Forum Discussion
new Exchange Installation Autodiscover
- Nov 16, 2025
Hi,
As per my understanding, Your Domain Is Still Federated.
Go to Entra ID → Custom Domain Names and check your domain.
It will likely show:
Authentication Type: Federated
instead of:
Authentication Type: ManagedThis happens because: Old lab used ADFS
You created a new lab but synced the same domain name, Entra ID stored the old federation configuration, including metadata, Sign-in URL, and IssuerURI
How to Fix the Issue: Convert Domain from Federated → Managed (recommended)Once you convert:
Outlook autodiscover will stop redirecting to ADFS
Hi,
As per my understanding, Your Domain Is Still Federated.
Go to Entra ID → Custom Domain Names and check your domain.
It will likely show:
Authentication Type: Federated
instead of:
Authentication Type: Managed
This happens because: Old lab used ADFS
You created a new lab but synced the same domain name, Entra ID stored the old federation configuration, including metadata, Sign-in URL, and IssuerURI
How to Fix the Issue: Convert Domain from Federated → Managed (recommended)
Once you convert:
Outlook autodiscover will stop redirecting to ADFS
- Mame MeierNov 26, 2025Copper Contributor
Hi
my internet connection is stable and I am still getting an error on the command:
PS C:\WINDOWS\system32> Update-MgDomain -DomainId DOMAIN -AuthenticationType "Managed"
Update-MgDomain : Insufficient privileges to complete the operation.
Status: 403 (Forbidden)
ErrorCode: Authorization_RequestDenied
Date: 2025-11-26T13:28:48How do I check my privileges on EntrID. I am "almost" sure I do have the sufficient rights. My account is set as DomainAdministrator
THX
- Nov 30, 2025
Hi,
1. Check your Entra ID role in the Azure Portal
- Go to: https://entra.microsoft.com
- In the left menu → Identity
- Select Users
- Search and open your account
- Click Assigned roles
You will now see whether you have roles such as:
- Global Administrator
- Privileged Role Administrator
- Security Administrator
- Cloud Application Administrator
- Application Administrator
- User Administrator
These are the cloud roles that matter for Entra ID.
2. Check your Entra roles via PowerShell
Run:
Connect-MgGraph -Scopes "RoleManagement.Read.All"
Get-MgUserAppRoleAssignment -UserId "<YourUPN>" | Select-Object ResourceDisplayName,AppRoleId