Skip to content

Commit 70cebfc

Browse files
Fixed links/warnings due to changed heading.
1 parent 38be3e7 commit 70cebfc

File tree

1 file changed

+10
-10
lines changed

1 file changed

+10
-10
lines changed

articles/active-directory/devices/troubleshoot-primary-refresh-token.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -138,7 +138,7 @@ STATUS_WRONG_PASSWORD (-1073741718&nbsp;/&nbsp;0xc000006a)</summary>
138138

139139
In the Azure AD operational logs, Event ID 1081 contains the server error code and error description if the error occurs in the Azure AD authentication service. If the error occurs in a WS-Trust endpoint, the server error code and error description are found in Event ID 1088. In the Azure AD analytic logs, the first instance of Event ID 1022 contains the URL that's being accessed.
140140

141-
To view Event IDs in the Azure AD operational and analytic logs, refer to the [Method 2: Use the Event Viewer to examine Azure AD analytic and operational logs][view-event-ids] section.
141+
To view Event IDs in the Azure AD operational and analytic logs, refer to the [Method 2: Use Event Viewer to examine Azure AD analytic and operational logs][view-event-ids] section.
142142
</details>
143143

144144
<details>
@@ -157,7 +157,7 @@ Get the server error code and error description, and then go to the [Common serv
157157

158158
In the Azure AD operational logs, Event ID 1081 contains the server error code and error description if the error occurs in the Azure AD authentication service. If the error occurs in a WS-Trust endpoint, the server error code and error description are found in Event ID 1088. In the Azure AD analytic logs, the first instance of Event ID 1022 (that precedes operational Event IDs 1081 and 1088) contains the URL that's being accessed.
159159

160-
To view Event IDs in the Azure AD operational and analytic logs, refer to the [Method 2: Use the Event Viewer to examine Azure AD analytic and operational logs][view-event-ids] section.
160+
To view Event IDs in the Azure AD operational and analytic logs, refer to the [Method 2: Use Event Viewer to examine Azure AD analytic and operational logs][view-event-ids] section.
161161
</details>
162162

163163
<details>
@@ -181,7 +181,7 @@ STATUS_UNEXPECTED_NETWORK_ERROR (-1073741628&nbsp;/&nbsp;0xc00000c4)</summary>
181181

182182
- For a network connectivity issue, get the URL that's being accessed and the suberror code from the network stack. Event ID 1022 in the Azure AD analytic logs contains the URL that's being accessed. Event ID 1084 in the Azure AD operational logs contains the suberror code from the network stack.
183183

184-
To view Event IDs in the Azure AD operational and analytic logs, refer to the [Method 2: Use the Event Viewer to examine Azure AD analytic and operational logs][view-event-ids] section.
184+
To view Event IDs in the Azure AD operational and analytic logs, refer to the [Method 2: Use Event Viewer to examine Azure AD analytic and operational logs][view-event-ids] section.
185185
</details>
186186

187187
<details>
@@ -195,7 +195,7 @@ The user realm discovery failed, because the Azure AD authentication service can
195195

196196
- Add the domain of the user principal name (UPN) of the user as a custom domain in Azure AD. To find the provided UPN, look for Event ID 1144 in the Azure AD analytic logs.
197197

198-
To view Event IDs in the Azure AD analytic logs, refer to the [Method 2: Use the Event Viewer to examine Azure AD analytic and operational logs][view-event-ids] section.
198+
To view Event IDs in the Azure AD analytic logs, refer to the [Method 2: Use Event Viewer to examine Azure AD analytic and operational logs][view-event-ids] section.
199199

200200
- If the on-premises domain name can't be routed (for example, if the UPN is something like `[email protected]`), [configure the Alternate Login ID][alt-login-id] (AltID). (To view the prerequisites, see [Plan your hybrid Azure Active Directory join implementation][hybrid-azure-ad-join-plan].)
201201
</details>
@@ -218,7 +218,7 @@ The UPN for the user isn't in the expected format. The UPN value varies accordin
218218

219219
- Set the UPN of the user to an internet-style sign-in name, based on internet standard [RFC 822](https://www.ietf.org/rfc/rfc0822.txt). To find the current UPN, look for event ID 1144 in the Azure AD analytic logs.
220220

221-
To view Event IDs in the Azure AD analytic logs, refer to the [Method 2: Use the Event Viewer to examine Azure AD analytic and operational logs][view-event-ids] section.
221+
To view Event IDs in the Azure AD analytic logs, refer to the [Method 2: Use Event Viewer to examine Azure AD analytic and operational logs][view-event-ids] section.
222222

223223
- For hybrid Azure AD-joined devices, make sure that you configured the domain controller to return the UPN in the correct format. To display the configured UPN in the domain controller, run the following [whoami](/windows-server/administration/windows-commands/whoami) command:
224224

@@ -256,7 +256,7 @@ You received an error from the [WS-Trust protocol][WS-Trust] endpoint (which is
256256

257257
- Get the server error code and error description from Event ID 1088 in the Azure AD operational logs. Then, go to the [Common server error codes ("AADSTS" prefix)][server-errors] section to find the cause of that server error code and the solution details.
258258

259-
To view Event IDs in the Azure AD operational logs, refer to the [Method 2: Use the Event Viewer to examine Azure AD analytic and operational logs][view-event-ids] section.
259+
To view Event IDs in the Azure AD operational logs, refer to the [Method 2: Use Event Viewer to examine Azure AD analytic and operational logs][view-event-ids] section.
260260
</details>
261261

262262
<details>
@@ -302,7 +302,7 @@ The XML response from the [WS-Trust protocol][WS-Trust] endpoint (which is requi
302302

303303
- Get the URL that's being accessed from Event ID 1022 in the Azure AD analytic logs.
304304

305-
To view Event IDs in the Azure AD analytic logs, refer to the [Method 2: Use the Event Viewer to examine Azure AD analytic and operational logs][view-event-ids] section.
305+
To view Event IDs in the Azure AD analytic logs, refer to the [Method 2: Use Event Viewer to examine Azure AD analytic and operational logs][view-event-ids] section.
306306
</details>
307307

308308
#### Common server error codes ("AADSTS" prefix)
@@ -336,7 +336,7 @@ Azure AD can't find the user account in the tenant.
336336
- Make sure that the on-premises user account is being synchronized to Azure AD.
337337
- Get the provided UPN by looking for Event ID 1144 in the Azure AD analytic logs.
338338

339-
To view Event IDs in the Azure AD analytic logs, refer to the [Method 2: Use the Event Viewer to examine Azure AD analytic and operational logs][view-event-ids] section.
339+
To view Event IDs in the Azure AD analytic logs, refer to the [Method 2: Use Event Viewer to examine Azure AD analytic and operational logs][view-event-ids] section.
340340
</details>
341341

342342
<details>
@@ -374,7 +374,7 @@ Common general network-related issues.
374374

375375
- Get the URL that's being accessed. You can find the URL in Event ID 1084 of the Azure AD operational log or Event ID 1022 of the Azure AD analytic log.
376376

377-
To view Event IDs in the Azure AD operational and analytic logs, refer to the [Method 2: Use the Event Viewer to examine Azure AD analytic and operational logs][view-event-ids] section.
377+
To view Event IDs in the Azure AD operational and analytic logs, refer to the [Method 2: Use Event Viewer to examine Azure AD analytic and operational logs][view-event-ids] section.
378378

379379
- If the on-premises environment requires an outbound proxy, make sure that the computer account of the device can discover and silently authenticate to the outbound proxy.
380380

@@ -465,6 +465,6 @@ The following procedure describes how to capture traces by using the [Time Trave
465465

466466
[WS-Trust]: http://docs.oasis-open.org/ws-sx/ws-trust/v1.4/ws-trust.html
467467
[server-errors]: #common-server-error-codes-aadsts-prefix
468-
[view-event-ids]: #method-2-use-the-event-viewer-to-examine-azure-ad-analytic-and-operational-logs
468+
[view-event-ids]: #method-2-use-event-viewer-to-examine-azure-ad-analytic-and-operational-logs
469469
[alt-login-id]: /windows-server/identity/ad-fs/operations/configuring-alternate-login-id
470470
[hybrid-azure-ad-join-plan]: ./hybrid-azuread-join-plan.md

0 commit comments

Comments
 (0)