Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Applies To: Active Directory Federation Services (AD FS) 2.0
For most users who are using single sign-on (SSO) that is enabled by AD FS 2.0, the first symptoms that will be reported or observed can vary depending on your deployment.
Passive federation
This type of identity federation involves a Web browser client (also referred to as a "passive client") that implements and uses the WS-Federation or Security Assertion Markup Language (SAML) protocols.
Active federation
This type of identity federation involves a Web service application (also referred to as an "active client") that is built to run on a phone or a computer that uses the WS-Trust protocol.
The following flowchart demonstrates the process flow to follow when you are troubleshooting a passive federation issue.
Description of symptom | Possible cause | Suggested resolution |
---|---|---|
My sign-out does not work; I see an error page. |
For SAML-P sign-out to work, the following conditions need to be true:
|
The following are possible resolutions:
|
My sign-out does not work in my Web browser. When I try to sign out it does not happen. |
To enable sign-out, AD FS 2.0 can use IFRAME elements within a Web page that rely on browser clients sending third-party cookies. Third-party cookies are defined as any cookies that are not in the same domain as the domain hosting the outermost frame. Because third-party cookies can be used to invade privacy for users by allowing one website to act on the behalf of another website, some Web browsers such as Apple Safari 4 and Internet Explorer 8 restrict and block third party cookies by default. |
The following are possible resolutions for this issue:
|
I am seeing a "connection failure" error in Internet Explorer. |
AD FS 2.0 sometimes can generate SAML-P requests longer than the maximum supported length for Internet Information Services (IIS) of 2048 characters. If this occurs, it typically happens for SAML-P during logout activity and a "connection failure" error might be returned by IIS. Also, if AD FS 2.0 is configured to send the EncryptedNameId in a signed request the query string is almost certainly longer than 2048 characters. |
The following is a possible workaround to resolve this issue:
|
Description of symptom | Possible cause | Suggested resolution |
---|---|---|
My sign-in provider is not showing up on the sign-in home page |
If a claims provider does not appear on the home realm discovery page for a Fedpassive website, its possible the claims provider is not properly configured. In the federation scenario, the fedpassive URL for the claims provider might need to be not be properly configured |
To update the URL for the Fedpassive endpoint, do the following in the AD FS 2.0 snap-in: To update the URL for the Fedpassive endpoint of a claims provider trust
|
I am seeing errors (HTTP 503 Service Unavailable Errors) that indicate sign-in service is not available and I also see Event ID 364 (Encountered error during federation passive request) in the Windows Event Log at my federation server. |
The AD FS 2.0 application pool might be stopped, possibly because of an AD FS 2.0 service account password change. You might need to update the password for the AD FS 2.0 application pool in IIS or reset the password for both AD FS 2.0 service account and its application pool. |
First, investigate the following:
If the AD FS 2.0 service account password has been changed and the AD FS 2.0 application pool is stopped, try one of the following:
|
Description of symptom | Possible causes | Suggested resolution |
---|---|---|
When I try signing in I receive an error in the browser that tells me I failed authentication. |
The following are possible causes for this error:
|
The following are possible resolutions for authentication errors:
|
Description of symptom | Possible cause | Suggested resolution |
---|---|---|
When I try signing in, it fails and the message I receive from AD FS 2.0 says I am not authorized. |
You are not authorized to use the site. |
If you need access, contact your site's administrator for more information on how to become authorized for access to the site. |
Description of symptom | Possible cause | Suggested resolution |
---|---|---|
The error I am seeing is too general for me to understand the problem. |
There was a problem accessing the site. More information might be available in the AD FS 2.0 event logs. |
For more information about how to resolve this issue, see the additional details that are provided with this event and other events that are related to this error. For more information about how to determine what other events are related to this event in the AD FS 2.0 event log, see the section "Correlating events and traces using Activity ID and Caller ID" in the blog post Diagnostics in AD FS 2.0(https://go.microsoft.com/fwlink/?LinkID=188910). |
The following flowchart demonstrates the process flow to follow when troubleshooting an active federation issue.
Description of symptom | Possible cause | Suggested resolution |
---|---|---|
I am having trouble communicating with the site that I use to sign-in from my client application. |
The following are possible causes for this error:
|
The following are possible resolutions to the problem:
|
Description of symptom | Possible cause | Suggested resolution |
---|---|---|
My client application failed to authenticate with AD FS 2.0. |
The client provided the wrong credentials. |
Verify the credentials are correct. |
Description of symptom | Possible cause | Suggested resolution |
---|---|---|
When I try signing in, it fails and the message I receive from AD FS 2.0 says I am not authorized. |
You are not authorized to use the site or a more specific authorization problem occurred in because of your deployment. |
If you need access, contact your site's administrator for more information on how to become authorized for access to the site. There might be more information available in AD FS 2.0 event logs if you are using identity delegation or a federation server proxy within your deployment to facilitate the authorization process. For more information about how to determine what other events are related to this event in the AD FS 2.0 event log, see the section "Correlating events and traces using Activity ID and Caller ID" in the blog post Diagnostics in AD FS 2.0(https://go.microsoft.com/fwlink/?LinkID=188910). |
Description of symptom | Possible cause | Suggested resolution |
---|---|---|
The error I am seeing is too general for me to understand the problem. |
There was a problem accessing the site. More information might be available in the AD FS 2.0 event logs. |
For more information about how to resolve this issue, see the additional details that are provided with this event and other events that are related to this error. For more information about how to determine what other events are related to this event in the AD FS 2.0 event log, see the section "Correlating events and traces using Activity ID and Caller ID" in the blog post Diagnostics in AD FS 2.0(https://go.microsoft.com/fwlink/?LinkID=188910). |