Update hello-deployment-issues.md

This commit is contained in:
Rebecca Agiewich 2021-07-09 14:27:12 -07:00 committed by GitHub
parent 98d4711cd0
commit 7115eb2a9f
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -82,17 +82,17 @@ For more information, read [Guidelines for enabling smart card logon with third-
This issue can be identified using network traces or Kerberos logging from the client. In the network trace, the client will fail to place a TGS_REQ request when a user attempts to access a resource. On the client, this can be observed in the Kerberos operation event log under **Application and Services/Microsoft/Windows/Security-Kerberos/Operational**. These logs are default disabled. The failure event for this case will include the following information: This issue can be identified using network traces or Kerberos logging from the client. In the network trace, the client will fail to place a TGS_REQ request when a user attempts to access a resource. On the client, this can be observed in the Kerberos operation event log under **Application and Services/Microsoft/Windows/Security-Kerberos/Operational**. These logs are default disabled. The failure event for this case will include the following information:
```console ```console
Log Name: Microsoft-Windows-Kerberos/Operational Log Name: Microsoft-Windows-Kerberos/Operational
Source: Microsoft-Windows-Security-Kerberos Source: Microsoft-Windows-Security-Kerberos
Event ID: 107 Event ID: 107
GUID: {98e6cfcb-ee0a-41e0-a57b-622d4e1b30b1} GUID: {98e6cfcb-ee0a-41e0-a57b-622d4e1b30b1}
Task Category: None Task Category: None
Level: Error Level: Error
Keywords: Keywords:
User: SYSTEM User: SYSTEM
Description: Description:
``` ```
The Kerberos client received a KDC certificate that does not have a matched domain name. The Kerberos client received a KDC certificate that does not have a matched domain name.
@ -146,54 +146,54 @@ AD FS running on Windows Server 2019 fails to complete device authentication pro
The provisioning experience for Windows Hello for Business will launch if a set of prerequisite checks done by the client are successful. The result of the provisioningAdmin checks is available in event logs under Microsoft-Windows-User Device Registration. If provisioning is blocked because device authentication has not successfully occurred, there will be an event ID 362 in the logs that states that *User has successfully authenticated to the enterprise STS: No*. The provisioning experience for Windows Hello for Business will launch if a set of prerequisite checks done by the client are successful. The result of the provisioningAdmin checks is available in event logs under Microsoft-Windows-User Device Registration. If provisioning is blocked because device authentication has not successfully occurred, there will be an event ID 362 in the logs that states that *User has successfully authenticated to the enterprise STS: No*.
```console ```console
Log Name: Microsoft-Windows-User Device Registration/Admin Log Name: Microsoft-Windows-User Device Registration/Admin
Source: Microsoft-Windows-User Device Registration Source: Microsoft-Windows-User Device Registration
Date: <Date and time> Date: <Date and time>
Event ID: 362 Event ID: 362
Task Category: None Task Category: None
Level: Warning Level: Warning
Keywords: Keywords:
User: <User SID> User: <User SID>
Computer: <Computer name> Computer: <Computer name>
Description: Description:
Windows Hello for Business provisioning will not be launched. Windows Hello for Business provisioning will not be launched.
Device is AAD joined ( AADJ or DJ++ ): Yes Device is AAD joined ( AADJ or DJ++ ): Yes
User has logged on with AAD credentials: Yes User has logged on with AAD credentials: Yes
Windows Hello for Business policy is enabled: Yes Windows Hello for Business policy is enabled: Yes
Windows Hello for Business post-logon provisioning is enabled: Yes Windows Hello for Business post-logon provisioning is enabled: Yes
Local computer meets Windows hello for business hardware requirements: Yes Local computer meets Windows hello for business hardware requirements: Yes
User is not connected to the machine via Remote Desktop: Yes User is not connected to the machine via Remote Desktop: Yes
User certificate for on premise auth policy is enabled: Yes User certificate for on premise auth policy is enabled: Yes
Enterprise user logon certificate enrollment endpoint is ready: Not Tested Enterprise user logon certificate enrollment endpoint is ready: Not Tested
Enterprise user logon certificate template is : No ( 1 : StateNoPolicy ) Enterprise user logon certificate template is : No ( 1 : StateNoPolicy )
User has successfully authenticated to the enterprise STS: No User has successfully authenticated to the enterprise STS: No
Certificate enrollment method: enrollment authority Certificate enrollment method: enrollment authority
See https://go.microsoft.com/fwlink/?linkid=832647 for more details. See https://go.microsoft.com/fwlink/?linkid=832647 for more details.
``` ```
If a device has recently been joined to a domain, then there may be a delay before the device authentication occurs. If the failing state of this prerequisite check persists, then it can indicate an issue with the AD FS configuration. If a device has recently been joined to a domain, then there may be a delay before the device authentication occurs. If the failing state of this prerequisite check persists, then it can indicate an issue with the AD FS configuration.
If this AD FS scope issue is present, event logs on the AD FS server will indicate an authentication failure from the client. This error will be logged in event logs under AD FS/Admin as event ID 1021 and the event will specify that the client is forbidden access to resource 'http<span>://schemas.microsoft.com/ws/2009/12/identityserver/selfscope</span>' with scope 'ugs': If this AD FS scope issue is present, event logs on the AD FS server will indicate an authentication failure from the client. This error will be logged in event logs under AD FS/Admin as event ID 1021 and the event will specify that the client is forbidden access to resource 'http<span>://schemas.microsoft.com/ws/2009/12/identityserver/selfscope</span>' with scope 'ugs':
```console ```console
Log Name: AD FS/Admin Log Name: AD FS/Admin
Source: AD FS Source: AD FS
Date: <Date and time> Date: <Date and time>
Event ID: 1021 Event ID: 1021
Task Category: None Task Category: None
Level: Error Level: Error
Keywords: AD FS Keywords: AD FS
User: <ADFS service Account> User: <ADFS service Account>
Computer: <Date and time> Computer: <Date and time>
Description: Description:
Encountered error during OAuth token request. Encountered error during OAuth token request.
Additional Data Additional Data
Exception details: Exception details:
Microsoft.IdentityServer.Web.Protocols.OAuth.Exceptions.OAuthUnauthorizedClientException: MSIS9368: Received invalid OAuth request. The client '38aa3b87-a06d-4817-b275-7a316988d93b' is forbidden to access the resource 'http://schemas.microsoft.com/ws/2009/12/identityserver/selfscope' with scope 'ugs'. Microsoft.IdentityServer.Web.Protocols.OAuth.Exceptions.OAuthUnauthorizedClientException: MSIS9368: Received invalid OAuth request. The client '38aa3b87-a06d-4817-b275-7a316988d93b' is forbidden to access the resource 'http://schemas.microsoft.com/ws/2009/12/identityserver/selfscope' with scope 'ugs'.
at Microsoft.IdentityServer.Web.Protocols.OAuth.OAuthProtocolContext.ValidateScopes(String scopeParameter, String clientId, String relyingPartyId) at Microsoft.IdentityServer.Web.Protocols.OAuth.OAuthProtocolContext.ValidateScopes(String scopeParameter, String clientId, String relyingPartyId)
at Microsoft.IdentityServer.Web.Protocols.OAuth.OAuthToken.OAuthJWTBearerRequestContext.ValidateCore() at Microsoft.IdentityServer.Web.Protocols.OAuth.OAuthToken.OAuthJWTBearerRequestContext.ValidateCore()
``` ```
### Resolving Certificate Trust with AD FS 2019 Enrollment Issue ### Resolving Certificate Trust with AD FS 2019 Enrollment Issue