Hi,
Sorry for the double posting, the original thread had a kind of different question to start with. So, I'm trying to deploy Windows Hello for Business Certificate Trust on-premises in my work place. I've followed the guide for deploying the Key trust authentication,
but later changed it to Certificate trust (I'm not sure I've cleaned all of the Key trust settings, since most of them are the same for both Key and Certificate. However, it seems I have a problem with the AD FS device registration. I seems the devices don't
get registered, and I can't think of what I've done wrong for this to happen. I've managed to get to the point where I get "This sign-in option is only available when connected to your organization's network". And here's what "dsregcmd
/status" and "dsregcmd /debug"gives me as results:
+----------------------------------------------------------------------+
| Device State |+----------------------------------------------------------------------+
AzureAdJoined : NO
EnterpriseJoined : YES
DomainJoined : YES
DomainName : <domain name>+----------------------------------------------------------------------+
| Device Details |+----------------------------------------------------------------------+
DeviceId : f7c113b3-18d2-4da8-baa7-45fd45431096
Thumbprint : 756CDDBC67B7FA994A05F766F81E3A5429DACDC7
DeviceCertificateValidity : [ 2019-12-17 10:50:34.000 UTC -- 2029-12-14 11:00:34.000 UTC ]
KeyContainerId : 5303e1fb-1d9b-4993-a58e-b15720fdc4be
KeyProvider : Microsoft Platform Crypto Provider
TpmProtected : YES
+----------------------------------------------------------------------+
| Tenant Details |+----------------------------------------------------------------------+
TenantName :
TenantId : 383a3889-5bc9-47a3-846c-2b70f0b7fe0e
Idp : login.windows.net
AuthCodeUrl : https://fs.<domain name>.org/adfs/oauth2/authorize
AccessTokenUrl : https://fs.<domain name>.org/adfs/oauth2/token
MdmUrl :
MdmTouUrl :
MdmComplianceUrl :
SettingsUrl :
JoinSrvVersion : 1.0
JoinSrvUrl : https://fs.<domain name>.org/EnrollmentServer/device/
JoinSrvId : urn:ms-drs:434DF4A9-3CF2-4C1D-917E-2CD2B72F515A
KeySrvVersion : 1.0
KeySrvUrl : https://fs.<domain name>.org/EnrollmentServer/key/
KeySrvId : urn:ms-drs:434DF4A9-3CF2-4C1D-917E-2CD2B72F515A
WebAuthNSrvVersion : 1.0
WebAuthNSrvUrl : https://fs.<domain name>.org/webauthn/383a3889-5bc9-47a3-846c-2b70f0b7fe0e/
WebAuthNSrvId : urn:ms-drs:434DF4A9-3CF2-4C1D-917E-2CD2B72F515A
DeviceManagementSrvVer : 1.0
DeviceManagementSrvUrl : https://fs.<domain name>.org/manage/383a3889-5bc9-47a3-846c-2b70f0b7fe0e/
DeviceManagementSrvId : urn:ms-drs:434DF4A9-3CF2-4C1D-917E-2CD2B72F515A+----------------------------------------------------------------------+
| User State |+----------------------------------------------------------------------+
NgcSet : NO
WorkplaceJoined : NO
WamDefaultSet : NO
+----------------------------------------------------------------------+
| SSO State |+----------------------------------------------------------------------+
AzureAdPrt : NO
AzureAdPrtAuthority :
EnterprisePrt : NO
EnterprisePrtAuthority :
+----------------------------------------------------------------------+
| Diagnostic Data |+----------------------------------------------------------------------+
AadRecoveryEnabled : NO
KeySignTest : PASSED
+----------------------------------------------------------------------+
| Ngc Prerequisite Check |+----------------------------------------------------------------------+
IsDeviceJoined : YES
IsUserAzureAD : NO
PolicyEnabled : YES
PostLogonEnabled : YES
DeviceEligible : YES
SessionIsNotRemote : YES
CertEnrollment : enrollment authority
AdfsRefreshToken : NO
AdfsRaIsReady : NO
LogonCertTemplateReady : UNKNOWN
PreReqResult : WillNotProvision
dsregcmd::wmain logging initialized.
DsrCmdJoinHelper::Join: ClientRequestId: f3eb70f9-aed9-441e-8607-eb22a2dae9f8PreJoinChecks Complete.
preCheckResult: DoNotJoin
deviceKeysHealthy: undefined
isJoined: undefined
isDcAvailable: undefined
isSystem: NO
keyProvider: undefined
keyContainer: undefined
dsrInstance: undefined
elapsedSeconds: 0
resultCode: 0x1
The device can NOT be joined. The process MUST run as NT AUTHORITY\SYSTEM.
If you have any suggestions, what should I do, cause the Docs are good, but at certain point get a bit "for more information, check ******" again and again, and suddenly I'm with 20 tabs, can't follow where I was, and where's I'm going.
Thanks in advance.
//Edit
When I restart the device, supposed to be registered, I get the following Error log on the AD FS server "AD FS -> Admin" Event logs:
Encountered error during OAuth token request.
Additional Data
Exception details:
Microsoft.IdentityServer.Web.Protocols.OAuth.Exceptions.OAuthUnauthorizedClientException: MSIS9368: Received invalid OAuth request. The client '38aa3b87-a06d-4817-b275-7a316988d93b' is forbidden to access the resource 'http://schemas.microsoft.com/ws/2009/12/identityserver/selfscope' with scope 'ugs'.
at Microsoft.IdentityServer.Web.Protocols.OAuth.OAuthProtocolContext.ValidateScopes(String scopeParameter, String clientId, String relyingPartyId)
at Microsoft.IdentityServer.Web.Protocols.OAuth.OAuthToken.OAuthJWTBearerRequestContext.ValidateCore()
At the machine "Aplication and services logs -> Microsoft -> Windows -> AAD -> Operational" 4 logs appear after rebooting the PC:
Http request status: 400. Method: POST Endpoint Uri: https://fs.<domain name>.org/adfs/oauth2/token Correlation ID: 7A2A19EB-8888-4DC8-9957-408092271DC2
OAuth response error: unauthorized_client
Error description: MSIS9605: The client is not allowed to access the requested resource.
CorrelationID:
Enterprise STS Logon failure. Status: 0xC000006D Correlation ID: 7A2A19EB-8888-4DC8-9957-408092271DC2
Logon failure. Status: 0xC000006D Correlation ID: 7A2A19EB-8888-4DC8-9957-408092271DC2
Any help will be appreciated. Thanks in advance.