I have set up SSO for use with office 365 and Dropbox.
When I was testing both Office 365 and Dropbox with my domain account it was working fine.
for Office 365 I would go to portal.office.com and enter my work email address.
I would get re-directed to fs.DomainName.com and I would enter my domain password and I would be logged into office 365.
I assumed all was fine so I allocated licenses to my 20 users in office 365 but when they went to sign in at portal.office.com and were re-directed to fs.DomainName.com - entered their correct password - the page would just submit back to itself.
if the user entered the wrong domain password at fs.DomainName.com then it would give the error that the password is wrong. When the password was correct it would just post back to itself with no error message.
I cannot work out why this is happening.
any help would be appreciated.
thanks
jack
Windows Server 2012Active DirectoryMicrosoft 365
Last Comment
jackbenson
8/22/2022 - Mon
SreRaj
Hi,
Please verify user accounts are setup as specified in the following article.
All the users are added to Office 365 by DirSync so all I had to do was activate the Office 365 license
Vasil Michev (MVP)
They dont need license to login, but the ImmutableID and UPN needs to be properly configured (matching the on-prem value). Subdomains are treated differently/require additional configuration. So double-check on those. You can also try recreating the RPT as detailed here: https://support.microsoft.com/en-us/kb/2647048
I have found the option "Edit Global Authentication Policy" in "Primary Authentication" in "Authentication Policy" in the AD FS Management Console
after I have enabled the "Forms Authentication" option in the Intranet section users within the company network could go to portal.office.com, enter their UPN jack@DomainName.com and the following pops up:
the user could then enter the network credentials and then be logged into office 365 - good result :)
But when a user that is not in the internal network (I do not know if this is just to do with the computer in the office being part of the domain) and the user goes to portal.office.com, enters their email addess jack@DomainName.com the following pops up:
and this is the details of the Token Signing Public Key Certificate:
I assume this is not how is it supposed to work?
can you suggest how to fix it
many thanks
jack
Vasil Michev (MVP)
Seems like you have configured a second-factor auth for external users? You cannot use certificate-based auth with O365.
jackbenson
ASKER
In "Edit Global Authentication Policy" I have not selected "Certificate Authentication" in either Extranet or Intranet options.
is there somewhere else I should look to disable the certificate authentication?
For the proxy I am using the "Web Application Proxy" in Server 2012 R2 - a VM that is not joined to the domain.
I was trying to look at the setting for this - but for the life of me I cannot find an option to see the setting of how I set it up
jack
Vasil Michev (MVP)
OK so you dont seem to have any additional auth rules, so it leaves with the proxies (or some other device between the local AD FS server and the internet). For the WAP, do you remember how you published the AD FS rule? You can do a quick check if any pre-auth is set using this cmdlet:
this morning I tested a Windows computer that is on the internal company lan - but not joined to the domain - and after entering the email address at portal.office.com I was prompted for the domain username/password (in a dialogue box) and was able to log into office 365.
I also tried on a Mac that is joined to the domain - but I was not prompted for the username/password in a dialogue box and was not able to log into office 365
OK, so if it's only on Mac, the issue is definitely not with any pre-auth settings or MFA as I though initially. There were some issues with Mac/iOS devices and AD FS 2.0, not sure if those apply to AD FS 3.0 though...
One thing that is known to cause issues with non-MS browsers is Extended Protection for Authentication (EPA) - check if it's enabled and temporary disable it. You can refer to method 3 in this article: https://support.microsoft.com/en-us/kb/2461628
jackbenson
ASKER
I should do this on the AD FS server? not the "Web Application Proxy" Server?
I did this and I am still unable to log into to single sign-on in the following situation:
- Within Company Network - Apple Macs
- Outside of the Company Network - Any computer.
within the company network, on a PC, I am prompted for the username / password in a dialogue box.
I have resolved the issue of behind asked to select a certificate while singing in - I disabled "Enable Device Authentication" in "Edit Global Authentication Policy" in "Primary Authentication" in "Authentication Policy"
I do not know if this is useful, but these are my ADFS properties:
On the mac I have been able to activate office with the 1 user account that was working at the start.
Vasil Michev (MVP)
If you mean true seamless SSO experience, this is only possible for domain joined machines. To enable it, make sure Windows Authentication is selected in the global auth policy, that the AD FS FQDN is added to Local sites in IE settings and WIA is enabled for the zone. The behavior and requirements for both inside and outside the corp network are explained in details here: http://blogs.technet.com/b/abizerh/archive/2013/04/11/more-information-about-sso-experience-when-authenticating-via-adfs.aspx
"update on this issue. I figured out what was causing this. I use a managed service account for the ADFS service, because this is best practice.
It looks like the Managed Service account has too less permission to read the user properties to let them authenticate. When I add the managed service account and give it read permission to a user that didn't work I can logon successfully. I can of course add this right to the whole OU where the users are in to fix it for all users.
Is this a security issue? Give i now to less or too much security too this account. Can someone give me advise what permissions to give.
what is best practice for giving permissions to the DomainName\ADFS2SVC?
Another thing suggested in the article is to add the Managed Service Account DomainName\ADFS2SVC to the Windows Authorization Access Group
your thoughts would be appreciated
many thanks
jack
Vasil Michev (MVP)
Nice catch, definitely havent seen this one before. Not sure why "Authenticated Users" was missing from the "Pre-Windows 2000 Compatible Access" group in their case, it's present on all the ADs I manage. But check for that, and fix it if needed. Same for the "Windows Authorization Access" group and the gmsa.
jackbenson
ASKER
Vasil,
thank-you for your reply.
to confirm my understanding, am I to add the Managed Service Account DomainName\ADFS2SVC to both the following Security Groups:
- Pre-Windows 2000 Compatible Access
- Windows Authorization Access
at the moment it is not in either
or am I supposed to add Authenticated Users to these groups?
and I can ignore the Windows Authorization Access group?
Vasil Michev (MVP)
Well it might not be needed. As I said, I havent actually encountered this issue before, so I cannot speak from experience. My idea is - take it one step at a time, as however small those actions are they do introduce changes in the environment, so avoid doing changes you dont really need.
jackbenson
ASKER
Vasil,
it looks like just adding "Authenticated Users" to the "Pre-Windows 2000 Compatible Access" was enough to let people log in
Please verify user accounts are setup as specified in the following article.
https://support.office.com/en-gb/article/Add-users-individually-to-Office-365-Admin-Help-1970f7d6-03b5-442f-b385-5880b9c256ec