Dec 04 2017
04:01 AM
- last edited on
Feb 01 2023
09:19 AM
by
TechCommunityAP
Dec 04 2017
04:01 AM
- last edited on
Feb 01 2023
09:19 AM
by
TechCommunityAP
Studying to prepare exams 70-346 Managing O365 identities... and reading https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/operations/manage-ssl-certificates-ad... it seems to be possible to use a Service Communication Certificate issued by an internal Root CA. Correct?
I'm asking as I set up a test environment with an internal CA, trusted by the connecting client, but the user is not authenticated, without any error on ADFS Server or WAP server event viewer. It I mistype the password, I get the error both on authentication page and event viewer.
Thank you for you support,
Enrico
Dec 04 2017 12:55 PM
It's possible, yes, and should be working. Any particular error you are receiving on the client side? "Success" events are not audited by default, so you might simply be missing those in the event logs - make sure to enable logging for them as detailed for example here: http://jorgequestforknowledge.wordpress.com/2013/07/08/enabling-auditing-of-issued-claims-in-adfs-v2...
Dec 05 2017 03:50 AM
Dec 05 2017 11:28 AM
SolutionNope, AD FS only works for on-premises accounts (synced to Office 365 or manually "matched").
Dec 05 2017 11:28 AM
SolutionNope, AD FS only works for on-premises accounts (synced to Office 365 or manually "matched").