mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-21 13:23:36 +00:00
Fixes from "repo health" project
This commit is contained in:
@ -28,7 +28,7 @@ Applies to:
|
||||
- Azure AD joined deployments
|
||||
- Windows 10, version 1803 and later
|
||||
|
||||
PIN reset on Azure AD joined devices uses a flow called web sign-in to authenticate the user above lock. Web sign in only allows navigation to specific domains. If it attempts to navigate to a domain that is not allowed it will shows a page with the "We can't open that page right now" error message.
|
||||
PIN reset on Azure AD joined devices uses a flow called web sign-in to authenticate the user above lock. Web sign in only allows navigation to specific domains. If it attempts to navigate to a domain that is not allowed it will shows a page with the error message "We can't open that page right now".
|
||||
|
||||
### Identifying Azure AD joined PIN Reset Allowed Domains Issue
|
||||
|
||||
@ -36,7 +36,7 @@ The user can launch the PIN reset flow from above lock using the "I forgot my PI
|
||||
|
||||
In federated environments authentication may be configured to route to AD FS or a third party identity provider. If the PIN reset flow is launched and attempts to navigate to a federated identity provider server page, it will fail and display the "We can't open that page right now" error if the domain for the server page is not included in an allow list.
|
||||
|
||||
If you are a customer of Azure US Government cloud, PIN reset will also attempt to navigate to a domain that is not included in the default allow list. This results in the "We can't open that page right now" being shown.
|
||||
If you are a customer of Azure US Government cloud, PIN reset will also attempt to navigate to a domain that is not included in the default allow list. This results in "We can't open that page right now".
|
||||
|
||||
### Resolving Azure AD joined PIN Reset Allowed Domains Issue
|
||||
|
||||
@ -96,7 +96,7 @@ Description:
|
||||
The Kerberos client received a KDC certificate that does not have a matched domain name.
|
||||
Expected Domain Name: ad.contoso.com
|
||||
Error Code: 0xC000006D
|
||||
```
|
||||
```
|
||||
|
||||
### Resolving On-premises Resource Access Issue with Third-Party CAs
|
||||
|
||||
@ -173,7 +173,7 @@ See https://go.microsoft.com/fwlink/?linkid=832647 for more details.
|
||||
|
||||
If a device has recently been joined to a domain, then there may be a delay before the device authentication occurs. If the failing state of this prerequisite check persists, then it can indicate an issue with the AD FS configuration.
|
||||
|
||||
If this AD FS scope issue is present, event logs on the AD FS server will indicate an authentication failure from the client. This error will be logged in event logs under AD FS/Admin as event ID 1021 and the event will specify that the client is forbidden access to resource 'http<span>://schemas.microsoft.com/ws/2009/12/identityserver/selfscope</span>' with scope 'ugs':
|
||||
If this AD FS scope issue is present, event logs on the AD FS server will indicate an authentication failure from the client. This error will be logged in event logs under AD FS/Admin as event ID 1021 and the event will specify that the client is forbidden access to resource `http://schemas.microsoft.com/ws/2009/12/identityserver/selfscope` with scope 'ugs':
|
||||
|
||||
```console
|
||||
Log Name: AD FS/Admin
|
||||
@ -198,16 +198,22 @@ Microsoft.IdentityServer.Web.Protocols.OAuth.Exceptions.OAuthUnauthorizedClientE
|
||||
|
||||
This issue is fixed in Windows Server, version 1903 and later. For Windows Server 2019, this issue can be remediated by adding the ugs scope manually.
|
||||
|
||||
1. Launch AD FS management console. Browse to "Services > Scope Descriptions".
|
||||
2. Right click "Scope Descriptions" and select "Add Scope Description".
|
||||
3. Under name type "ugs" and Click Apply > OK.
|
||||
1. Launch AD FS management console. Browse to **Services > Scope Descriptions**.
|
||||
|
||||
2. Right click **Scope Descriptions** and select **Add Scope Description**.
|
||||
|
||||
3. Under name type **ugs** and click **Apply > OK**.
|
||||
|
||||
4. Launch PowerShell as an administrator.
|
||||
|
||||
5. Get the ObjectIdentifier of the application permission with the ClientRoleIdentifier parameter equal to "38aa3b87-a06d-4817-b275-7a316988d93b":
|
||||
|
||||
``` PowerShell
|
||||
(Get-AdfsApplicationPermission -ServerRoleIdentifiers 'http://schemas.microsoft.com/ws/2009/12/identityserver/selfscope' | ?{ $_.ClientRoleIdentifier -eq '38aa3b87-a06d-4817-b275-7a316988d93b' }).ObjectIdentifier
|
||||
```
|
||||
```powershell
|
||||
(Get-AdfsApplicationPermission -ServerRoleIdentifiers 'http://schemas.microsoft.com/ws/2009/12/identityserver/selfscope' | ?{ $_.ClientRoleIdentifier -eq '38aa3b87-a06d-4817-b275-7a316988d93b' }).ObjectIdentifier
|
||||
```
|
||||
|
||||
6. Execute the command `Set-AdfsApplicationPermission -TargetIdentifier <ObjectIdentifier from step 5> -AddScope 'ugs'`.
|
||||
|
||||
7. Restart the AD FS service.
|
||||
|
||||
8. On the client: Restart the client. User should be prompted to provision Windows Hello for Business.
|
||||
|
@ -51,7 +51,7 @@ The Destroy command securely deletes a virtual smart card from a computer.
|
||||
> [!WARNING]
|
||||
> When a virtual smart card is deleted, it cannot be recovered.
|
||||
|
||||
| **Parameter** | **Description** |
|
||||
| Parameter | Description |
|
||||
|---------------|-------------------|
|
||||
| /instance | Specifies the instance ID of the virtual smart card to be removed. The instanceID was generated as output by Tpmvscmgr.exe when the card was created. The **/instance** parameter is a required field for the Destroy command. |
|
||||
| /machine | Allows you to specify the name of a remote computer on which the virtual smart card will be deleted. This can be used in a domain environment only, and it relies on DCOM. For the command to succeed in deleting a virtual smart card on a different computer, the user running this command must be a member in the local administrators group on the remote computer. |
|
||||
@ -67,26 +67,36 @@ For alphanumeric inputs, the full 127 character ASCII set is allowed.
|
||||
|
||||
The following command shows how to create a virtual smart card that can be later managed by a smart card management tool launched from another computer.
|
||||
|
||||
tpmvscmgr.exe create /name "VirtualSmartCardForCorpAccess" /AdminKey DEFAULT /PIN PROMPT
|
||||
```console
|
||||
tpmvscmgr.exe create /name "VirtualSmartCardForCorpAccess" /AdminKey DEFAULT /PIN PROMPT
|
||||
```
|
||||
|
||||
Alternatively, instead of using a default administrator key, you can create an administrator key at the command line. The following command shows how to create an administrator key.
|
||||
|
||||
tpmvscmgr.exe create /name "VirtualSmartCardForCorpAccess" /AdminKey PROMPT /PIN PROMPT
|
||||
```console
|
||||
tpmvscmgr.exe create /name "VirtualSmartCardForCorpAccess" /AdminKey PROMPT /PIN PROMPT
|
||||
```
|
||||
|
||||
The following command will create the unmanaged virtual smart card that can be used to enroll certificates.
|
||||
|
||||
tpmvscmgr.exe create /name "VirtualSmartCardForCorpAccess" /AdminKey RANDOM /PIN PROMPT /generate
|
||||
```console
|
||||
tpmvscmgr.exe create /name "VirtualSmartCardForCorpAccess" /AdminKey RANDOM /PIN PROMPT /generate
|
||||
```
|
||||
|
||||
The preceding command will create a virtual smart card with a randomized administrator key. The key is automatically discarded after the card is created. This means that if the user forgets the PIN or wants to the change the PIN, the user needs to delete the card and create it again. To delete the card, the user can run the following command.
|
||||
|
||||
tpmvscmgr.exe destroy /instance <instance ID>
|
||||
```console
|
||||
tpmvscmgr.exe destroy /instance <instance ID>
|
||||
```
|
||||
|
||||
where <instance ID> is the value printed on the screen when the user created the card. Specifically, for the first card created, the instance ID is ROOT\\SMARTCARDREADER\\0000.
|
||||
|
||||
The following command will create a TPM virtual smart card with the default value for the administrator key and a specified PIN policy and attestation method:
|
||||
|
||||
tpmvscmgr.exe create /name "VirtualSmartCardForCorpAccess" /PIN PROMPT /pinpolicy minlen 4 maxlen 8 /AdminKey DEFAULT /attestation AIK_AND_CERT /generate
|
||||
```console
|
||||
tpmvscmgr.exe create /name "VirtualSmartCardForCorpAccess" /PIN PROMPT /pinpolicy minlen 4 maxlen 8 /AdminKey DEFAULT /attestation AIK_AND_CERT /generate
|
||||
```
|
||||
|
||||
## Additional references
|
||||
|
||||
- [Virtual Smart Card Overview](virtual-smart-card-overview.md)
|
||||
- [Virtual Smart Card Overview](virtual-smart-card-overview.md)
|
||||
|
Reference in New Issue
Block a user