SOLVED
Home

ADFS and SSO for Exchange Online

%3CLINGO-SUB%20id%3D%22lingo-sub-134602%22%20slang%3D%22en-US%22%3EADFS%20and%20SSO%20for%20Exchange%20Online%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-134602%22%20slang%3D%22en-US%22%3E%3CP%3EI%20hope%20this%20is%20the%20right%20spot%20for%20this%20post...%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%20have%20Office%20365%20E3%20in%20our%20environment%2C%20setup%20using%20ADFS.%26nbsp%3B%20All%20of%20our%20email%20is%20in%20Exchange%20Online.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EBecause%20of%20this%20-%20when%20a%20user%20opens%20up%20MS%20Edge%2C%20and%20browses%20to%20%3CA%20href%3D%22https%3A%2F%2Foutlook.office.com%2Fourdomain.dom%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Foutlook.office.com%2Fourdomain.dom%3C%2FA%3E%20they%20are%20*magically*%20auto-signed%20into%20their%20mailbox.%26nbsp%3B%20Who%20doesn't%20like%20magic%20%3A)%3C%2Fimg%3E%20%3F%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThis%20is%20great%20for%20most%20of%20our%20users%20-%20however%20I%20have%20a%20small%20set%20of%20desktop%20computers%20that%20are%20shared%20workstations%2C%20with%20an%20auto-login%2C%20shared%20user%20account.%26nbsp%3B%20Because%20it%20is%20a%20shared%20workstation%20and%20shared%20user%20account%20-%20they%20do%20not%20have%20an%20email%20account.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EI%20recently%20got%20a%20request%20to%20add%20a%20desktop%20shortcut%20to%20these%20machines%20for%20people%20to%20login%20to%20their%20exchange%20online%20mailbox%20via%20the%20web%20browser.%26nbsp%3B%20When%20I%20try%20to%20go%20to%20the%20login%20page%20I%20either%20get%20a%20failed%20to%20login%20error%20OR%20a%20loop%20to%20select%20my%20timezone.%26nbsp%3B%20I%20am%20guessing%20because%20the%20logged%20on%20user%20does%20not%20have%20a%20mailbox%2C%20and%20the%20ADFS%20is%20trying%20to%20perform%20SSO.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAny%20ideas%20how%20to%20get%20around%20this%20issue%20for%20these%20machines%3F%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThanks%3C%2FP%3E%0A%3CP%3ESteve%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-134602%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAuthentication%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EExchange%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EIdentity%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EOffice%20365%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-370821%22%20slang%3D%22en-US%22%3ERe%3A%20ADFS%20and%20SSO%20for%20Exchange%20Online%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-370821%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F301769%22%20target%3D%22_blank%22%3E%40geoperkins%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EInteresting%20approach.%26nbsp%3B%20A%20few%20months%20ago%2C%20due%20to%20some%20password%20spray%20attacks%20we%20disabled%20our%20ADFS%20and%20went%20back%20to%20O365%20authentication.%20Given%20that%20we%20were%20only%20ADFS%20to%20gain%20conditional%20access%20functionality%2C%20which%20is%20part%20of%20EMS%20now.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThank%20you%20for%20sharing!%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-370691%22%20slang%3D%22en-US%22%3ERe%3A%20ADFS%20and%20SSO%20for%20Exchange%20Online%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-370691%22%20slang%3D%22en-US%22%3E%3CP%3EOur%20organization%20was%20able%20to%20solve%20this%20problem%20and%20I%20documented%20the%20solution%20over%20on%20%3CA%20title%3D%22TechNet%22%20href%3D%22https%3A%2F%2Fsocial.technet.microsoft.com%2FForums%2Fen-US%2F79c2050b-9977-4524-83a5-eb47d86e2f96%2Fbypass-adfs-sso-url-side-door-into-portalofficecom%3Fforum%3DADFS%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3ETechNet%3C%2FA%3E%20(%22%3CA%20href%3D%22https%3A%2F%2Fsocial.technet.microsoft.com%2FForums%2Fen-US%2F79c2050b-9977-4524-83a5-eb47d86e2f96%2Fbypass-adfs-%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fsocial.technet.microsoft.com%2FForums%2Fen-US%2F79c2050b-9977-4524-83a5-eb47d86e2f96%2Fbypass-adfs-%3C%2FA%3E...)%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F7987%22%20target%3D%22_blank%22%3E%40Stephen%20Bell%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-159994%22%20slang%3D%22en-US%22%3ERe%3A%20ADFS%20and%20SSO%20for%20Exchange%20Online%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-159994%22%20slang%3D%22en-US%22%3E%3CP%3EThank%20you%20again%20for%20your%20replies%2C%20I%20appreciate%20you%20taking%20the%20time.%26nbsp%3B%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EI%20believe%20I%20understand%20exactly%20what%20you%20are%20saying%20regarding%20SSO%20%2F%20realm%20selection.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ECurrently%2C%20I%20am%20not%20seeing%20any%20realm%20selection%20when%20I%20open%20IE%2FEdge%20and%20browse%20to%20%3CA%20href%3D%22https%3A%2F%2Foutlook.office.com%26nbsp%3B%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Foutlook.office.com%26nbsp%3B%3C%2FA%3E%20--%20without%20domain%20hint.%26nbsp%3B%20This%20should%20send%20me%20to%20the%20external%2C%20Microsoft%20login%20page.%20Once%20I%20enter%20my%20email%20address%2C%20because%20my%20domain%20is%20federated%2C%20I%26nbsp%3Bwould%20be%20redirected%20to%20my%20company%20login%20page%20-%20which%20in%20this%20instance%20is%20INTRANET%2C%20as%20these%20shared%20devices%20are%20on%20my%20internal%20network%20and%20DNS%20resolves%20the%20sts.mycompany.com%20to%20our%20ADFS%20server%2C%20not%20our%20WAP.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAs%20for%20modern%20auth%2C%20yes%2C%20I%20believe%20it%20is%20enabled.%26nbsp%3B%20I%20will%20check%20further%20to%20confirm.%26nbsp%3B%20I%20guess%20I%20always%20thought%20of%20modern%20auth%20being%20for%20outlook%20only%2C%20not%20thinking%20about%20the%20implications%20with%20the%20other%20Office%20Pro%20Plus%20applications.%26nbsp%3B%20These%20machines%20I%20am%20working%20with%20do%20not%20have%20Outlook%20currently%20installed.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThanks%20again!%3C%2FP%3E%0A%3CP%3ESteve%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-159986%22%20slang%3D%22en-US%22%3ERe%3A%20ADFS%20and%20SSO%20for%20Exchange%20Online%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-159986%22%20slang%3D%22en-US%22%3EOffice%20being%20open%20constitutes%20a%20login%2C%20and%20we%20will%20assume%20you%20have%20Modern%20Auth%20enabled%2C%20so%20the%20login%20control%20uses%20the%20web%20control%20in%20Windows%20(IE%2FEdge).%20Therefore%20you%20have%20a%20current%20valid%20cookie%20in%20play%2C%20so%20you%20get%20logged%20in.%3CBR%20%2F%3E%3CBR%20%2F%3EFor%20Chrome%2C%20you%20do%20not%20mention%20where%20you%20are%20(intranet%20or%20extranet)%2C%20or%20what%20endpoint%20you%20would%20be%20hitting.%20Also%20you%20can%20enable%20WIA%20for%20Chrome%20and%20get%20SSO%20in%20Chrome.%3CBR%20%2F%3E%3CBR%20%2F%3ENote%20that%20on%20the%20intranet%20they%20will%20always%20try%20to%20do%20SSO%20-%20I%20think%20where%20we%20are%20getting%20confused%20here%20is%20what%20you%20are%20describing%20as%20SSO%20and%20what%20I%20am%20talking%20about.%20SSO%20is%20where%20I%20do%20nothing%20and%20I%20am%20signed%20in.%20If%20I%20go%20through%20realm%20selection%20first%20I%20will%20get%20asked%20my%20email%20address%20and%20if%20I%20am%20already%20signed%20out%20from%20a%20previous%20session%20I%20will%20get%20a%20prompt%20to%20select%20my%20username.%20This%20is%20all%20done%20at%20Azure%20AD.%20After%20I%20provide%20my%20email%20or%20click%20on%20the%20button%20indicating%20my%20email%20address%20I%20get%20forwarded%20to%20my%20auth%20provider.%20In%20your%20case%20that%20is%20ADFS.%20Until%20this%20point%20we%20are%20not%20doing%20SSO%2C%20we%20are%20doing%20realm%20selection.%20Domain%20hints%20allow%20us%20to%20bypass%20that%2C%20but%20with%20outlook.office.com%20as%20my%20signin%20I%20do%20not%20provide%20a%20domain%20hint.%20And%20with%20ADFS%20in%20play%20I%20will%20see%20the%20ADFS%20forms%20and%20not%20the%20Azure%20AD%20form%20for%20password%20entry.%20I%20will%20assume%20you%20are%20seeing%20the%20forms%20I%20am%20describing.%3CBR%20%2F%3E%3CBR%20%2F%3EIt%20might%20be%20in%20your%20best%20interested%20to%20get%20someone%20to%20come%20in%20(or%20remote)%20and%20take%20a%20look%20at%20your%20config%20or%20ensure%20that%20what%20you%20are%20seeing%20is%20(or%20is%20not)%20what%20is%20expected%20and%20how%20to%20solve%20your%20original%20question.%3CBR%20%2F%3E%3CBR%20%2F%3EYours%3CBR%20%2F%3E%3CBR%20%2F%3EBrian%20Reid%3CBR%20%2F%3EOffice%20and%20Office%20Services%20MVP%3CBR%20%2F%3EExchange%20Server%20and%20Office%20365%20Microsoft%20Certified%20Master%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-159386%22%20slang%3D%22en-US%22%3ERe%3A%20ADFS%20and%20SSO%20for%20Exchange%20Online%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-159386%22%20slang%3D%22en-US%22%3E%3CP%3EHere%20is%20where%20I%20am%20at%20--%26nbsp%3B%20If%20I%20open%20chrome%20and%20browse%20to%20outlook.office.com%2C%20I%20get%20prompted%20with%20forms%20authentication.%26nbsp%3B%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIn%20IE%20and%20Edge%2C%20it%20attempts%20SSO.%26nbsp%3B%20I%20deleted%20cookies%20and%20still%20get%20an%20SSO%20attempt.%26nbsp%3B%20If%20I%20do%20a%20InPrivate%20window%2C%20I%20do%20get%20forms%20auth%20-%20however%2C%20this%20seems%20like%20a%20less%20than%20ideal%20solution.%26nbsp%3B%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWhen%20you%20say%26nbsp%3B%22have%20something%20else%20open%20in%20O365%2FAzure%20AD%22%20-%20would%20Office%20Pro%20Plus%20be%20included%20in%20this%3F%26nbsp%3B%20If%20Excel%20or%20Word%20had%20been%20opened%20during%20the%20current%20logon%20session%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-159344%22%20slang%3D%22en-US%22%3ERe%3A%20ADFS%20and%20SSO%20for%20Exchange%20Online%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-159344%22%20slang%3D%22en-US%22%3E%3CP%3EIf%20you%20go%20directly%20to%20the%20service%20endpoint%20without%20a%20domain%20hint%20and%20you%20are%20not%20already%20logged%20into%20another%20Office%20365%20service%20in%20the%20same%20browser%20window%20then%20it%20will%20not%20do%20SSO.%20It%20needs%20to%20do%20Realm%20Selection%20before%20it%20can%20route%20you%20to%20the%20ADFS%20server%20(realm%20selection%20is%20to%20determine%20what%20tenant%20you%20are%20so%20that%20it%20know%20who%20does%20the%20authentication).%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIf%20you%20already%20have%20something%20else%20open%20in%20O365%2FAzure%20AD%20then%20there%20is%20an%20AAD%20cookie%20set%20that%20says%20who%20you%20are%20and%20that%20you%20are%20logged%20in%20already.%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3EDelete%20all%20your%20cookies%20and%20try%20again.%20No%20browser%20windows%20open%2C%20and%20start%20by%20going%20to%20the%20service%20endpoint.%20You%20will%20be%20redirected%20to%20AAD%20and%20then%20when%20and%20only%20when%20you%20enter%20an%20email%20address%20will%20you%20be%20routed%20to%20ADFS%20for%20SSO.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIf%20you%20go%20to%20the%20service%20endpoint%20with%20domain%20hint%20(outlook.office365.com%2Fowa%2Ftenant.com%20for%20example)%20or%20set%20up%20webmail.tenant.com%20as%20an%20CNAME%20to%20outlook.office365.com%20in%20DNS)%20then%20realm%20selection%20is%20automatic.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-158521%22%20slang%3D%22en-US%22%3ERe%3A%20ADFS%20and%20SSO%20for%20Exchange%20Online%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-158521%22%20slang%3D%22en-US%22%3E%3CP%3EOk%20-%20so%20I%20just%20re-added%20the%20DNS%20entry%20on%20my%20internal%20network%20to%20point%20the%20clients%20to%20the%20internal%20ADFS%20endpoint.%26nbsp%3B%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EI%20verified%20that%20my%20shared%20device%20is%20resolving%20to%20the%20internal%20ADFS%20endpoint%2C%20browse%20to%20the%20generic%20URL%20%3CA%20href%3D%22https%3A%2F%2Foutlook.office.com%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Foutlook.office.com%3C%2FA%3E%20and%20it%20is%20still%20attempting%20SSO.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAdmittedly%2C%20ADFS%20for%20us%20has%20kind%20of%20been%20a%20set%20it%20and%20forget%20it%20implementation.%26nbsp%3B%20Where%20is%20the%20setting%20that%20shows%20what%20is%20published%20to%20the%20proxy%3F%26nbsp%3B%20I%20am%20in%20the%20management%20console%2C%20on%20my%20server%202012%20R2%20but%20I%20am%20not%20quite%20sure%20what%20I%20am%20looking%20for.%26nbsp%3B%20I%20am%20wondering%20if%2C%20when%20initially%20setting%20this%20up%20a%20few%20years%20back%20if%20we%20have%20something%20misconfigured.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThanks%20for%20the%20reply!%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-158498%22%20slang%3D%22en-US%22%3ERe%3A%20ADFS%20and%20SSO%20for%20Exchange%20Online%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-158498%22%20slang%3D%22en-US%22%3E%3CP%3EIn%20the%20ADFS%20management%20console%20there%20is%20a%20setting%20to%20show%20what%20is%20published%20to%20the%20proxy.%20You%20cannot%20publish%20Windows%20Integrated%20to%20the%20internet%20though%2C%20and%20ADFS%20Global%20Authentication%20Policy%20allows%20Forms%20or%20Certificates%20externally%20and%20Forms%2C%20WIA%20or%20Certs%20internally%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ERegards%20the%20above%20question%2C%20yes%20is%20the%20answer%20-%20but%20for%20%22shared%20devices%22%20you%20will%20only%20get%20Forms%20on%20the%20Intranet%20if%20you%20enable%20it%20as%20mentioned%20above.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAlso%2C%20for%20your%20shared%20devices%20-%20why%20not%20use%20the%20URL%20without%20the%20domain%20hint%20at%20the%20end%20(outlook.office.com%20only)%20and%20then%20Azure%20AD%20will%20ask%20them%20for%20their%20username.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EBrian%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-155950%22%20slang%3D%22en-US%22%3ERe%3A%20ADFS%20and%20SSO%20for%20Exchange%20Online%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-155950%22%20slang%3D%22en-US%22%3E%3CP%3EQuick%20question%2C%20are%20these%20windows%2010%20devices%3F%20If%20yes%2C%20please%20have%20a%20look%20at%3A%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fjairocadena.com%2F2016%2F11%2F08%2Fhow-sso-works-in-windows-10-devices%2F%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fjairocadena.com%2F2016%2F11%2F08%2Fhow-sso-works-in-windows-10-devices%2F%3C%2FA%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-152531%22%20slang%3D%22en-US%22%3ERe%3A%20ADFS%20and%20SSO%20for%20Exchange%20Online%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-152531%22%20slang%3D%22en-US%22%3E%3CP%3ESo%20if%20I%20am%20understanding%20this%20correctly%20-%20to%20make%20this%20work%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EStandard%20Devices%20-%20Have%20OWA%20URL%20in%20Local%20Intranet%20Zone%2C%20and%20hit%20the%20internal%20ADFS%20endpoint.%26nbsp%3B%20This%20should%20result%20in%20SSO%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EMy%20shared%20devices%20-%20Have%20OWA%20URL%20removed%20from%20Local%20Intranet%20Zone%2C%20and%20hit%20the%20internal%20ADFS%20endpoint.%26nbsp%3B%20This%20should%20result%20in%20forms%20based%20auth%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EExternal%20devices%20-%20No%20OWA%20URL%20in%20Local%20Intranet%20Zone%2C%20hit%20WAP%20endpoint.%26nbsp%3B%20Should%20receive%20forms%20based%20auth.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EYou%20mention%20that%20my%20WAP%20should%20not%20proxy%20WIA.%26nbsp%3B%20Would%20it%20be%20possilbe%20to%20proxy%20WIA%3F%26nbsp%3B%20If%20it%20were%2C%20where%20would%20I%20look%20to%20see%20if%20this%20is%20configured%3F%3C%2FP%3E%0A%3CP%3EThanks%3C%2FP%3E%0A%3CP%3ESteve%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-147089%22%20slang%3D%22en-US%22%3ERe%3A%20ADFS%20and%20SSO%20for%20Exchange%20Online%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-147089%22%20slang%3D%22en-US%22%3EBrowsing%20to%20the%20OWA%20URL%20with%20the%20domain%20at%20the%20end%20is%20giving%20AAD%20a%20hint%20as%20to%20what%20domain%20to%20use.%20This%20redirects%20you%20to%20ADFS.%20As%20you%20have%20set%20ADFS%20to%20hit%20the%20external%20IP%2C%20I%20will.assume%20you%20are%20hitting%20the%20WAP%20endpoint.%20WAP%20does%20not%20(should%20not)%20proxy%20WIA%20auth%2C%20and%20should%20present%20a%20forms%20auth%20page%20to%20the%20user.%3CBR%20%2F%3E%3CBR%20%2F%3EYou%20also%20said%20you%20removed%20the%20ADFS%20URL%20from%20local%20intranet%20zone%2C%20which%20means%20it%20should%20not%20do%20WIA%20either.%3CBR%20%2F%3E%3CBR%20%2F%3EYour%20standard%20user%20devices%20should%20hit%20a%20WIA%20endpoint%20on%20ADFS%20and%20the%20URL%20of%20ADFS%20should%20be%20in%20Local%20Intranet%20Zone.%20Your%20external%20devices%20should%20hit%20WAP%20and%20get%20proxied%20to%20ADFS%20and%20get%20Forms%20Auth.%20Your%20shared%20devices%20should%20not%20get%20the%20URL%20in%20Local%20Intranet%2C%20but%20should%20still%20hit%20ADFS%20internal%20IP%20(not%20via%20WAP)%2C%20but%20as%20not%20a%20trusted%20endpoint%20should%20not%20seamless%20sign-on.%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-144459%22%20slang%3D%22en-US%22%3ERe%3A%20ADFS%20and%20SSO%20for%20Exchange%20Online%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-144459%22%20slang%3D%22en-US%22%3E%3CP%3EStill%20struggling%20with%20this%20one.%26nbsp%3B%20Anyone%20have%20any%20input%3F%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThanks%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-140083%22%20slang%3D%22en-US%22%3ERe%3A%20ADFS%20and%20SSO%20for%20Exchange%20Online%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-140083%22%20slang%3D%22en-US%22%3E%3CP%3EI%20am%20not%20sure%20how%20I%20would%20do%20this%20--%20do%20you%20have%20an%20example%20of%20where%20you%20can%20link%20me%20to%3F%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThanks%3C%2FP%3E%0A%3CP%3ESteve%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-140082%22%20slang%3D%22en-US%22%3ERe%3A%20ADFS%20and%20SSO%20for%20Exchange%20Online%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-140082%22%20slang%3D%22en-US%22%3E%3CP%3EI%20think%20I%20have%20this%20done%20--%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EI%20removed%20our%20ADFS%20URL%20from%20the%20intranet%20zone%2C%20removed%20the%20internal%20DNS%20record%20that%20points%20to%20the%20inside%20of%20the%20ADFS%20environment.%26nbsp%3B%20I%20now%20ping%20from%20this%20client%20and%20get%20an%20external%20IP%20address.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20WIA%20(or%20IWA%3F%20-%20I've%20seen%20it%20both%20ways%3F%3F)%20-%20I%20went%20into%20IE%20on%20one%20of%20the%20clients%2C%20Security%20Tab%20--%26gt%3B%20Custom%20Level%20--%26gt%3B%20Login%20--%26gt%3B%20Prompt%20for%20user%20name%20and%20password.%26nbsp%3B%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ERebooted%20the%20PC%202%20times%20and%20I%20am%20still%20getting%20auto%20login%20for%20my%20OWA%20url%3F%26nbsp%3B%20What%20am%20I%20missing%3F%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThanks%3C%2FP%3E%0A%3CP%3ESteve%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-139387%22%20slang%3D%22en-US%22%3ERe%3A%20ADFS%20and%20SSO%20for%20Exchange%20Online%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-139387%22%20slang%3D%22en-US%22%3EOr%20you%20can%20ask%20them%20to%20browse%20to%20the%20site%20via%20an%20InPrivate%20session%20in%20the%20browser%2C%20as%20that%20does%20not%20auto%20submit%20credentials%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-135303%22%20slang%3D%22en-US%22%3ERe%3A%20ADFS%20and%20SSO%20for%20Exchange%20Online%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-135303%22%20slang%3D%22en-US%22%3E%3CP%3EYou%20can%20also%20alter%20the%20AD%20FS%20Claim%20Issuance%20Rules%20so%20that%20those%20devices%26nbsp%3B%20would%20be%20treated%20as%20externals%20(i.e.%20loggin%20in%20outside%20your%20internal%20network).%20That%20way%20they%20would%20be%20offered%20a%20login%20form%20instead%20of%20signing%20in%20automatically.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-134737%22%20slang%3D%22en-US%22%3ERe%3A%20ADFS%20and%20SSO%20for%20Exchange%20Online%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-134737%22%20slang%3D%22en-US%22%3E%3CP%3EThey%20are%20effectively%20logging%20in%20with%20the%20current%20windows%20credentials%2C%20as%20per%20the%20%22magic%22%20bit.%20Either%20disable%20the%20WIA%20auto-login%20in%20the%20browser%20options%20on%20those%20devices%20or%20remove%20the%20AD%20FS%20URL%20from%20the%20Intranet%20zone.%3C%2FP%3E%3C%2FLINGO-BODY%3E
Stephen Bell
Contributor

I hope this is the right spot for this post...

 

We have Office 365 E3 in our environment, setup using ADFS.  All of our email is in Exchange Online.

 

Because of this - when a user opens up MS Edge, and browses to https://outlook.office.com/ourdomain.dom they are *magically* auto-signed into their mailbox.  Who doesn't like magic :) ?

 

This is great for most of our users - however I have a small set of desktop computers that are shared workstations, with an auto-login, shared user account.  Because it is a shared workstation and shared user account - they do not have an email account.

 

I recently got a request to add a desktop shortcut to these machines for people to login to their exchange online mailbox via the web browser.  When I try to go to the login page I either get a failed to login error OR a loop to select my timezone.  I am guessing because the logged on user does not have a mailbox, and the ADFS is trying to perform SSO.

 

Any ideas how to get around this issue for these machines?

 

Thanks

Steve

 

 

17 Replies

They are effectively logging in with the current windows credentials, as per the "magic" bit. Either disable the WIA auto-login in the browser options on those devices or remove the AD FS URL from the Intranet zone.

You can also alter the AD FS Claim Issuance Rules so that those devices  would be treated as externals (i.e. loggin in outside your internal network). That way they would be offered a login form instead of signing in automatically.

Or you can ask them to browse to the site via an InPrivate session in the browser, as that does not auto submit credentials

I think I have this done -- 

 

I removed our ADFS URL from the intranet zone, removed the internal DNS record that points to the inside of the ADFS environment.  I now ping from this client and get an external IP address.

 

The WIA (or IWA? - I've seen it both ways??) - I went into IE on one of the clients, Security Tab --> Custom Level --> Login --> Prompt for user name and password.  

 

Rebooted the PC 2 times and I am still getting auto login for my OWA url?  What am I missing?

 

Thanks

Steve

I am not sure how I would do this -- do you have an example of where you can link me to?

 

Thanks

Steve

Still struggling with this one.  Anyone have any input?

 

Thanks

Browsing to the OWA URL with the domain at the end is giving AAD a hint as to what domain to use. This redirects you to ADFS. As you have set ADFS to hit the external IP, I will.assume you are hitting the WAP endpoint. WAP does not (should not) proxy WIA auth, and should present a forms auth page to the user.

You also said you removed the ADFS URL from local intranet zone, which means it should not do WIA either.

Your standard user devices should hit a WIA endpoint on ADFS and the URL of ADFS should be in Local Intranet Zone. Your external devices should hit WAP and get proxied to ADFS and get Forms Auth. Your shared devices should not get the URL in Local Intranet, but should still hit ADFS internal IP (not via WAP), but as not a trusted endpoint should not seamless sign-on.

So if I am understanding this correctly - to make this work:

 

Standard Devices - Have OWA URL in Local Intranet Zone, and hit the internal ADFS endpoint.  This should result in SSO

 

My shared devices - Have OWA URL removed from Local Intranet Zone, and hit the internal ADFS endpoint.  This should result in forms based auth

 

External devices - No OWA URL in Local Intranet Zone, hit WAP endpoint.  Should receive forms based auth.

 

You mention that my WAP should not proxy WIA.  Would it be possilbe to proxy WIA?  If it were, where would I look to see if this is configured?

Thanks

Steve

Quick question, are these windows 10 devices? If yes, please have a look at:

https://jairocadena.com/2016/11/08/how-sso-works-in-windows-10-devices/

In the ADFS management console there is a setting to show what is published to the proxy. You cannot publish Windows Integrated to the internet though, and ADFS Global Authentication Policy allows Forms or Certificates externally and Forms, WIA or Certs internally

 

Regards the above question, yes is the answer - but for "shared devices" you will only get Forms on the Intranet if you enable it as mentioned above.

 

Also, for your shared devices - why not use the URL without the domain hint at the end (outlook.office.com only) and then Azure AD will ask them for their username.

 

Brian

Ok - so I just re-added the DNS entry on my internal network to point the clients to the internal ADFS endpoint.  

 

I verified that my shared device is resolving to the internal ADFS endpoint, browse to the generic URL https://outlook.office.com and it is still attempting SSO.

 

Admittedly, ADFS for us has kind of been a set it and forget it implementation.  Where is the setting that shows what is published to the proxy?  I am in the management console, on my server 2012 R2 but I am not quite sure what I am looking for.  I am wondering if, when initially setting this up a few years back if we have something misconfigured.

 

Thanks for the reply!

If you go directly to the service endpoint without a domain hint and you are not already logged into another Office 365 service in the same browser window then it will not do SSO. It needs to do Realm Selection before it can route you to the ADFS server (realm selection is to determine what tenant you are so that it know who does the authentication).

 

If you already have something else open in O365/Azure AD then there is an AAD cookie set that says who you are and that you are logged in already.


Delete all your cookies and try again. No browser windows open, and start by going to the service endpoint. You will be redirected to AAD and then when and only when you enter an email address will you be routed to ADFS for SSO.

 

If you go to the service endpoint with domain hint (outlook.office365.com/owa/tenant.com for example) or set up webmail.tenant.com as an CNAME to outlook.office365.com in DNS) then realm selection is automatic.

Here is where I am at --  If I open chrome and browse to outlook.office.com, I get prompted with forms authentication.  

 

In IE and Edge, it attempts SSO.  I deleted cookies and still get an SSO attempt.  If I do a InPrivate window, I do get forms auth - however, this seems like a less than ideal solution.  

 

When you say "have something else open in O365/Azure AD" - would Office Pro Plus be included in this?  If Excel or Word had been opened during the current logon session?

Office being open constitutes a login, and we will assume you have Modern Auth enabled, so the login control uses the web control in Windows (IE/Edge). Therefore you have a current valid cookie in play, so you get logged in.

For Chrome, you do not mention where you are (intranet or extranet), or what endpoint you would be hitting. Also you can enable WIA for Chrome and get SSO in Chrome.

Note that on the intranet they will always try to do SSO - I think where we are getting confused here is what you are describing as SSO and what I am talking about. SSO is where I do nothing and I am signed in. If I go through realm selection first I will get asked my email address and if I am already signed out from a previous session I will get a prompt to select my username. This is all done at Azure AD. After I provide my email or click on the button indicating my email address I get forwarded to my auth provider. In your case that is ADFS. Until this point we are not doing SSO, we are doing realm selection. Domain hints allow us to bypass that, but with outlook.office.com as my signin I do not provide a domain hint. And with ADFS in play I will see the ADFS forms and not the Azure AD form for password entry. I will assume you are seeing the forms I am describing.

It might be in your best interested to get someone to come in (or remote) and take a look at your config or ensure that what you are seeing is (or is not) what is expected and how to solve your original question.

Yours

Brian Reid
Office and Office Services MVP
Exchange Server and Office 365 Microsoft Certified Master

Thank you again for your replies, I appreciate you taking the time.  

 

I believe I understand exactly what you are saying regarding SSO / realm selection. 

 

Currently, I am not seeing any realm selection when I open IE/Edge and browse to https://outlook.office.com  -- without domain hint.  This should send me to the external, Microsoft login page. Once I enter my email address, because my domain is federated, I would be redirected to my company login page - which in this instance is INTRANET, as these shared devices are on my internal network and DNS resolves the sts.mycompany.com to our ADFS server, not our WAP. 

 

As for modern auth, yes, I believe it is enabled.  I will check further to confirm.  I guess I always thought of modern auth being for outlook only, not thinking about the implications with the other Office Pro Plus applications.  These machines I am working with do not have Outlook currently installed.

 

Thanks again!

Steve

Solution

Our organization was able to solve this problem and I documented the solution over on TechNet ("https://social.technet.microsoft.com/Forums/en-US/79c2050b-9977-4524-83a5-eb47d86e2f96/bypass-adfs-...) @Stephen Bell 

@geoperkins 

 

Interesting approach.  A few months ago, due to some password spray attacks we disabled our ADFS and went back to O365 authentication. Given that we were only ADFS to gain conditional access functionality, which is part of EMS now.

 

Thank you for sharing!

Related Conversations
ADFS SSO sign-in as different user
Gurdev Singh in Azure Active Directory on
4 Replies
Azure Files with adfs
Stephane KLOIS in Azure on
0 Replies
Outlook (365) Need Password - Issue
Muhammad Ali Khan in Office 365 on
20 Replies
Reporting on Project Online (PWA) Timesheets
Andy Dennis in Project on
3 Replies
Accessing a shared mailbox from a mobile device
Hexsysadmins in Office 365 on
14 Replies