Troubleshooting certificate problems with AD FS 2.0
Updated: February 16, 2012
Applies To: Active Directory Federation Services (AD FS) 2.0
The following table provides troubleshooting guidance for specific error event messages or other issues that you may encounter if you are having problems working with certificates that are used by the Active Directory Federation Services (AD FS) 2.0 service.
Before you begin the troubleshooting process, we recommend that you first try to configure AD FS 2.0 for troubleshooting and check for known common issues that might prevent normal functioning for the Federation Service. For detailed instructions for configuring and performing related system checks, see Configuring Computers for Troubleshooting AD FS 2.0 and Things to Check Before Troubleshooting AD FS 2.0.
Event or symptom | Possible cause | Resolution | ||
---|---|---|---|---|
Event ID 249 |
The specified certificate either does not exist in the local certificate store, or the AD FS 2.0 service account does not have permissions to access the certificate. |
Ensure that the certificate (identified by its thumbprint in the event text) has been added to the LocalMachine\My store folder on the federation server computer. Also, verify that the AD FS 2.0 service account has access to the private key for this certificate. For more information, see Things to Check Before Troubleshooting AD FS 2.0. |
||
Event ID 315 |
The following are possible causes for this event:
|
The following are possible resolutions to this event:
|
||
Event ID 316 |
The following are possible causes for this event:
Note You can use Windows PowerShell cmdlets for AD FS 2.0 to configure the revocation settings for the relying party trust's signing certificate. For the specific setting, use the SigningCertificateRevocationCheck parameter of the Set-ADFSRelyingPartyTrust cmdlet.
|
The following are possible resolutions to this event:
|
||
Event ID 317 |
The following are possible causes for this event:
Note You can use Windows PowerShell cmdlets for AD FS 2.0 to configure the revocation settings for the relying party trust's encryption certificate. For the specific setting, use the EncryptionCertificateRevocationCheck parameter of the Set-ADFSRelyingPartyTrust cmdlet.
|
The following are possible resolutions to this event:
|
||
Event ID 319 |
The following are possible causes for this event:
Note To configure the revocation settings for the client certificate, you can use the Set-ADFSProperties cmdlet with the ClientcertRevocationCheck parameter in Windows PowerShell for AD FS 2.0.
|
The following are possible resolutions to this event:
|
||
Event ID 360 |
The following are possible causes for this event:
|
The following are possible resolutions for this event:
|
||
Event ID 374 |
The following are possible causes for this event:
Note You can use Windows PowerShell cmdlets for AD FS 2.0 to configure the revocation settings for the claims provider trust's encryption certificate. For the specific setting, use the EncryptionCertificateRevocationCheck parameter of the Set-ADFSClaimsProviderTrust cmdlet.
|
The following are possible resolutions to this event:
|
||
Event ID 381 |
This event occurs whenever the Federation Service updates its service state or tries to refresh its cached certificate configuration data. If the configuration has changed so that one of the configured certificates is invalid when a refresh occurs, this event is logged. The following are possible causes for this event:
|
Ensure that the certificate is valid and has not been revoked or expired. |
||
Event ID 385 |
This event occurs because one or more certificates are expired, or will expire soon. |
If certificate rollover is enabled, this issue resolves on its own. In other cases, refer to the thumbprint or other certificate-identifying data in the additional details section of the event itself. After you identify the certificate that caused this event to occur, manually update the certificate to correct the problem. |
||
Event ID 387 |
The AD FS 2.0 service account does not have permissions to read the private keys for the configured certificates. |
Ensure that the AD FS 2.0 service account has read permissions on the certificate private keys. For more information, see Confirm that private keys for certificates are accessible by the AD FS service user account. |
||
Event ID 389 |
This event occurs because the certificates that are configured for one or more claims provider trusts or relying party trusts are expired, or will expire soon. |
If you manually created the trust, you must update the certificate configuration yourself. If you used Federation Metadata when you created the trust, the certificate configuration updates dynamically. Note For dynamic update to occur reliably, your trust partner must have updated the certificate that is expired, or that will expire soon, in their configuration.
|
The following table can be helpful in determining the certificate that is the root cause of an error in your AD FS 2.0 certificate configuration.
Policy | CRL Checking certificate | Scenario | Protocols affected | Occurs | Event thrown | Expiration check |
---|---|---|---|---|---|---|
Relying Party |
Relying party signing certificate |
AD FS 2.0 receives a signed SAML-P request sent by a relying party. Note Requiring signing of sign-in requests is a configurable option. To set this requirement for a relying party trust, use the RequireSignedSamlRequests parameter with the Set-ADFSRelyingPartyTrust cmdlet.
|
SAML-P |
Sign in |
Event ID 316 |
Yes |
AD FS 2.0 receives a signed SAML sign-out request from RP (sign-out request must be signed) |
SAML-P |
Sign Out (POST or Redirect Binding) |
Event ID 316 |
Yes |
||
Relying party encryption certificate |
AD FS 2.0 receives a sign out request from a claims provider and encrypts a sign out request for the relying party. In this scenario, the claims provider initiates signout. |
SAML-P/WS-* |
Sign Out request (POST or Redirect Binding) |
Event ID 317 |
Yes |
|
AD FS 2.0 issues an encrypted token for a relying party. |
SAML-P/WS-* |
Token Issuance |
Event ID 317 |
Yes |
||
Claims Provider |
Claims provider signing certificate |
AD FS 2.0 receives an issued token from a claims provider. |
SAML-P/WS-* |
Token Acceptance |
Event ID 315 |
Yes |
AD FS 2.0 receives a signed SAML sign-out request from a claims provider. In this scenario, the signout request must be signed. |
SAML-P |
Sign Out request (POST or Redirect Binding) |
Event ID 315 |
Yes |
||
Claims provider encryption certificate |
AD FS 2.0 receives a sign out request from a relying party and encrypts a signout request for claims provider. |
SAML-P |
Sign Out |
Event ID 374 |
Yes |
|
Self |
Self-issued signing certificate |
AD FS 2.0 issuing a token for a relying party. |
SAML-P/WS-* |
Token Issuance |
None |
Yes |
Self-issued encryption certificate |
AD FS 2.0 accepts an encrypted token from a claims provider. |
SAML-P/WS-* |
Token Acceptance |
None |
No |