Event ID 639 — Trust Policy and Configuration

Updated: February 27, 2008

Applies To: Windows Server 2008

red

The Active Directory Federation Services (AD FS) trust policy file defines the set of parameters that a Federation Service requires to identify partners, certificates, account stores, claims, and the various properties of these entities that are associated with the Federation Service.

Event Details

Product: Windows Operating System
ID: 639
Source: Microsoft-Windows-ADFS
Version: 6.0
Symbolic Name: TrustedRealmDomainsNonWindows
Message: The Federation Service encountered an error while loading the trust policy. An account partner is misconfigured.

The AllowedTrustedWindowsDomains field is configured for an account partner for which Windows trust is not enabled.
Field: AllowedTrustedWindowsDomains

If this error occurs during startup of the Federation Service, the Federation Service will be not be able to start, and all requests to the Federation Service will fail until the configuration is corrected. If this error occurs while the Federation Service is running, the Federation Service will continue to use the last trust policy that was loaded successfully.

User Action
This error should occur only if the trust policy file has been modified without use of the AD FS administrative tools. Either enable Windows trust on the account partner or remove the AllowedTrustedWindowsDomains field.

Resolve

Review the Windows trust setting

This error occurs only if the trust policy file has been modified without the use of the Active Directory Federation Services snap-in.

Either select the Windows trust check box on the account partner or remove the AllowedTrustedWindowsDomains field from the trust policy file.

To perform this procedure, you must be a member of the local Administrators group, or you must have been delegated the appropriate authority.

To configure an account partner to use Windows trust using the Active Directory Federation Services snap-in:

  1. Click Start, point to Administrative Tools, and then click Active Directory Federation Services.
  2. Double-click Federation Service, double-click Trust Policy, double-click Partner Organizations, and then double-click Account Partners.
  3. Right-click the account partner that you want to configure to use Windows trust, and then click Properties.
  4. On the Windows Trust tab, click Use Windows trust relationship.
  5. In Trusted Active Directory domains and forests, do one of the following, and then click OK:
    • Click All Active Directory domains and forests if you want to allow users in all trusted domains in the account partner forest and in any forest that is trusted by the account partner forest, and then click OK.
    • Click Specified Active Directory domains and forests (press ENTER to separate entries) if you want to specify only the domains where you want to allow federated access. Type a domain name, press ENTER, and then repeat this action to add each domain in the account partner forest and in any other trusted forests for the users that you want to grant access to resources.

For more information about the AllowedTrustedWindowsDomains field, see TrustedRealm.AllowedTrustedWindowsDomains Property (http://go.microsoft.com/fwlink/?LinkId=64673).

Verify

Verify that you can access the Active Directory Federation Services (AD FS)-enabled application from a client browser and that the resource can be accessed.

Related Management Information

Trust Policy and Configuration

Active Directory Federation Services

Community Additions

ADD
Show: