You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/active-directory-certificate-based-authentication-get-started.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,6 +14,7 @@ manager: daveba
14
14
ms.reviewer: annaba
15
15
16
16
ms.collection: M365-identity-device-management
17
+
ms.custom: has-adal-ref
17
18
---
18
19
# Get started with certificate-based authentication in Azure Active Directory
19
20
@@ -42,7 +43,7 @@ To configure certificate-based authentication, the following statements must be
42
43
- A client certificate for client authentication must have been issued to your client.
43
44
44
45
>[!IMPORTANT]
45
-
>The maximum size of a CRL for Azure Active Directory to successfully download and cache is 20MB, and the time required to download the CRL must not exceed 10 seconds. If Azure Active Directory can't download a CRL, certificate based authentications using certificates issued by the corresponding CA will fail. Best practices to ensure CRL files are within size constraints are to keep certificate lifetimes to within reasonable limits and to clean up expired certificates.
46
+
>The maximum size of a CRL for Azure Active Directory to successfully download and cache is 20MB, and the time required to download the CRL must not exceed 10 seconds. If Azure Active Directory can't download a CRL, certificate based authentications using certificates issued by the corresponding CA will fail. Best practices to ensure CRL files are within size constraints are to keep certificate lifetimes to within reasonable limits and to clean up expired certificates.
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-mfa-nps-extension-errors.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,6 +14,7 @@ manager: daveba
14
14
ms.reviewer: michmcla
15
15
16
16
ms.collection: M365-identity-device-management
17
+
ms.custom: has-adal-ref
17
18
---
18
19
# Resolve error messages from the NPS extension for Azure Multi-Factor Authentication
19
20
@@ -63,9 +64,9 @@ If you encounter errors with the NPS extension for Azure Multi-Factor Authentica
63
64
64
65
Sometimes, your users may get messages from Multi-Factor Authentication because their authentication request failed. These aren't errors in the product of configuration, but are intentional warnings explaining why an authentication request was denied.
|**OathCodeIncorrect**| Wrong code entered\OATH Code Incorrect | The user entered the wrong code. Have them try again by requesting a new code or signing in again. |
69
+
|**OathCodeIncorrect**| Wrong code entered\OATH Code Incorrect | The user entered the wrong code. Have them try again by requesting a new code or signing in again. |
69
70
|**SMSAuthFailedMaxAllowedCodeRetryReached**| Maximum allowed code retry reached | The user failed the verification challenge too many times. Depending on your settings, they may need to be unblocked by an admin now. |
70
71
|**SMSAuthFailedWrongCodeEntered**| Wrong code entered/Text Message OTP Incorrect | The user entered the wrong code. Have them try again by requesting a new code or signing in again. |
Copy file name to clipboardExpand all lines: articles/active-directory/develop/consent-framework.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Azure AD consent framework
2
+
title: Azure AD consent framework
3
3
titleSuffix: Microsoft identity platform
4
4
description: Learn about the consent framework in Azure Active Directory and how it makes it easy to develop multi-tenant web and native client applications.
Review the following fields and make sure that they have the expected values:
93
94
94
-
#### DomainJoined : YES
95
+
#### DomainJoined : YES
95
96
96
-
This field indicates whether the device is joined to an on-premises Active Directory or not. If the value is **NO**, the device cannot perform a hybrid Azure AD join.
97
+
This field indicates whether the device is joined to an on-premises Active Directory or not. If the value is **NO**, the device cannot perform a hybrid Azure AD join.
97
98
98
-
#### WorkplaceJoined : NO
99
+
#### WorkplaceJoined : NO
99
100
100
101
This field indicates whether the device is registered with Azure AD as a personal device (marked as *Workplace Joined*). This value should be **NO** for a domain-joined computer that is also hybrid Azure AD joined. If the value is **YES**, a work or school account was added prior to the completion of the hybrid Azure AD join. In this case, the account is ignored when using the Anniversary Update version of Windows 10 (1607).
101
102
102
-
#### AzureAdJoined : YES
103
+
#### AzureAdJoined : YES
103
104
104
105
This field indicates whether the device is joined. The value will be **YES** if the device is either an Azure AD joined device or a hybrid Azure AD joined device.
105
-
If the value is **NO**, the join to Azure AD has not completed yet.
106
+
If the value is **NO**, the join to Azure AD has not completed yet.
106
107
107
108
Proceed to next steps for further troubleshooting.
108
109
@@ -154,7 +155,7 @@ Possible reasons for failure:
154
155
- A valid SCP object is required in the AD forest, to which the device belongs, that points to a verified domain name in Azure AD.
155
156
- Details can be found in the section [Configure a Service Connection Point](hybrid-azuread-join-federated-domains.md#configure-hybrid-azure-ad-join).
156
157
- Failure to connect and fetch the discovery metadata from the discovery endpoint.
157
-
- The device should be able to access `https://enterpriseregistration.windows.net`, in the SYSTEM context, to discover the registration and authorization endpoints.
158
+
- The device should be able to access `https://enterpriseregistration.windows.net`, in the SYSTEM context, to discover the registration and authorization endpoints.
158
159
- If the on-premises environment requires an outbound proxy, the IT admin must ensure that the computer account of the device is able to discover and silently authenticate to the outbound proxy.
159
160
- Failure to connect to user realm endpoint and perform realm discovery. (Windows 10 version 1809 and later only)
160
161
- The device should be able to access `https://login.microsoftonline.com`, in the SYSTEM context, to perform realm discovery for the verified domain and determine the domain type (managed/federated).
@@ -172,7 +173,7 @@ Possible reasons for failure:
172
173
- Reason: Operation timed out while performing Discovery.
173
174
- Resolution: Ensure that `https://enterpriseregistration.windows.net` is accessible in the SYSTEM context. For more information, see the section [Network connectivity requirements](hybrid-azuread-join-managed-domains.md#prerequisites).
- Reason: Received an error response from DRS with ErrorCode: "DirectoryError"
@@ -348,7 +349,7 @@ Use Event Viewer logs to locate the phase and errorcode for the join failures.
348
349
- Reason: TPM operation failed or was invalid
349
350
- Resolution: Likely due to a bad sysprep image. Ensure the machine from which the sysprep image was created is not Azure AD joined, hybrid Azure AD joined, or Azure AD registered.
- Resolution: Disable TPM on devices with this error. Windows 10 version 1809 and higher automatically detects TPM failures and completes hybrid Azure AD join without using the TPM.
353
354
-**TPM_E_NOTFIPS** (0x80280036/-2144862154)
354
355
- Reason: TPM in FIPS mode not currently supported.
@@ -397,20 +398,20 @@ Download the file Auth.zip from [https://github.com/CSS-Windows/WindowsDiag/tree
397
398
398
399
## Troubleshoot Post-Join issues
399
400
400
-
### Retrieve the join status
401
+
### Retrieve the join status
401
402
402
403
#### WamDefaultSet: YES and AzureADPrt: YES
403
-
404
-
These fields indicate whether the user has successfully authenticated to Azure AD when signing in to the device.
404
+
405
+
These fields indicate whether the user has successfully authenticated to Azure AD when signing in to the device.
405
406
If the values are **NO**, it could be due:
406
407
407
408
- Bad storage key in the TPM associated with the device upon registration (check the KeySignTest while running elevated).
408
409
- Alternate Login ID
409
410
- HTTP Proxy not found
410
411
411
412
## Known issues
412
-
- Under Settings -> Accounts -> Access Work or School, Hybrid Azure AD joined devices may show two different accounts, one for Azure AD and one for on-premises AD, when connected to mobile hotspots or external WiFi networks. This is only a UI issue and does not have any impact on functionality.
413
-
413
+
- Under Settings -> Accounts -> Access Work or School, Hybrid Azure AD joined devices may show two different accounts, one for Azure AD and one for on-premises AD, when connected to mobile hotspots or external WiFi networks. This is only a UI issue and does not have any impact on functionality.
414
+
414
415
## Next steps
415
416
416
417
Continue [troubleshooting devices using the dsregcmd command](troubleshoot-device-dsregcmd.md)
0 commit comments