Forum Discussion
Convert a SINGLE user from Federated to Managed Authentication and then BACK to Federated... HOW?
- Oct 07, 2019
Do your users authenticate with Domain\Username? If so this change will not affect how the user is logging on to their local machine. I usually just let Outlook prompt stating that it is no longer connected to Microsoft Exchange and prompts for the username and password. Hope this helps! ch0wd0wn
I assume the users are coming from your local AD through AD connect correct? If that is the case you can just change the UPN suffix for that particular user on the domain controller to .onmicroosft.com or another domain that is not federated and force a sync. What is important to note about this is don't change the proxy addresses in the attributes as that will change their actual email address and could make mail for that user bounce. Once that is completed you should see that the users sign in address switch to .onmicrosoft.com and you can then test authentication with the domain password. There is one more method you could try if this does not work for you. Let me know and I can explain the second method if needed.
Yes you are correct, on prem AD with AAD Connect with password sync turned on (eventhough we are using federated authentication through PingFederate)
Ok the only change I'll make is to the UPN for the user. I just want to make sure this doesn't impact his day to day activities like logging into windows...etc which it shouldn't. Do I need to recreate Outlook profile or should I just let it prompt for updated credentials?
Let me try this method first, its easy enough.
Bryan Haslip
- Bryan HaslipOct 07, 2019Iron Contributor
Do your users authenticate with Domain\Username? If so this change will not affect how the user is logging on to their local machine. I usually just let Outlook prompt stating that it is no longer connected to Microsoft Exchange and prompts for the username and password. Hope this helps! ch0wd0wn
- ch0wd0wnOct 09, 2019Copper Contributor
Hey Bryan
Changing the UPN worked, however the user now can't get into Outlook and authenticate or his mobile device... he basically has to use OWA. The authentication keeps prompting over and over even if we created a new Outlook profile. I thought that this should authenticate the user regardless of the application he was using... any thoughts?
- CraigWilson_Oct 12, 2019Brass Contributor
Hi ch0wd0wn
It may be an issue with the domain federation. If AAD detects the domain requires to sign in from services like AD FS etc., then the domain will be redirected when the user enters the email address into M365.
So what may be happening is, when the user connected to outlook on the device, it performs a domain check. If the domain requires authentication via AD FS, then the user would be redirected to that endpoint to login. At this point, the claim token would not match for the users in AAD. The login would fail.
If you can not switch off the redirection for the domain authentication, try getting the user to use the onmicrosoft.com address. All users in AzureAD have username@tenant.onmicrosoft.com address.
- ch0wd0wnOct 07, 2019Copper Contributor
Yes they use domain\username for the most part. THanks so much for the tip!