You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- The device received a `400 Bad Request` HTTP error response from one of the following sources:
129
129
130
130
- The Azure AD authentication service
131
-
- An endpoint for the [WS-Trust protocol][WS-Trust] (which is required for federated authentication)
131
+
- An endpoint for the [WS-Trust protocol][WS-Trust] (required for federated authentication)
132
132
133
133
##### Solution
134
134
135
135
- If the on-premises environment requires an outbound proxy, make sure that the computer account of the device can discover and silently authenticate to the outbound proxy.
136
136
137
137
- Get the server error code and error description, and then go to the [Common server error codes ("AADSTS" prefix)][server-errors] section to find the cause of that server error code and the solution details.
138
138
139
-
In the Azure AD operational logs, Event ID 1081 contains the server error code and error description if the error occurs in the Azure AD authentication service. If the error occurs in a WS-Trust endpoint, the server error code and error description are found in Event ID 1088. In the Azure AD analytic logs, the first instance of Event ID 1022 contains the URL that's being accessed.
139
+
In the Azure AD operational logs, Event ID 1081 contains the server error code and error description if the error occurs in the Azure AD authentication service. If the error occurs in a WS-Trust endpoint, the server error code and error description are found in Event ID 1088. In the Azure AD analytic logs, the first instance of Event ID 1022 (that precedes operational Event IDs 1081 and 1088) contains the URL that's being accessed.
140
140
141
141
To view Event IDs in the Azure AD operational and analytic logs, refer to the [Method 2: Use Event Viewer to examine Azure AD analytic and operational logs][view-event-ids] section.
- The device received a `4xx` HTTP error response from one of the following sources:
171
171
172
172
- The Azure AD authentication service
173
-
- An endpoint for the [WS-Trust protocol][WS-Trust] (which is required for federated authentication)
174
-
-There's a network connectivity issue to a required endpoint.
173
+
- An endpoint for the [WS-Trust protocol][WS-Trust] (required for federated authentication)
174
+
-A network connectivity issue to a required endpoint exists.
175
175
176
176
##### Solution
177
177
@@ -189,15 +189,15 @@ To view Event IDs in the Azure AD operational and analytic logs, refer to the [M
189
189
190
190
##### Cause
191
191
192
-
The user realm discovery failed, because the Azure AD authentication service can't find the user's domain.
192
+
The user realm discovery failed because the Azure AD authentication service can't find the user's domain.
193
193
194
194
##### Solution
195
195
196
196
- Add the domain of the user principal name (UPN) of the user as a custom domain in Azure AD. To find the provided UPN, look for Event ID 1144 in the Azure AD analytic logs.
197
197
198
198
To view Event IDs in the Azure AD analytic logs, refer to the [Method 2: Use Event Viewer to examine Azure AD analytic and operational logs][view-event-ids] section.
199
199
200
-
- If the on-premises domain name can't be routed (for example, if the UPN is something like`[email protected]`), [configure the Alternate Login ID][alt-login-id] (AltID). (To view the prerequisites, see [Plan your hybrid Azure Active Directory join implementation][hybrid-azure-ad-join-plan].)
200
+
- If the on-premises domain name can't be routed (for example, if the UPN is something such as`[email protected]`), [configure the Alternate Login ID][alt-login-id] (AltID). (To view the prerequisites, see [Plan your hybrid Azure Active Directory join implementation][hybrid-azure-ad-join-plan].)
201
201
</details>
202
202
203
203
#### Common CloudAP plug-in error codes ("AAD_CLOUDAP_E_" prefix, codes that begin with "0xc004")
@@ -228,7 +228,7 @@ The UPN for the user isn't in the expected format. The UPN value varies accordin
228
228
229
229
If Active Directory is configured with the correct UPN, [collect time travel traces](#time-travel-traces) for the Local Security Authority Subsystem Service (LSASS or *lsass.exe*).
230
230
231
-
- If the on-premises domain name can't be routed (for example, if the UPN is something like`[email protected]`), [configure the Alternate Login ID][alt-login-id] (AltID). (To view the prerequisites, see [Plan your hybrid Azure Active Directory join implementation][hybrid-azure-ad-join-plan].)
231
+
- If the on-premises domain name can't be routed (for example, if the UPN is something such as`[email protected]`), [configure the Alternate Login ID][alt-login-id] (AltID). (To view the prerequisites, see [Plan your hybrid Azure Active Directory join implementation][hybrid-azure-ad-join-plan].)
232
232
</details>
233
233
234
234
<details>
@@ -248,7 +248,7 @@ Make sure that the network proxy doesn't interfere with or modify the server res
248
248
249
249
##### Cause
250
250
251
-
You received an error from the [WS-Trust protocol][WS-Trust] endpoint (which is required for federated authentication).
251
+
You received an error from the [WS-Trust protocol][WS-Trust] endpoint (required for federated authentication).
252
252
253
253
##### Solution
254
254
@@ -270,7 +270,7 @@ The Metadata Exchange (MEX) endpoint is configured incorrectly. The MEX response
270
270
271
271
- Make sure that the network proxy doesn't interfere with or modify the server response.
272
272
273
-
- Fix the MEX configuration to return valid URLs in response.
273
+
- Fix the MEX configuration to return valid URLs in the response.
274
274
</details>
275
275
276
276
<details>
@@ -284,7 +284,7 @@ The Metadata Exchange (MEX) endpoint is configured incorrectly. The MEX response
284
284
285
285
- Make sure that the network proxy doesn't interfere with or modify the server response.
286
286
287
-
- Fix the MEX configuration in the identity provider to return valid certificate URLs in response.
287
+
- Fix the MEX configuration in the identity provider to return valid certificate URLs in the response.
288
288
</details>
289
289
290
290
#### Common XML error codes (codes that begin with "0xc00c")
@@ -294,7 +294,7 @@ The Metadata Exchange (MEX) endpoint is configured incorrectly. The MEX response
294
294
295
295
##### Cause
296
296
297
-
The XML response from the [WS-Trust protocol][WS-Trust] endpoint (which is required for federated authentication) included a document type definition (DTD). The DTD isn't expected in the XML response, and response parsing fails if the DTD is included.
297
+
The XML response from the [WS-Trust protocol][WS-Trust] endpoint (required for federated authentication) included a document type definition (DTD). The DTD isn't expected in the XML response, and response parsing fails if the DTD is included.
298
298
299
299
##### Solution
300
300
@@ -307,7 +307,7 @@ The XML response from the [WS-Trust protocol][WS-Trust] endpoint (which is requi
307
307
308
308
#### Common server error codes ("AADSTS" prefix)
309
309
310
-
You can find the full list and description of server error codes in [Azure AD authentication and authorization error codes](../develop/reference-error-codes.md).
310
+
You can find a full list and description of server error codes in [Azure AD authentication and authorization error codes](../develop/reference-error-codes.md).
@@ -344,21 +344,21 @@ Azure AD can't find the user account in the tenant.
344
344
345
345
##### Cause
346
346
347
-
- The user entered an incorrect user name or password in the sign-in UI.
347
+
- The user entered an incorrect username or password in the sign-in UI.
348
348
- The password hasn't been synchronized to Azure AD because of the following scenario:
349
349
350
350
- The tenant has enabled [password hash synchronization](../hybrid/connect/whatis-phs.md).
351
351
- The device is a hybrid Azure AD-joined device.
352
-
- The user just changed the password.
352
+
- The user recently changed the password.
353
353
354
354
##### Solution
355
355
356
-
To acquire a fresh PRT that has the new credentials, wait for the Azure AD synchronization to complete.
356
+
To acquire a fresh PRT that has the new credentials, wait for the Azure AD synchronization to finish.
357
357
</details>
358
358
359
359
#### Common network error codes ("ERROR_WINHTTP_" prefix)
360
360
361
-
You can find the full list and description of network error codes in [Error messages (Winhttp.h)](/windows/win32/winhttp/error-messages).
361
+
You can find a full list and description of network error codes in [Error messages (Winhttp.h)](/windows/win32/winhttp/error-messages).
362
362
363
363
<details>
364
364
<summary>ERROR_WINHTTP_TIMEOUT (12002),<br/>
@@ -378,7 +378,7 @@ Common general network-related issues.
378
378
379
379
- If the on-premises environment requires an outbound proxy, make sure that the computer account of the device can discover and silently authenticate to the outbound proxy.
380
380
381
-
- Collect network traces by taking the following steps:
381
+
- Collect network traces by following these steps:
382
382
383
383
> [!IMPORTANT]
384
384
> Don't use Fiddler during this procedure.
@@ -390,7 +390,7 @@ Common general network-related issues.
390
390
```
391
391
392
392
1. Lock the device.
393
-
1. If the device is a hybrid Azure AD-joined device, wait at least 60 seconds to let the PRT acquisition task complete.
393
+
1. If the device is a hybrid Azure AD-joined device, wait at least 60 seconds to let the PRT acquisition task finish.
394
394
1. Unlock the device.
395
395
1. Run the following [netsh trace stop](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/jj129382(v=ws.11)#stop) command:
0 commit comments