You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/application-proxy-connector-installation-problem.md
+52-3Lines changed: 52 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -47,21 +47,70 @@ When the installation of a connector fails, the root cause is usually one of the
47
47
48
48
3. Open a browser (separate tab) and go to the following web page: `https://login.microsoftonline.com`, make sure that you can login to that page.
49
49
50
-
## Verify Machine and backend components support for Application Proxy trust cert
50
+
## Verify Machine and backend components support for Application Proxy trust certificate
51
51
52
-
**Objective:** Verify that the connector machine, backend proxy and firewall can support the certificate created by the connector for future trust.
52
+
**Objective:** Verify that the connector machine, backend proxy and firewall can support the certificate created by the connector for future trust and that the certificate is valid.
53
53
54
54
>[!NOTE]
55
55
>The connector tries to create a SHA512 cert that is supported by TLS1.2. If the machine or the backend firewall and proxy does not support TLS1.2, the installation fails.
56
56
>
57
57
>
58
58
59
-
**To resolve the issue:**
59
+
**Review the pre-requisites required:**
60
60
61
61
1. Verify the machine supports TLS1.2 – All Windows versions after 2012 R2 should support TLS 1.2. If your connector machine is from a version of 2012 R2 or prior, make sure that the following KBs are installed on the machine: <https://support.microsoft.com/help/2973337/sha512-is-disabled-in-windows-when-you-use-tls-1.2>
62
62
63
63
2. Contact your network admin and ask to verify that the backend proxy and firewall do not block SHA512 for outgoing traffic.
64
64
65
+
**To verify the client certificate:**
66
+
67
+
Verify the thumbprint of the current client certificate. The certificate store can be found in %ProgramData%\microsoft\Microsoft AAD Application Proxy Connector\Config\TrustSettings.xml
Here are the possible **IsInUserStore** values and meanings:
80
+
81
+
-**false** - The client certificate was created during the installation or registration initiated by Register-AppProxyConnector command. It is stored in the personal container in the certificate store of the local machine.
82
+
83
+
Follow the steps to verify the certificate:
84
+
85
+
1. Run **certlm.msc**
86
+
2. In the management console expand the Personal container and click on Certificates
87
+
3. Locate the certificate issued by **connectorregistrationca.msappproxy.net**
88
+
89
+
-**true** - The automatically renewed certificate is stored in the personal container in the user certificate store of the Network Service.
2. Extract [PsExec](https://docs.microsoft.com/sysinternals/downloads/psexec) from the package and run **psexec -i -u "nt authority\network service" cmd.exe** from an elevated command prompt.
95
+
3. Run **certmgr.msc** in the newly appeared command prompt
96
+
2. In the management console expand the Personal container and click on Certificates
97
+
3. Locate the certificate issued by **connectorregistrationca.msappproxy.ne
98
+
99
+
**To renew the client certificate:**
100
+
101
+
If a connector is not connected to the service for several months, its certificates may be outdated. The failure of the certificate renewal leads to an expired certificate. This makes the connector service to stop working. The event 1000 is recorded in the admin log of the connector:
102
+
103
+
"Connector re-registration failed: The Connector trust certificate expired. Run the PowerShell cmdlet Register-AppProxyConnector on the computer on which the Connector is running to re-register your Connector."
104
+
105
+
In this case, uninstall and reinstall the connector to trigger registration or you can run the following PowerShell commands:
106
+
107
+
```
108
+
Import-module AppProxyPSModule
109
+
Register-AppProxyConnector
110
+
```
111
+
112
+
To learn more about the Register-AppProxyConnector command, please see [Create an unattended installation script for the Azure AD Application Proxy connector](https://docs.microsoft.com/azure/active-directory/manage-apps/application-proxy-register-connector-powershell)
113
+
65
114
## Verify admin is used to install the connector
66
115
67
116
**Objective:** Verify that the user who tries to install the connector is an administrator with correct credentials. Currently, the user must be at least an application administrator for the installation to succeed.
0 commit comments