Skip to content

Commit 0595d20

Browse files
Merge pull request #111389 from japere/patch-71
Additional troubleshooting guidance for cert renew
2 parents ee3b250 + 237fe03 commit 0595d20

File tree

1 file changed

+52
-3
lines changed

1 file changed

+52
-3
lines changed

articles/active-directory/manage-apps/application-proxy-connector-installation-problem.md

Lines changed: 52 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -47,21 +47,70 @@ When the installation of a connector fails, the root cause is usually one of the
4747

4848
3. Open a browser (separate tab) and go to the following web page: `https://login.microsoftonline.com`, make sure that you can login to that page.
4949

50-
## Verify Machine and backend components support for Application Proxy trust cert
50+
## Verify Machine and backend components support for Application Proxy trust certificate
5151

52-
**Objective:** Verify that the connector machine, backend proxy and firewall can support the certificate created by the connector for future trust.
52+
**Objective:** Verify that the connector machine, backend proxy and firewall can support the certificate created by the connector for future trust and that the certificate is valid.
5353

5454
>[!NOTE]
5555
>The connector tries to create a SHA512 cert that is supported by TLS1.2. If the machine or the backend firewall and proxy does not support TLS1.2, the installation fails.
5656
>
5757
>
5858
59-
**To resolve the issue:**
59+
**Review the pre-requisites required:**
6060

6161
1. Verify the machine supports TLS1.2 – All Windows versions after 2012 R2 should support TLS 1.2. If your connector machine is from a version of 2012 R2 or prior, make sure that the following KBs are installed on the machine: <https://support.microsoft.com/help/2973337/sha512-is-disabled-in-windows-when-you-use-tls-1.2>
6262

6363
2. Contact your network admin and ask to verify that the backend proxy and firewall do not block SHA512 for outgoing traffic.
6464

65+
**To verify the client certificate:**
66+
67+
Verify the thumbprint of the current client certificate. The certificate store can be found in %ProgramData%\microsoft\Microsoft AAD Application Proxy Connector\Config\TrustSettings.xml
68+
69+
```
70+
<?xml version="1.0" encoding="utf-8"?>
71+
<ConnectorTrustSettingsFile xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
72+
<CloudProxyTrust>
73+
<Thumbprint>4905CC64B2D81BBED60962ECC5DCF63F643CCD55</Thumbprint>
74+
<IsInUserStore>false</IsInUserStore>
75+
</CloudProxyTrust>
76+
</ConnectorTrustSettingsFile>
77+
```
78+
79+
Here are the possible **IsInUserStore** values and meanings:
80+
81+
- **false** - The client certificate was created during the installation or registration initiated by Register-AppProxyConnector command. It is stored in the personal container in the certificate store of the local machine.
82+
83+
Follow the steps to verify the certificate:
84+
85+
1. Run **certlm.msc**
86+
2. In the management console expand the Personal container and click on Certificates
87+
3. Locate the certificate issued by **connectorregistrationca.msappproxy.net**
88+
89+
- **true** - The automatically renewed certificate is stored in the personal container in the user certificate store of the Network Service.
90+
91+
Follow the steps to verify the certificate:
92+
93+
1. Download [PsTools.zip](https://docs.microsoft.com/sysinternals/downloads/pstools)
94+
2. Extract [PsExec](https://docs.microsoft.com/sysinternals/downloads/psexec) from the package and run **psexec -i -u "nt authority\network service" cmd.exe** from an elevated command prompt.
95+
3. Run **certmgr.msc** in the newly appeared command prompt
96+
2. In the management console expand the Personal container and click on Certificates
97+
3. Locate the certificate issued by **connectorregistrationca.msappproxy.ne
98+
99+
**To renew the client certificate:**
100+
101+
If a connector is not connected to the service for several months, its certificates may be outdated. The failure of the certificate renewal leads to an expired certificate. This makes the connector service to stop working. The event 1000 is recorded in the admin log of the connector:
102+
103+
"Connector re-registration failed: The Connector trust certificate expired. Run the PowerShell cmdlet Register-AppProxyConnector on the computer on which the Connector is running to re-register your Connector."
104+
105+
In this case, uninstall and reinstall the connector to trigger registration or you can run the following PowerShell commands:
106+
107+
```
108+
Import-module AppProxyPSModule
109+
Register-AppProxyConnector
110+
```
111+
112+
To learn more about the Register-AppProxyConnector command, please see [Create an unattended installation script for the Azure AD Application Proxy connector](https://docs.microsoft.com/azure/active-directory/manage-apps/application-proxy-register-connector-powershell)
113+
65114
## Verify admin is used to install the connector
66115

67116
**Objective:** Verify that the user who tries to install the connector is an administrator with correct credentials. Currently, the user must be at least an application administrator for the installation to succeed.

0 commit comments

Comments
 (0)