mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-15 14:57:23 +00:00
update hybrid cert trust adfs scope note
This commit is contained in:
parent
754169d423
commit
a88fc360e8
@ -65,14 +65,17 @@ Sign-in a domain controller or management workstation with _Domain Admin_ equiva
|
|||||||
7. Restart the AD FS server.
|
7. Restart the AD FS server.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
>For AD FS 2019, if Windows Hello for Business with a Hybrid Certificate trust is performed, a known PRT issue exists. You may encounter this error in ADFS Admin event logs: Received invalid Oauth request. The client 'NAME' is forbidden to access the resource with scope 'ugs'. To remediate this error:
|
> For AD FS 2019, if Windows Hello for Business with a Hybrid Certificate trust is performed, a known PRT issue exists. You may encounter this error in ADFS Admin event logs: Received invalid Oauth request. The client 'NAME' is forbidden to access the resource with scope 'ugs'. To remediate this error:
|
||||||
>
|
>
|
||||||
> 1. Launch AD FS management console. Browse to "Services > Scope Descriptions".
|
> 1. Launch AD FS management console. Browse to "Services > Scope Descriptions".
|
||||||
> 2. Right click "Scope Descriptions" and select "Add Scope Description".
|
> 2. Right click "Scope Descriptions" and select "Add Scope Description".
|
||||||
> 3. Under name type "ugs" and Click Apply > OK.
|
> 3. Under name type "ugs" and Click Apply > OK.
|
||||||
> 4. Launch Powershell as Administrator.
|
> 4. Launch PowerShell as an administrator.
|
||||||
> 5. Execute the command "Get-AdfsApplicationPermission". Look for the ScopeNames :{openid, aza} that has the ClientRoleIdentifier is equal to 38aa3b87-a06d-4817-b275-7a316988d93b and make a note of the ObjectIdentifier.
|
> 5. Get the ObjectIdentifier of the application permission with the ClientRoleIdentifier parameter equal to "38aa3b87-a06d-4817-b275-7a316988d93b":
|
||||||
> 6. Execute the command "Set-AdfsApplicationPermission -TargetIdentifier <ObjectIdentifier from step 5> -AddScope 'ugs'.
|
> ```PowerShell
|
||||||
|
> (Get-AdfsApplicationPermission -ServerRoleIdentifiers 'http://schemas.microsoft.com/ws/2009/12/identityserver/selfscope' | ?{ $_.ClientRoleIdentifier -eq '38aa3b87-a06d-4817-b275-7a316988d93b' }).ObjectIdentifier
|
||||||
|
> ```
|
||||||
|
> 6. Execute the command `Set-AdfsApplicationPermission -TargetIdentifier <ObjectIdentifier from step 5> -AddScope 'ugs'`.
|
||||||
> 7. Restart the ADFS service.
|
> 7. Restart the ADFS service.
|
||||||
> 8. On the client: Restart the client. User should be prompted to provision WHFB.
|
> 8. On the client: Restart the client. User should be prompted to provision WHFB.
|
||||||
> 9. If the provisioning window does not pop up then need to collect NGC trace logs and further troubleshoot.
|
> 9. If the provisioning window does not pop up then need to collect NGC trace logs and further troubleshoot.
|
||||||
|
Loading…
x
Reference in New Issue
Block a user