restart the Microsoft Online Services Sign-in Assistant service (if it's installed).
7 Note
To restart the Microsoft Online Services Sign-in Assistant service, do one of the
following:
Select Start, type services.msc in the search box, and then press Enter. Right-
click the Microsoft Online Services Sign-in Assistant service, and then select
Restart.
Console
Console
net start msoidsvc
5. On drive C, locate the MSOTrace and MSOTraceLite folders. These folders contain
the trace files. The names of the trace files are in the following format:
msoidsvctrace{GUID}.txt
7 Note
When the Microsoft Online Services Sign-in Assistant service is running, you
can't rename or delete the debug trace because the file is being used by a
process. However, you can create a copy of the debug trace that you can then
move to another folder or another computer for review.
6. Examine the debug trace files for any relevant exception messages.
1. Open Notepad, copy and paste the following text to a new file, and then save the
file as Disable_SIA_Debug_Tracing.reg:
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSOIdentityCRL\Trace]
"Folder"="C:\\MSOTrace"
"Flags"=dword:00000000
"level"=dword:00000000
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\MSOIdentityCRL\Trace
]
"Folder"="C:\\MSOTrace"
"Flags"=dword:00000000
"level"=dword:00000000
[HKEY_CURRENT_USER\Software\Microsoft\MSOIdentityCRL\Trace]
"Folder"="C:\\MSOTraceLite"
"Flags"=dword:00000000
"level"=dword:00000000
3. Restart the Microsoft Online Services Sign-in Assistant service (if it's installed).
7 Note
To restart the Microsoft Online Services Sign-in Assistant service, do one of the
following:
Select Start, type services.msc in the search box, and then press Enter. Right-
click the Microsoft Online Services Sign-In Assistant service, and then select
Restart.
Console
Console
Analyze logs
Log file locations depend on the specifics of the Folder registry entry that's listed earlier.
In this example, the log is located in the C:\MSOTrace or C:\MSOTraceLite folder,
depending on the application that performs authentication.
Contact us for help
If you have questions or need help, create a support request , or ask Azure community
support.
Error when you run the IdFix tool:
IdFix.exe is not a valid Win32
application
Article • 09/30/2022 • 2 minutes to read
Original product version: Cloud Services (Web roles/Worker roles), Azure Active
Directory, Microsoft Intune, Azure Backup, Office 365 Identity Management
Symptoms
When you try to run the IdFix DirSync Error Remediation Tool in your on-premises Active
Directory Domain Services (AD DS) environment, you receive the following error
message:
Cause
This issue occurs if you're running the IdFix tool on an operating system that's not
supported for the tool.
Resolution
Install and run the IdFix tool on a computer that's running the 64-bit version of
Windows 7 or a later version.
More information
For more information about the IdFix tool, see IdFix DirSync Error Remediation Tool
(This includes a list of system requirements.).
We're excited to bring IPv6 support to Azure Active Directory (Azure AD), to support
customers with increased mobility, and help reduce spending on fast-depleting,
expensive IPv4 addresses. For more information about how this change might affect
Microsoft 365, see IPv6 support in Microsoft 365 services.
If your organization's networks don't support IPv6 today, you can safely ignore this
information until such time that they do.
What's changing?
Our service endpoint URLs will now resolve to return both IPv4 and IPv6 addresses. If a
client platform or network supports IPv6, the connection will mostly be attempted using
IPv6, assuming that the network hops that are in between (such as firewalls or web
proxies) also support IPv6. For environments that don't support IPv6, client applications
will continue to connect to Azure AD over IPv4.
Named locations
Conditional Access policies
Identity Protection
Sign-in logs
We know that IPv6 support is a significant change for some organizations. We're
publishing this information now so that customers can make plans to ensure readiness.
For example:
Some organizations have a Conditional Access policy that blocks access to specific
applications from outside a trusted named location that represents their public
network addresses. This named location contains the IPv4 addresses that are owned
by the customer, but it might not include the public IPv6 addresses that represent
the customer network.
If customers don't update their named locations with these IPv6 addresses, their
users will be blocked.
Named locations
Named locations are shared between many features, such as Conditional Access,
Identity Protection, and B2C. Customers should partner with their network
administrators and internet service providers (ISPs) to identify their public-facing IPv6
addresses. Customers should then use this list to create or update named locations, to
include their identified IPv6 addresses.
For the IP ranges that are specified for Azure AD, make sure that you allow outbound
access in your proxy or firewall.
Device configuration
By default, both IPv6 and IPv4 traffic is supported on Windows and most other
operating system (OS) platforms. Changes to the standard IPv6 configuration may result
in unintended consequences. For more information, see Guidance for configuring IPv6
in Windows for advanced users.
7 Note
Microsoft is providing these instructions for testing purposes only. You must
remove the following configurations by May 2023 to ensure that your clients are
using production DNS servers. The DNS servers in the following procedures may be
decommissioned after May 2023.
PowerShell
$DnsServers = (
"ns1-37.azure-dns.com.",
"ns2-37.azure-dns.net.",
"ns3-37.azure-dns.org.",
"ns4-37.azure-dns.info."
$params = @{
Namespace = "login.microsoftonline.com"
NameServers = $DnsServerIPs
DisplayName = "AZURE-AD-NRPT"
}
Add-DnsClientNrptRule @params
Console
4. If you want to remove the NRPT rule, run this PowerShell script:
PowerShell
Get-DnsClientNrptRule | Where-Object {
} | Remove-DnsClientNrptRule -Force
Create a folder, and then save the following installation and rollback scripts
(InstallScript.ps1 and RollbackScript.ps1) in it so that you can create the .intunewin file for
use in the deployment.
InstallScript.ps1
PowerShell
$DnsServers = (
"ns1-37.azure-dns.com.",
"ns2-37.azure-dns.net.",
"ns3-37.azure-dns.org.",
"ns4-37.azure-dns.info."
if ($existingRules) {
else {
$params = @{
Namespace = "login.microsoftonline.com"
NameServers = $DnsServerIPs
DisplayName = "AZURE-AD-NRPT"
Add-DnsClientNrptRule @params
}
RollbackScript.ps1
PowerShell
# Remove the Azure AD NRPT rule.
if ($existingRules) {
$existingRules | Format-Table
else {
Write-Output "Azure AD NRPT rule does not exist. Device was successfully
remediated."
DetectionScript.ps1
Save the following script (DetectionScript.ps1) in another location. Then, you can
reference the detection script in the application when you create it in Intune.
PowerShell
$DnsServers = (
"ns1-37.azure-dns.com.",
"ns2-37.azure-dns.net.",
"ns3-37.azure-dns.org.",
"ns4-37.azure-dns.info."
if ($existingRules) {
Write-Output 'Compliant'
2. Select Apps > All Apps, and then select + Add to create a new Win32 app.
3. In the App type dropdown list, select Windows app (Win32), and then choose
Select.
4. On the App information page, click Select app package file to select the
.intunewin file that you previously created. Select OK to continue.
5. Return to the App information page, and then enter a descriptive Name,
Description, and Publisher for the application. Other fields are optional. Select
Next to continue.
System
7. In the Requirement page, select both Operating system architectures and set
Minimum Operating system to Windows 10 1607. Select Next to continue.
8. On the Detection page, select Use a custom detection script from the Rules
format dropdown list. Select the browse button beside the Script file box to
choose the detection script. Leave the remaining fields as their default values.
Select Next to continue.
10. Select Next on the Supersedence (preview) page to continue without any
changes.
11. On the Assignments page, create assignments based on your requirements, and
then select Next to continue.
12. Review the information one final time on the Review + create page. Once you
finish your validation, select Create to create the application.
Next steps
We'll keep this article updated. Here's a short link you can use to come back for updated
and new information: https://aka.ms/azureadipv6 .
Original product version: Cloud Services (Web roles/Worker roles), Azure Active
Directory, Microsoft Intune, Azure Backup, Office 365 Identity Management
Symptoms
When you run the IdFix DirSync Error Remediation Tool to perform a query in your on-
premises Active Directory Domain Services (AD DS) environment, you receive the
following error message:
This issue occurs after you log on to the computer by using a user account that's not a
member of the domain in which you're running the query. The IdFix tool uses the
security context of the user who runs the tool to determine the domain to query.
Resolution
Log on to the computer by using a user account that's a member of the domain in
which you're running the query.
More information
For more information about the IdFix tool, see IdFix DirSync Error Remediation Tool .
Follow these steps to send logs to customer support and get the incident ID.
To troubleshoot issues that are related to Azure Active Directory (Azure AD), Microsoft
Support and the Azure Active Directory engineering team can view and download
diagnostic logs that are associated with your Azure AD tenant and on-premises
configuration. Microsoft may access (or make temporary copies of) the data to help
resolve your support incident.
More information
The following table explains the kinds of data that are associated with your Azure AD
tenant and that may be accessed while we troubleshoot your support incident.
Additionally, you may be asked to provide the same types of data from your company's
on-premises environment. Depending upon your tenant, this information may be
automatically uploaded to the Azure AD service or be requested by the Microsoft
Support Engineer to assist in troubleshooting your support incident.
Type Description
Microsoft Information that's maintained in the Azure AD tenant or synchronized from Active
Azure Active Directory on-premises environment, such as Tenant, User, Group, Device, and
Directory related metadata.
Objects
Service Tenant configuration and settings that are related to your Azure tenant
configuration
Azure AD Sign-in logs, audit logs, device registration logs, data previously uploaded (such
audit and as Authenticator App logs), and telemetry that is related to the health of service.
sign-in logs
Note System-generated logs contain identifiable information about end users,
such as a user name. Telemetry contains primarily pseudonymized data, such as
unique identifiers that are generated by the system. This data cannot, on its own,
identify individual people. However, it can be used to deliver the enterprise
services to users.
Contact us for help
If you have questions or need help, create a support request , or ask Azure community
support.