Troubleshoot Microsoft Dynamics CRM Server IFD
Applies To: Dynamics CRM 2013
Configure DNS records?
See “DNS configuration” in the downloadable document
Install and bind your certificate on the Microsoft Dynamics CRM website?
See “Certificate selection and requirements” in the downloadable document
Add an AD FS signing certificate as a trusted certificate under the CRMAppPool account profile?
See “Enable AD FS token signing” in the downloadable document
Change the binding type for Microsoft Dynamics CRM websites to HTTPS and use the correct web addresses in Deployment Manager?
Give the CRMAppPool account the rights to use an existing certificate used by Microsoft Dynamics CRM as signing certificate? This could be the wildcard certificate installed on the Microsoft Dynamics CRM server.
Run the Configure Claims-Based Authentication Wizard from Microsoft Dynamics CRM Deployment Manager? Have you specified the correct URL in this wizard? Have you selected the appropriate encryption certificate?
Configure relying party trust in AD FS for Microsoft Dynamics CRM internal claims endpoint? Have you provided the correct URL for the Microsoft Dynamics CRM IFD claims endpoint? Have you setup the correct rules for the relying party trusts?
Use the following to verify your AD FS settings.
Review AD FS events
Open Event Viewer.
Expand Applications and Services Logs. Expand AD FS. Click Admin.
Review the events looking for errors.
Events such as Event ID 184 describing an unknown relying party trust could indicate missing host records in DNS or incorrect path configuration for the relying party’s federation metadata URL.
Verify relying party trust identifiers
Open the AD FS Management console.
Under Trust Relationships, click Relying Party Trusts. Verify the relying party trusts are enabled and not displaying an alert.
Right-click the relying party trust and click Properties. Click the Identifiers tab. You should see identifiers like the following.
Relying party trust for claims: internalcrm.contoso.com
Relying party trust for IFD: auth.contoso.com
If your identifiers aren’t similar to the above examples, check the path entered for the relying party’s federation metadata URL on the Monitoring tab and check your DNS records.
When attempting an internal claims-based authentication connection, you might receive prompt for your credentials. Try the following steps.
Resolve prompt for credentials
Add the add website address for the AD FS server (for example, https://sts1.contoso.com) to the Trusted Intranet Zone in Internet Explorer.
Turn off Extended Protection. On the server running IIS for the Microsoft Dynamics CRM website:
Turn off extended protection on the Microsoft Dynamics CRM website.
Select the Microsoft Dynamics CRM website.
Under IIS, double-click Authentication.
Right-click Windows Authentication, and then click Advanced Settings.
Set Extended Protection to Off.
For more AD FS troubleshooting information
See the following: Troubleshoot AD FS 2.0
If the Microsoft Dynamics CRM website fails to display or produces the following error: HTTP Error 401.1 - Unauthorized: Access is denied, there are two steps to try to resolve this issue:
An authentication error can occur if the time between the AD FS and the Microsoft Dynamics CRM server differs by more than 5 minutes. See Windows Time Service Technical Reference for information on how to configure time synchronization on your servers.