How to address Federation Trust issues in Hybrid Configuration Wizard (HCW)
Published Jan 31 2020 09:18 AM 71.2K Views

During my day to day work as a part of support organization, I work with and help troubleshoot Hybrid Configuration Wizard (HCW) failures. One of the more common causes of HCW failures is the Federation Trust step for the Exchange on-premises organizations in Full hybrid configurations (Classic or Modern topologies).

Federation trust is a mandatory step in the on-premises Exchange organizations when configuring Full hybrid deployments with Exchange Server 2010 coexistence, as this allows us to create organization relationships (for features like hybrid free/busy or OWA/EAS redirection) and sharing policies (1:1 hybrid calendar sharing). In Exchange Online multi-tenant organizations, federation trust is already in place.

Below is an illustration of an Exchange hybrid deployment where both the Exchange on-premises organization and the Exchange Online organization have a trust with Azure Authentication System (formerly called Microsoft Federation Gateway):

HFB1

More info on federation trust can be found here.

Before getting to our subject, let’s quickly go over different hybrid configurations and Hybrid Configuration Wizard (HCW) - as this is the supported tool to configure hybrid deployments.

There are 2 flavors of hybrid configurations:

At this time, each of those supports the following hybrid modes:

  1. Full
  2. Minimal (which further breaks down into…)
    1. Express (a one-time sync)
    2. “Actual minimal”

A quick overview of Full / Minimal / Express options, can be found here. More info on HCW is here.

As mentioned earlier, a federation trust is created by HCW only in Full Hybrid.

HCW logs are located at %appdata%\Microsoft\Exchange Hybrid Configuration on the machine from where HCW was ran. The easiest way to get to them is to press F12 in the HCW window to open the Diagnostic tools and from there you can Open Folder Logging or Open Log File directly.

When you have issues with federation trust, the log will usually show errors when one of the following cmdlets are executed: Set-FederationOrganizationIdentifier or Add-FederatedDomain (but can be other cmdlets as well).

Once you identified the exact cmdlet failing and where (Session=OnPremises – means Exchange Management Shell and Session=Tenant means Exchange Online PowerShell), you should copy-paste the failing command and try to execute it manually and see if that is failing as well (most likely it will). You can also open the shells from F12 Diagnostic tools windows in HCW.

In order to get more details on the error and to rule out this is not an issue with HCW itself, you will need to separately run the same command that threw exception in HCW log and add Verbose switch to get verbose details of the error and the serialized remote exception.

For example, if the Exchange server version is Exchange 2010, you will run the failing command with Verbose switch in Exchange Management Shell (EMS), see if that fails and then get the serialized remote exception.

Example:

 

 

start-transcript
Set-FederatedOrganizationIdentifier -AccountNamespace <contoso.com> -DelegationFederationTrust 'Microsoft Federation Gateway' -Enabled:$true -VERBOSE
$Error[0].Exception |fl -f
$Error[0].Exception.SerializedRemoteException |fl –f
Get-FederatedOrganizationIdentifier |FL
Get-FederationTrust |FL
stop-transcript

 

 

If the Exchange Server version is Exchange 2013/2016 and the above commands didn’t show more details on the error, we can also try the following:

  1. Open regular Windows PowerShell (blue background) on the Exchange Server 2013/2016
  2. Run command: add-pssnapin *exchange*
  3. Run command that gave error in HCW and add a Verbose switch

Example:

 

 

start-transcript
Set-FederatedOrganizationIdentifier -AccountNamespace <contoso.com> -DelegationFederationTrust 'Microsoft Federation Gateway' -Enabled:$true -DefaultDomain $null -VERBOSE 
$Error[0].Exception |fl -f
$Error[0].Exception.SerializedRemoteException |fl –f
Get-FederatedOrganizationIdentifier |FL
Get-FederationTrust |FL
stop-transcript

 

 

Once you've gathered the verbose error / serialized exception, try to understand where it is failing (or provide it to Microsoft Support together with the HCW log).

We have gathered some common federation trust errors and some tips to fix them:

1. Federation trust fails with "Object reference not set to an instance of an object"

This is a known old issue on Exchange 2016 CU7 servers, make sure your Exchange servers are updated to the latest CU.

Full error in the HCW log:

 

 

2017.10.06 01:45:56.562 *ERROR* 10277 [Client=UX, Activity=Domain Ownership, Session=OnPremises, Cmdlet=Set-FederatedOrganizationIdentifier, Thread=21] FINISH Time=398.4ms Results=PowerShell failed to invoke 'Set-FederatedOrganizationIdentifier': Object reference not set to an instance of an object. An unexpected error has occurred and a Watson dump is being generated: Object reference not set to an instance of an object.
2017.10.06 01:45:56.563 *ERROR* 10224 [Client=UX, Page=DomainProof, Thread=21] Microsoft.Online.CSE.Hybrid.PowerShell.PowerShellInvokeException: PowerShell failed to invoke 'Set-FederatedOrganizationIdentifier': Object reference not set to an instance of an object. An unexpected error has occurred and a Watson dump is being generated: Object reference not set to an instance of an object. ---> System.Management.Automation.RemoteException: Object reference not set to an instance of an object.

 

 

Resolution: Install the latest CU for Exchange 2016

2. Federation fails with "Proof of domain ownership has failed"

Full error in the HCW log:

 

 

2019.07.16 17:53:14.750 10276 [Client=UX, Activity=Domain Ownership, Session=OnPremises, Cmdlet=Add-FederatedDomain, Thread=19] START Add-FederatedDomain -DomainName 'contoso.com'
2019.07.06 17:53:15.375 10177 [Client=UX, Activity=Domain Ownership, Provider=OnPremises, Thread=19] PowerShell Error Record: {CategoryInfo={Activity=Add-FederatedDomain,Category=InvalidResult,Reason=DomainProofOwnershipException,TargetName=,TargetType=},ErrorDetails=,Exception=Proof of domain ownership has failed. Make sure that the TXT record for the specified domain is available in DNS. The format of the TXT record should be "example.com IN TXT hash-value" where "example.com" is the domain you want to configure for Federation and "hash-value" is the proof value generated with "Get-FederatedDomainProof -DomainName example.com".,FullyQualifiedErrorId=367408EF,Microsoft.Exchange.Management.SystemConfigurationTasks.AddFederatedDomain}

 

 

Resolution:

  • Check the TXT record for your domain(s) in HCW log or in Exchange Management Shell with command Get-FederatedDomainProof -DomainName <CONTOSO.COM>
  • See if it matches your published TXT record with either nslookup utility or by checking internet websites like https://digwebinterface.com/ put your domain in hostnames, type=txt, Nameservers - Authoritative

You would look for errors, missing records or unusual formatting (characters, spaces, quotes, TXT record split in half).

3. Federation fails with "An unexpected error occurred on a receive" or "An unexpected error occurred on a send."

Error in the HCW log:

 

 

2018.10.10 17:03:31.277 *ERROR* [Activity=Domain Ownership, Session=OnPremises, Cmdlet=Set-FederatedOrganizationIdentifier] FINISH Time=64.3s Results=PowerShell failed to invoke 'Set-FederatedOrganizationIdentifier': An error occurred while attempting to provision Exchange to the Partner STS. Detailed Information "An error occurred accessing Windows Live. Detailed information: "The underlying connection was closed: An unexpected error occurred on a receive.".".

 

 

Verbose log shows something like this:

 

 

Set-FederatedOrganizationIdentifier -AccountNamespace 'domain.com' -DelegationFederationTrust 'Microsoft Federation Gateway' -Enabled: $true -DefaultDomain $null -Verbose VERBOSE: [12:29:07.754 GMT] Set-FederatedOrganizationIdentifier : Calling 'CreateAppId(uri='FYDIBOHF25SPDLT.domain.com',properties=[0])' at the domain services endpoint https://domains.live.com/service/managedelegation2.asmx . VERBOSE: [12:29:08.535 GMT] Set-FederatedOrganizationIdentifier : The request to Windows Live Domain Services failed with the following exception: 
[0]: Microsoft.Exchange.Management.FederationProvisioning.LiveDomainServicesException An error occurred accessing Windows Live. Detailed information: "The underlying connection was closed: An unexpected error occurred on a send.".
[1]: System.Net.WebException The underlying connection was closed: An unexpected error occurred on a send.
[2]: System.IO.IOException Unable to read data from the transport connection: An existing connection was forcibly closed by the remote host.
[3]: System.Net.Sockets.SocketException An existing connection was forcibly closed by the remote host

 

 

Resolution:

Check outbound access from all your Exchange Servers to Microsoft Federation Gateway by browsing using Internet Explorer with PSEXEC tool (with -s and -i switches) from the Exchange Server (this will use Internet Explorer under System Account / Exchange Server Account). Example of cmdlet:

…\Downloads\PSTools> PsExec.exe -i -s "c:\Program Files\Internet Explorer\iexplore.exe"

In this example, “Windows Live” is actually this exact URL: https://domains.live.com/service/managedelegation2.asmx

From on-premises Exchange to Office 365, the Exchange 2010 MBX & CAS or 2013 MBX (backend) or 2016 / 2019 would need outbound Internet access to the Microsoft Federation Gateway in addition to https://outlook.office365.com/ews/exchange.asmx

Verify the machine/system account can access these Microsoft Federation Gateway URLs:

For a complete list of O365 URL & IP addresses, see these articles:

Note: If the Exchange requires a proxy server to access the Internet, specify the proxy server using "Set-ExchangeServer myExchange01 -InternetWebProxy http://myproxy:80". Notice such proxy can't require any user authentication for outbound Internet access, and the proxy must start with HTTP: and not HTTPS: (secure SSL).

Another common cause for this error is TLS 1.2. Please make sure your on-premises environment supports TLS 1.2, Office 365 has deprecated TLS protocols 1.0 and 1.1, references below on how to implement TLS 1.2.

In rare instances, you can use the machine/system account to access the URLs from the browser, but Exchange cmdlets still failed with "Could not establish trust relationship for the SSL/TLS secure channel." If that happens, make sure the certificate authorities for the urls are installed at the Third-Party Root Certification Authorities of the machine local certificate location.

Reference:

Netsh Commands for Windows Hypertext Transfer Protocol (WINHTTP)

Firewall Considerations for Federated Delegation Federated delegation features require that the Mailbox and Client Access servers in your organization have outbound access to the Internet by using HTTPS. You must allow outbound HTTPS access (port 443 for TCP) from all Exchange 2010 Mailbox and Client Access servers in the organization.

4. There is no specific error / exception, in HCW log you would see it stops without any specific error.

From the HCW log:

 

 

2019.02.14 12:56:21.658 [Activity=Domain Ownership, Session=OnPremises, Cmdlet=Get-FederatedOrganizationIdentifier] FINISH Time=133.0ms Results=1 FederatedOrganizationIdWithDomainStatus {AccountNamespace='FYDIBOHF25SPDLT.contoso.com' DelegationTrustLink='contoso.local/Configuration/Deleted Objects/Microsoft Federation Gateway DEL:8e834abf-5154-4540-a3c6-5a5c614c6a06'Enabled=1 ExchangeVersion='0.10 (14.0.100.0)' Guid=2e1da884-9686-4221-8098-d34ced5a2f85 Id='Federation' Identity='Federation' IsValid=1 Name='Federation' ObjectState='Unchanged' WhenChanged='8/11/2015 5:35:58 PM' WhenChangedUTC='8/11/2015 2:35:58 PM' WhenCreated='10/18/2009 10:30:09 AM' WhenCreatedUTC='10/18/2009 6:30:09 AM'}
2019.02.14 12:56:21.677 [Client=UX, Page=DomainProof] Unproven Domains: 1

 

 

Resolution:

Look for orphaned federation trust in Get-FederatedOrganizationIdentifier | FL or in HCW log if you see something with "DEL": "contoso.com/Configuration/Deleted Objects/Microsoft Federation Gateway/DEL: <xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxx>". Solution is to remove the orphaned federation trust and re-run HCW.

Reference here.

Note: as a first step, you can try to run the command remove-federateddomain with the switch -Force. Also, you don't need to recreate federation trust manually, just re-run HCW (this will recreate federation trust for us)

5. Federation Trust fails with "InternalError InternalError: Internal error.".".""

Error from the HCW log:

 

 

2019.08.23 07:45:22.914         10276 [Client=UX, Activity=Domain Ownership, Session=OnPremises, Cmdlet=Set-FederatedOrganizationIdentifier, Thread=20] START Set-FederatedOrganizationIdentifier -AccountNamespace 'contoso.com' -DelegationFederationTrust 'Microsoft Federation Gateway' -Enabled: $true -DefaultDomain $null
2019.08.23 07:45:23.239 *ERROR* 10277 [Client=UX, Activity=Domain Ownership, Session=OnPremises, Cmdlet=Set-FederatedOrganizationIdentifier, Thread=20] FINISH Time=325.0ms Results=PowerShell failed to invoke 'Set-FederatedOrganizationIdentifier': An error occurred while attempting to provision Exchange to the Partner STS.  Detailed Information "An unexpected result was received from Windows Live.  Detailed information: "InternalError InternalError: Internal error.".". {CategoryInfo={Activity=[System.String] Set-FederatedOrganizationIdentifier,Category=[System.Management.Automation.ErrorCategory] InvalidResult,Reason=[System.String]

 

 

Resolution:

Open request with Microsoft Support or check if any Service Incident is published. Please see this.

6. Federation trust fails with "1007 Access Denied"

Error from the HCW log:

 

 

Set-FederatedOrganizationIdentifier,Category=[System.Management.Automation.ErrorCategory] InvalidResult,Reason=[System.String] ProvisioningFederatedExchangeException,TargetName=[System.String] ,TargetType=[System.String] },ErrorDetails=,Exception=[System.Management.Automation.RemoteException] An error occurred while attempting to provision Exchange to the Partner STS.  Detailed Information "An unexpected result was received from Windows Live.  Detailed information: "1007 AccessDenied: Access Denied."."

 

 

Resolution:

"1007 Access Denied" error is usually when we have issues with:

  1. Windows Time on the Exchange Server. See this article or this article.
  2. Outdated federation trust (for example, federation trust certificate expired) and in this case you would remove federation trust by following these steps.

If the federation trust certificate is not found on any of the servers, then proceed with resolution from the next error.

As an example, from one HCW log, there seems to be this federation trust certificate expired on 13/05/2019:

 

 

OrgCertificate=[Subject] CN=Federation [Issuer] CN=Federation [Serial Number] 4E91XXXXXXXXXXXXXXXXXXXXXXXXXXXX [Not Before] 5/13/2014 11:21:36 AM [Not After] 5/13/2019 11:21:36 AM

 

 

7. Federation trust fails with “Federation Certificate cannot be found”
Error from HCW log:

 

 

2019.11.22 14:40:32.569 *ERROR* 10277 [Client=UX, Activity=Domain Ownership, Session=OnPremises, Cmdlet=Get-FederatedDomainProof, Thread=6] FINISH Time=125.1ms Results=PowerShell failed to invoke Get-FederatedDomainProof: Federation certificate with the thumbprint ‘03650FFAF05E83E3B007DF3473CB5753F5C4459’cannot be found.

 

 

Resolution:

Follow the procedure here to manually cleanup the federation trust from AD. Once this is done, re-run HCW to re-create it automatically.

Hopefully, this helps with troubleshooting those errors! I wanted to thank Raymond Fong and Nino Bilic for their review of this post.

Mirela Buruiana

13 Comments
Copper Contributor

This is great, but the struggle I'm having is that may exchange 2010 server wants to use an old proxy server to access the internet.  Here's what I've tried:  

1. I made sure it was removed from internet options

2. Run the netsh proxy reset command  (It shows direct connection)

3. Removed it from the HKLU registry for all users on the box

4. Searched all exchange/IIS .config files for any trace of the proxy server name.

5. Browsed to the nexus federation metata file without an issue.

6. Rebooted the server

 

Any other thoughts?  When I run the command:

New-FederationTrust -Name 'Microsoft Federation Gateway' -Thumbprint 1E60F7D21795D75F0CC51CA22644251BFD4D1CDA -Verbose, here's what I get:

VERBOSE: [21:08:01.167 GMT] New-FederationTrust : Active Directory session settings for 'New-FederationTrust' are: View Entire Forest: 'False', Default Scope: 'mydomain.local', Configuration Domain Controller: 'mydc.mydomain.local', Preferred Global
Catalog: 'mydc.mydomain.local', Preferred Domain Controllers: '{ mydc.mydomain.local}'
VERBOSE: [21:08:01.167 GMT] New-FederationTrust : Runspace context: Executing user: mydomain.local/Users and Groups/Network Admins/Admin, Executing user organization: , Current organization: , RBAC-enabled: Enabled.
VERBOSE: [21:08:01.167 GMT] New-FederationTrust : Beginning processing &
VERBOSE: [21:08:01.167 GMT] New-FederationTrust : Instantiating handler with index 0 for cmdlet extension agent "Admin Audit Log Agent".
VERBOSE: [21:08:01.183 GMT] New-FederationTrust : Current ScopeSet is: { Recipient Read Scope: {{, }}, Recipient Write Scopes: {{, }}, Configuration Read Scope: {{, }}, Configuration Write Scope(s): {{, }, }, Exclusive Recipient Scope(s):
{}, Exclusive Configuration Scope(s): {} }
VERBOSE: [21:08:01.183 GMT] New-FederationTrust : Processing object "Microsoft Federation Gateway".
VERBOSE: [21:08:01.183 GMT] New-FederationTrust : Searching the local certificate store for a certificate with thumbprint "1E60F7D21795D75F0CC51CA22644251BFD4D1CDA".
VERBOSE: [21:08:01.198 GMT] New-FederationTrust : Admin Audit Log: Entered Handler:Validate.
VERBOSE: [21:08:01.198 GMT] New-FederationTrust : Admin Audit Log: Exited Handler:Validate.
VERBOSE: Creating new Federation Trust "Microsoft Federation Gateway" for federation partner "LiveId". Federation certificate has thumbprint "1E60F7D21795D75F0CC51CA22644251BFD4D1CDA".
VERBOSE: [21:08:01.198 GMT] New-FederationTrust : Resolved current organization: .
VERBOSE: [21:08:01.198 GMT] New-FederationTrust : Requesting Federation Metadata from https://nexus.passport.com/FederationMetadata/2006-12/FederationMetadata.xml.
VERBOSE: [21:08:22.212 GMT] New-FederationTrust : Failed to retrieve Federation Metadata from the Microsoft Federation Gateway. This operation will be retried in a few seconds. Last error: System.Net.WebException: Unable to connect to the
remote server ---> System.Net.Sockets.SocketException: A connection attempt failed because the connected party did not properly respond after a period of time, or established connection failed because connected host has failed to respond
10.50.10.50:1050
at System.Net.Sockets.Socket.DoConnect(EndPoint endPointSnapshot, SocketAddress socketAddress)
at System.Net.ServicePoint.ConnectSocketInternal(Boolean connectFailure, Socket s4, Socket s6, Socket& socket, IPAddress& address, ConnectSocketState state, IAsyncResult asyncResult, Int32 timeout, Exception& exception)
--- End of inner exception stack trace ---
at System.Net.HttpWebRequest.GetResponse()
at Microsoft.Exchange.Management.FederationProvisioning.PartnerFederationMetadata.GetFederationMetadataXPathDocument(Uri partnerFederationMetadataEpr).
VERBOSE: [21:08:48.248 GMT] New-FederationTrust : Failed to retrieve Federation Metadata from the Microsoft Federation Gateway. This operation will be retried in a few seconds. Last error: System.Net.WebException: Unable to connect to the
remote server ---> System.Net.Sockets.SocketException: A connection attempt failed because the connected party did not properly respond after a period of time, or established connection failed because connected host has failed to respond
10.50.10.50:1050
at System.Net.Sockets.Socket.DoConnect(EndPoint endPointSnapshot, SocketAddress socketAddress)
at System.Net.ServicePoint.ConnectSocketInternal(Boolean connectFailure, Socket s4, Socket s6, Socket& socket, IPAddress& address, ConnectSocketState state, IAsyncResult asyncResult, Int32 timeout, Exception& exception)
--- End of inner exception stack trace ---
at System.Net.HttpWebRequest.GetResponse()
at Microsoft.Exchange.Management.FederationProvisioning.PartnerFederationMetadata.GetFederationMetadataXPathDocument(Uri partnerFederationMetadataEpr).
VERBOSE: [21:09:14.269 GMT] New-FederationTrust : Admin Audit Log: Entered Handler:OnComplete.
VERBOSE: [21:09:14.285 GMT] New-FederationTrust : Admin Audit Log: Exited Handler:OnComplete.
Unable to access the Federation Metadata document from the federation partner. Detailed information: "Unable to connect to the remote server".
+ CategoryInfo : MetadataError: (:) [New-FederationTrust], FederationMetadataException
+ FullyQualifiedErrorId : B77AC03F,Microsoft.Exchange.Management.SystemConfigurationTasks.NewFederationTrust

VERBOSE: [21:09:14.285 GMT] New-FederationTrust : Ending processing &

 

Please note: We do not have a proxy server.

 

What service actually handles the call to the federation?  (Hoping to dive deeper with process explorer).  Any other thoughts?

 

 

Microsoft

@johndennis250 , I am sorry, I didn't see the comment and I wasn't notified about it. I really hope you managed to find the issue / old proxy.

These would have been my suggestions:

  1. Run this Exchange Management Shell on-premises: Get-ExchangeServer | FL identity, admindisplayversion, serverrole, *proxy*
  2. Run in CMD netsh winhttp show proxy
  3. Download PSExec tool on the Exchange server(s) – start with the server that threw the error  and run the following command PsExec.exe -i -s "c:\Program Files\Internet Explorer\iexplore.exe" to launch IE under System Account.

Now, in IE settings, check if any proxy is set there or if you have “Automatically Detect Settings” Enabled for the Local System Account combined with PAC file.
From on-premises Exchange to Office 365, the Exchange 2010 MBX & CAS or 2013 MBX (backend) or 2016 / 2019 would need outbound Internet access to the Microsoft Federation Gateway in addition to https://outlook.office365.com/ews/exchange.asmx

 

Verify the machine/system account can access these Microsoft Federation Gateway URLs:

https://nexus.microsoftonline-p.com/federationmetadata/2006-12/federationmetadata.xml  [<-- You should see an xml page.]

https://login.microsoftonline.com/extSTS.srf   [<-- You should see “Sorry, but we’re having trouble signing you in”.]

https://domains.live.com/service/managedelegation2.asmx   [<-- You should see the operations supported by ManageDelegation2.]


4. On the Exchange server(s) open regedit and see if a proxy is set there: HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ by looking at ProxyEnable if 1 and a ProxyServer is set.

Copper Contributor

Hi. Just a little question: does the HCW Wizard change something in the local users Attribut (AD)? I have a problem with duplicate mailboxes, because we added Ex Online Licences to some users, then we made ADConnect. Now Users have two mailboxes. Am I correct that HCW not change anything? I still need Data Ex Online and Ex on Prem for the same Uers. thanks.

Microsoft

HCW doesn't change anything in the user attributes. It is the directory synchronization process (AADConnect) that syncs attributes from on-premises to EXO and some attributes are written back to on-premises). 

In a regular Hybrid deployment, you have mailboxes on-premises, you bring AADConnect and synchronize the users to cloud. These users will be mail users in cloud with ExchangeGuid (on-premises mailbox identifier) synced from on-premises. The ExchangeGuid tells EXO that the user has a mailbox based on premises and even if you assign an EXO license to these users, we won't create another mailbox in cloud. But if you don't have the ExchangeGuid on the cloud user then we wouldn't know that the cloud user has a mailbox on-premises so we will give the user a cloud mailbox when assigning an Exchange Online license. 

Here are some references on two mailboxes scenario:
https://techcommunity.microsoft.com/t5/exchange-team-blog/permanently-clear-previous-mailbox-info/ba... 

https://docs.microsoft.com/en-us/exchange/troubleshoot/user-and-shared-mailboxes/mailbox-exists-exo-... 

 

Copper Contributor

Hi

I'm trying to establish a free/busy lookup between Exchange on-prem (with hybrid) and a partner mail domain on GSuite.

Exchange on-prem side, I configured using the availability configuration the account to lookup from GSuite to Exchange, all is working fine.

Then, I configured the availability address space with the proper email domain, authentication credential and TargetAutodiscoverEpr, but looking up from Exchange to GSuite I get the error "Microsoft.Exchange.InfoWorker.Common.Availability.AddressSpaceNotFoundException: Configuration information for forest\/domain domain.com could not be found in Active Directory".

Remote GSuite users have a mail contact with the proper primary address set in Exchange org.

Exchange servers can access Internet without proxy and browsing manually to the target URL providing credentials I get authenticated correctly.

 

Any hints what could prevent to identify the configured availability address spece in AD?

 

Thanks a lot!

Microsoft

Hi @aconti1974 , I don't know if this scenario should work. But the error is complaining about domain.com. Make sure ForestName in Get-AvailabilityAddressSpace is indeed domain.com and that the Target G Suite Users have SMTP user@domain.com. If the users have different  Primary SMTP than ExternalEmailAddress, try with a user where both SMTP and target address resolve to the SAME ForestName. 

Copper Contributor

Thanks for your quick reply.

I confirm email domain corresponds in the configured address space forest name and user contact SMTP, and the mail attribute is the same as targetAddress attribute.

According to the Google Calendar Interop configuration guide, contacts and availability address space are the only configurations requested on Exchange, as in other cross-forest un-trusted configuration between two Exchange orgs.

 

I'll dig more trying to figure out why the address space is not matched.

 

Thank you

 

Microsoft

You can also try the Free/Busy test https://testconnectivity.microsoft.com/tests/FreeBusy/input where you put source user and target user SMTP and see if this complains about the same error or different. And you can Private message me the HTML report if same error. 

Copper Contributor

Hi @Mirela_Buru @The_Exchange_Team 

 

realise this is an old post, but having an issue with onprem shared mailboxes being visible to user mailboxes that have been migrated to 365. I have configure the HCW to be a Full Modern with agent. setup was green across the board, but im wondering if the possible cause is due to a federated trust not being configured as part of the Modern setup? and therefore the relevant permissions between onprem and O365 are not in place?

Microsoft

@Stu101, if I understood well, your scenario is cross-premises full access between cloud and on-premises?  Not related to federation trust. Just make sure Get-MailboxPermission is in place for those users / mailboxes. Sometimes, during migration, we fail to map these permissions to users (for example, SID changed on-premises or the user was not synced to AAD at the time of migration).

Copper Contributor

Thanks for info.

Copper Contributor

Hi there,

 

I have an updated Exchange 2013 and trying to set up federation.

I keep receiving the following

An error occurred while attempting to provision Exchange to the Partner STS. Detailed Information "An error occurred accessing Windows Live. Detailed information: "The underlying connection was closed: An unexpected error occurred on a send."."."

It does not work neither with nor without proxy.

Outbound internet connection is available and I was able to access the websites mentioned above.

Do you any ideas as of why is failing?

 

Thanks

Microsoft

Hello everyone, 

 

This could help you...

After upgrading from a lower to a higher version (e.g. Exch 2010 to 2013) you may need to re-build TLS 1.2 on the server.

 

When running the HCW, it stuck around the domain validation and by running this command in powershell we could see this error

few check to be 100% the issue root

 

1-From the Exchange on-premises server, in windows PowerShell as admin run:

Add-Pssnapin *exchange*

Set-FederatedOrganizationIdentifier -AccountNamespace domain.com -DelegationFederationTrust "Microsoft Federation Gateway" -Enabled: $true -verbose

-From the output we got

[3]: System.Net.Sockets.SocketException
An existing connection was forcibly closed by the remote host SocketErrorCode: ConnectionReset ErrorCode: 10054
at System.Net.Sockets.NetworkStream.Read(Byte[] buffer, Int32 offset, Int32 size)

 

2-See if this site open ok
https://domains.live.com/service/managedelegation2.asmx 

SOLUTION

-Re-build the TLS 1.2 in the server by runing the .ps1, check below:

Enable TLS 1.2 in Windows Server · GitHub

Co-Authors
Version history
Last update:
‎Jul 17 2023 01:28 PM
Updated by: