<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>ADFS &#8211; Webbanshee</title>
	<atom:link href="https://webbanshee.net/tag/adfs/feed/" rel="self" type="application/rss+xml" />
	<link>https://webbanshee.net</link>
	<description>Your Exchange Server Blog</description>
	<lastBuildDate>Thu, 28 Apr 2022 07:33:12 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://webbanshee.net/wp-content/uploads/2017/01/WB_BL_RND-150x150.png</url>
	<title>ADFS &#8211; Webbanshee</title>
	<link>https://webbanshee.net</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">122610384</site>	<item>
		<title>ADFS Server Core Token Signing Certificate</title>
		<link>https://webbanshee.net/adfs-server-core-token-signing-certificate/</link>
					<comments>https://webbanshee.net/adfs-server-core-token-signing-certificate/#respond</comments>
		
		<dc:creator><![CDATA[WebBanshee]]></dc:creator>
		<pubDate>Wed, 27 Oct 2021 10:38:03 +0000</pubDate>
				<category><![CDATA[Serverside]]></category>
		<category><![CDATA[ADFS]]></category>
		<category><![CDATA[Powershell]]></category>
		<category><![CDATA[ServerCore]]></category>
		<guid isPermaLink="false">https://webbanshee.net/?p=4027</guid>

					<description><![CDATA[<style>.key{background:#444444;padding-left: 5px;padding-right: 5px;padding-top: 2px;padding-bottom: 2px;color:#fefefe;border-radius: 3px;font-size: 14px;}</style>
<p><a class="ex-link" href="https://webbanshee.net/adfs-server-core-token-signing-certificate/"><img style="border-radius:8px;" src="https://webbanshee.net/wp-content/uploads/2021/10/ADFS-Server-Core.svg"/><span class="exTeaser" style="width:70%;">ADFS Server Core Token Signing Certificate</span><br />
<span class="exText" style="width:70%;" >With ADFS running on Server Core the method of the yearly renewal of the Token Signing Certificate has changed to PowerShell only. I have just finished the renewal of the Token Signing Certificate via Powershell in our test environment. In this post, I will sum up the steps.<span style="font-size: 11px !Important; width: 10%; height: 5%; color: #993333; padding-left: 20px;">......read more</span></span></a></p>
<p>The post <a rel="nofollow" href="https://webbanshee.net/adfs-server-core-token-signing-certificate/">ADFS Server Core Token Signing Certificate</a> appeared first on <a rel="nofollow" href="https://webbanshee.net">Webbanshee</a>.</p>
]]></description>
										<content:encoded><![CDATA[<style>
.num{margin-top:2px!Important; margin-right:10px;} h2 {font-weight: bold;text-decoration:none;font-size: 20px!Important;} .see {overflow-x: scroll!Important; overflow-y: hidden;white-space:nowrap;} .wpe-box-note3 {color:#333;}
</style>
<p>Hi there, we have upgraded our servers. ADFS servers are running on Windows Server 2019 Core now. Therewith the method of the yearly renewal of the Token Signing Certificate has changed to PowerShell only.</p>
<p>I have just finished the renewal of the Token Signing Certificate via Powershell in our test environment. In this post, I will sum up the steps.</p>
<p>In case you want to renew the Token Signing certificate via GUI on an appropriate server see this post: <a href="https://webbanshee.net/adfs-token-signing-certificate/">Renew ADFS Token Signing Certificate</a></p>
<p>Let&#8217;s start with a short description of relevant ADFS properties: <span style="font-weight:bold;">[Get-ADFSProperties | fl *cert*]</span></p>
<div class="wpe-box wpe-box-alert" style="background: #F9F6D9!Important; text-align:justify;">
<h4><span style="text-decoration: underline; color: #993333;"><strong>CertficateGenerationThreshold :</strong></span></h4>
<p>Has by default a value of 20 ( days ). That means that 20 days before the current primary ADFS Token Signing Certificate expires, a secondary certificate will be generated ( this will be the new cert after the current one expires ). You can check if the secondary certificate has already been created withe the following commands: </p>
<div class="wpe-box wpe-box-note3" style="color:#232366;">
<span style="font-weight:bold;">Get-AdfsCertificate -CertificateType Token-Signing</span><br />
<span style="font-weight:bold;">Get-AdfsCertificate -CertificateType Token-Decrypting</span>
</div>
<p>When the secondary certificate exists the ouput should list minimum two certificates. Focus on the certificate which has the attribute <span style="font-weight:bold;">IsPrimary</span> set to <span style="font-weight:bold;">False</span>. Verify that the <span style="font-weight:bold;">Not Before:</span> date is correct. </p>
<h4><span style="text-decoration: underline; color: #993333;"><strong>AutoCertificateRollover :</strong></span></h4>
<p>The default value of this attribute should be set to $True and should only be changed to $False for the time when the automatically created secondary certificate will be assigned as the primary ADFS certificate. When you manually renew the Token Signing Certificate this should always be set to $False. Otherwise, the secondary certificate will be promoted as the primary certificate automatically. Web logins to application servers will not be possible until the new certificate has not been introduced on the affected application servers.  </p>
<h4><span style="text-decoration: underline; color: #993333;"><strong>CertificatePromotionThreshold :</strong></span></h4>
<p>This attribute is important and should be monitored before the upcoming expiration of the current ADFS Token Signing Certificate. It defines after how many days ( counting from the creation date of the secondary ADFS certificate ) the new certificate will be defined automatically as primary.<br />
If the value of this attribute is set to 15 it means that the secondary certificate will be assigned as primary automatically after 15 days.<br />
Based on the example above the servers should be updated with the thumbprint of the new certificate maximum of 15 days ( better earlier ) after the creation of the secondary ADFS Token Signing Certificate.</p>
<h4><span style="text-decoration: underline; color: #993333;"><strong>CertificateRolloverInterval :</strong></span></h4>
<p>Defines the interval in minutes at which ADFS checks if a new certificate needs to be generated. The default value is 720. If you change the values above accordingly to their meaning and your needs you can lower this value to 5 minutes for instance to generate the secondary certificate if it has not been generated yet. Set it back to default afterward.</p>
<p>Microsoft describes these properties <a href="https://social.technet.microsoft.com/wiki/contents/articles/16156.ad-fs-2-0-understanding-autocertificaterollover-threshold-properties.aspx" rel="noopener noreferrer" target="_blank">here</a>.
</div>
<p><br />
With that being said we are good to go. Log on to your ADFS Server Core.</p>
<h2><img src="https://webbanshee.net/wp-content/uploads/2019/01/round_1.svg" alt="1 - ADFS Server Core" class="num"  role="img" />Query the secondary Token Signing and Decrypting certificates</h2>
<div class="wpe-box wpe-box-note3" Style="font-weight:bold;margin-bottom: 10px;">
Get-AdfsCertificate -CertificateType Token-Signing | where {$_.IsPrimary -eq $False}<br />
Get-AdfsCertificate -CertificateType Token-Decrypting   | where {$_.IsPrimary -eq $False}
</div>
<p>Note the thumbprints. You will need them later.</p>
<h2><img src="https://webbanshee.net/wp-content/uploads/2019/01/round_2.svg" alt="2 -" class="num"  role="img" />Export the secondary Token Signing Certificate</h2>
<p>Export the certificate to a location you can reach from the application servers. I usually export the cert to a local folder on the ADFS server.</p>
<div class="wpe-box wpe-box-note3 see" Style="font-weight:bold;margin-bottom: 20px;">
$certRefs=Get-AdfsCertificate -CertificateType Token-Signing | where {$_.IsPrimary -eq <span style="font-weight:bold; color:#993333;">$False</span>}<br />
$certBytes=$certRefs[0].Certificate.Export([System.Security.Cryptography.X509Certificates.X509ContentType]::Cert)<br />
[System.IO.File]::WriteAllBytes(<span style="font-weight:bold; color:#993333;">&#8220;C:\PathToExportFolder\CertName.cer&#8221;</span>, $certBytes)
</div>
<h2><img src="https://webbanshee.net/wp-content/uploads/2019/01/round_3.svg" alt="3 -" class="num"  role="img" />Import the certificate from your ADFS Server Core to all Exchange servers</h2>
<p>The certificate will be imported to the Trusted Root Certification Authority of LocalMachine:</p>
<div class="wpe-box wpe-box-note3 see" Style="font-weight:bold;margin-bottom: 10px;">
Import-Certificate -FilePath <span style="font-weight:bold; color:#993333;">\\ADFSServerName\c`$\PathToExportFolderOnADFSServer\CertName.cer</span> -CertStoreLocation Cert:\LocalMachine\Root
</div>
<p>You can check that the certificate has been imported successfully via remote MMC from a GUI server:</p>
<div class="wpe-box wpe-box-note3">
<span style="color:#232366;font-weight:bold;">MMC > Add/Remove Snap-in > Certificates > Computername > This snap-in will manage: Another Computer > Enter the <span style="color:#993333;font-weight:bold;">ServerName</span> where you just have imported the certificate.</span></p>
<p><span style="color:#232366;font-weight:bold;">Navigate to <span style="color:#993333;font-weight:bold;">ServerName</span>\Trusted Root Certification Authorities > Certificates and verify that the imported ADFS Signing certificate is there.</span>
</div>
<p>Of course you can check it with PowerShell as well:</p>
<div class="wpe-box wpe-box-note3" style="font-weight:bold;">
Set-Location -Path cert:\LocalMachine\root<br />
Get-ChildItem | where {$_.subject -like &#8220;*ADFS*&#8221;} | fl
</div>
<h2><img src="https://webbanshee.net/wp-content/uploads/2019/01/round_4.svg" alt="4 -" class="num"  role="img" />Promote the new secondary certificate to primary on ADFS Server Core</h2>
<div class="wpe-box wpe-box-alert" style="background: #F9F6D9!Important;color:#993333;font-weight:bold; text-align:justify;">
After this logins to web services on the involved application servers using ADFS will not be possible until the new certificate has been introduced on the application servers! ( E.g. Exchange OWA )
</div>
<p>Set AutoCertificationRollover to False to be able to promote your secondary certificate to primary:</p>
<div class="wpe-box wpe-box-note3" style="font-weight:bold;">
Set-ADFSProperties -AutoCertificateRollover <span style="color:#993333;font-weight:bold;">$False</span>
</div>
<p>Query the thumbprint of the new Token Signing and Decrypting certificates:</p>
<div class="wpe-box wpe-box-note3" style="font-weight:bold;">
Get-AdfsCertificate -CertificateType Token-Signing | where {$_.IsPrimary -eq $False}<br />
Get-AdfsCertificate -CertificateType Token-Decrypting   | where {$_.IsPrimary -eq $False}
</div>
<p>Note the thumbprint of both certificates.</p>
<p>Promote both secondary certificates ( Token Signing and Decrypting ) to primary:</p>
<div class="wpe-box wpe-box-note3 see" style="font-weight:bold;">
Set-AdfsCertificate -IsPrimary -CertificateType &#8220;Token-Signing&#8221; -Thumbprint <span style="color:#993333;font-weight:bold;">ThumbprintGoesHere</span><br />
Set-AdfsCertificate -IsPrimary -CertificateType &#8220;Token-Decrypting&#8221; -Thumbprint <span style="color:#993333;font-weight:bold;">ThumbprintGoesHere</span>
</div>
<div class="wpe-box wpe-box-alert" style="background: #F9F6D9!Important;text-align:justify;">
<span style="color:#993333;font-weight:bold;">However, I got an error here stating that I need to add the certificate first. When I tried to add the Token Signing certificate on ADFS Server Core:</span></p>
<div class="wpe-box wpe-box-note3" style="margin-bottom: 10px;">
<span style="color:#181818;font-weight:bold;">Add-AdfsCertificate -CertificateType Token-Signing | where {$_.IsPrimary -eq $False}</span>
</div>
<p><span style="color:#993333;font-weight:bold;">The output was a message stating the certificate is already added.</span></p>
<p><span style="color:#993333;font-weight:bold;">I think you need to wait a little bit after you set AutoCertificateRollover to True. Several tries later it succeeded. To be honest I could not identify the cause &#8211; I just assume it could have been the elapsed time after I set AutoCertificateRollover to True.</span>
</div>
<p>Verify that the new certificates have the primary status:</p>
<div class="wpe-box wpe-box-note3" style="margin-bottom: 10px;">
<span style="font-weight:bold;">Get-AdfsCertificate -CertificateType Token-Signing | where {$_.IsPrimary -eq <span style="color:#993333;font-weight:bold;">$True</span>}</span><br />
<span style="font-weight:bold;">Get-AdfsCertificate -CertificateType Token-Decrypting   | where {$_.IsPrimary -eq <span style="color:#993333;font-weight:bold;">$True</span>}</span>
</div>
<p>Switch AutoCertificateRollover back to True:</p>
<div class="wpe-box wpe-box-note3" style="margin-bottom: 10px;">
<span style="font-weight:bold;">Set-ADFSProperties -AutoCertificateRollover</span> <span style="color:#993333;font-weight:bold;">$True</span>
</div>
<p>Check it:</p>
<div class="wpe-box wpe-box-note3">
<span style="font-weight:bold;">Get-ADFSProperties | fl *cert*</span></p>
<p>AutoCertificateRollover should be True!
</p></div>
<h2><img src="https://webbanshee.net/wp-content/uploads/2019/01/round_5.svg" alt="5 -" class="num"  role="img" />Introduce the new Token Signing Certificate to the Exchange organization</h2>
<p>It is enough to fire the following command once from an Exchange Server within your organization:</p>
<div class="wpe-box wpe-box-note3" style="margin-bottom: 15px;">
<span style="font-weight:bold;">Set-OrganizationConfig -AdfsSignCertificateThumbprint</span> <span style="font-weight:bold;color:#993333;">ADFSTokenSigningCertThumbprint</span>
</div>
<p>Verify the AdfsSignCertificateThumbprint:</p>
<div class="wpe-box wpe-box-note3" style="margin-bottom: 15px;">
<span style="font-weight:bold;">Get-OrganizationConfig | select adfs*</span>
</div>
<p>Restart IIS:</p>
<div class="wpe-box wpe-box-note3" style="margin-bottom: 15px;">
<span style="font-weight:bold;">iisreset /noforce</span>
</div>
<p>Or Restart IIS remotely:</p>
<div class="wpe-box wpe-box-note3" style="margin-bottom: 15px;">
<span style="font-weight:bold;">invoke-command -computername <span style="font-weight:bold;color:#993333;">&#8220;ServerName&#8221;</span> -scriptblock {iisreset /noforce}</span>
</div>
<p>Now try to login via web frontend to your application servers. ( try an Outlook on the Web login ) </p>
<p>That&#8217;s it <img loading="lazy" src="https://webbanshee.net/wp-content/uploads/2017/11/Smiley.svg" alt="ADFS Server Core Smiley" width="24" height="24" class="alignnone size-thumbnail wp-image-1478" style="margin-top: 0px; margin-left:8px;" role="img" /></p>
<p>Stay healthy!<br />
&nbsp;</p>
<p>The post <a rel="nofollow" href="https://webbanshee.net/adfs-server-core-token-signing-certificate/">ADFS Server Core Token Signing Certificate</a> appeared first on <a rel="nofollow" href="https://webbanshee.net">Webbanshee</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://webbanshee.net/adfs-server-core-token-signing-certificate/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4027</post-id>	</item>
		<item>
		<title>Renew ADFS Token Signing Certificate</title>
		<link>https://webbanshee.net/adfs-token-signing-certificate/</link>
					<comments>https://webbanshee.net/adfs-token-signing-certificate/#comments</comments>
		
		<dc:creator><![CDATA[WebBanshee]]></dc:creator>
		<pubDate>Fri, 07 Jul 2017 05:22:59 +0000</pubDate>
				<category><![CDATA[Serverside]]></category>
		<category><![CDATA[ADFS]]></category>
		<category><![CDATA[Powershell]]></category>
		<guid isPermaLink="false">http://webbanshee.net/?p=1118</guid>

					<description><![CDATA[<p><a class="ex-link" href="https://webbanshee.net/adfs-token-signing-certificate/"><img src="https://webbanshee.net/wp-content/uploads/2017/10/ADFSTokenSigningCertficate.svg" /><br />
<span class="exTeaser" style="width:99%;">To renew the ADFS Token Signing Certificate is an every year come back task except if you have set the token not to expire after 365 days.<span class="exreadmore">...read more</span></span></a></p>
<p>The post <a rel="nofollow" href="https://webbanshee.net/adfs-token-signing-certificate/">Renew ADFS Token Signing Certificate</a> appeared first on <a rel="nofollow" href="https://webbanshee.net">Webbanshee</a>.</p>
]]></description>
										<content:encoded><![CDATA[<style>h2 {font-weight: bold;text-decoration:none;font-size: 20px!Important;}h3 {font-weight: bold;text-decoration:none;font-size: 18px!Important;}h4 {font-weight: bold;text-decoration:none;font-size: 16px!Important;}.wp-image-2045,.wp-image-2051,.wp-image-2050,.wp-image-2049,.wp-image-2056, .wp-image-2055 {margin-top:2px!Important;margin-right:6px;}.red{background:#E86275;padding-left: 5px;padding-right: 5px;padding-top: 2px;padding-bottom: 2px;color:#fefefe;border-radius: 3px;font-size: 14px;} .wpe-button-blue {background:#1072C1!Important; border: none!Important;} .txtred {color:#993333;font-weight:bold;} .txtbold {font-weight:bold;} .wpe-box-error1 {background-color:#ffebe8!important;border: 1px solid #c00;text-align: justify;} .wpe-button-blue {background: #1072C1!Important; border: none!Important;} .BlueCopy{background: #3084c9;color: #fff;font-weight: 700;margin-left:5px;}</style>
<p style="text-align:justify;">To renew the ADFS Token Signing Certificate is an every year come back task except if you have set the token not to expire after 365 days. The procedure we use and I describe in this post is based on this straight forward article posted by Andi Sichel on his Blog &gt; <a href="https://asichel.de/2015/06/29/adfs-exchange-wap-1-jahr-nach-der-installation">adfs-exchange-wap-1-jahr-nach-der-installation</a></p>
<p>You can also find a detailed description on how to do it with PowerShell only <a href="https://webbanshee.net/adfs-server-core-token-signing-certificate/"><button id="divClipboard" class="BlueCopy">here</button></a></p>
<p>First, let&#8217;s get clear with the meaning of some relevant attributes and values appearing in the output of the following command :</p>
<div class="wpe-box wpe-box-note3">
<p><strong>Get-ADFSProperties | fl</strong></p>
</div>
<div class="wpe-box wpe-box-alert" style="background: #F9F6D9!Important; text-align:justify;">
<span style="text-decoration: underline; color: #993333;"><strong>CertficateGenerationThreshold :</strong></span><br />
Has by default a value of 20 ( days ) . This means that 20 days before the current primary ADFS Token Signing Certificate expires , a secondary certificate will be generated ( this will be the new cert after the current one expires ). This one will be visible as secondary ADFS Token Signing Certificate in the ADFS Management Console.</p>
<p><span style="text-decoration: underline; color: #993333;"><strong>AutoCertificateRollover :</strong></span><br />
The default value of this attribute should be set to $True and should only be changed to $False for the time when the automatically created secondary certificate will be assigned as the primary ADFS certificate.</p>
<p><span style="text-decoration: underline; color: #993333;"><strong>CertificatePromotionThreshold :</strong></span><br />
This attribute is important and should be monitored before the upcoming expiration of the current ADFS Token Signing Certificate. It defines after how many days ( counting from the creation date of the secondary ADFS certificate ) the new certificate will be defined automatically as primary.<br />
If the value of this attribute is set to 15 it means that the secondary certificate will be assigned as primary automatically after 15 days.<br />
Based on the example above the servers should be updated with the thumbprint of the new certificate maximum 15 days ( better earlier ) after the creation of the secondary ADFS Token Signing Certificate.
</div>
<p><br />
<strong>Here we go :<br />
</strong></p>
<h2><span style="background-color: #fecb39; border: 1px solid #181818; padding: 2px 5px; border-radius: 3px; font-weight: bold;font-size:16px!Important;">1</span><span style="padding-left: 6px;font-weight:bold;">Export secondary ADFS Token Signing Certificate:</span></h2>
<div class="wpe-box wpe-box-note3">
Open ADFS console on your ADFS server:<br />
<span style="color: #232366;"><strong>Server Manager &gt; Tools &gt; AD FS Management &gt; ADFS &gt; Services &gt; Certificates</strong></span></p>
<p>You will see the newly generated certificate as secondary certificate :<br />
<span style="color: #232366;"><strong>Right-click on it &gt; View Certificate &gt; Details &gt; Copy To File &gt; Next &gt; choose DER &gt; choose File Location &gt; Export<br />
</strong></span><br />
<span style="font-size: 16px;">[ in this phase you will notice that the Set Primary option on the secondary certificate is grayed out ]<br />
</span>
</div>
<h3>To export the certificate via PowerShell:</h3>
<div class="wpe-box wpe-box-note3" style="overflow:auto;">
<span style="color: #232366; font-weight:bold;">$certRefs=Get-AdfsCertificate -CertificateType Token-Signing<br />
$certBytes=$certRefs[0].Certificate.Export([System.Security.Cryptography.X509Certificates.X509ContentType]::Cert)<br />
[System.IO.File]::WriteAllBytes(<span style="color:#993333;font-weight:bold;">&#8220;C:\ADFS-Certs\adfs-token-signing.cer&#8221;</span>, $certBytes)</span></p>
<p>Change the export location in red as you like.
</p></div>
<h2><span style="background-color: #fecb39; border: 1px solid #181818; padding: 2px 5px; border-radius: 3px; font-weight: bold;font-size:16px!Important;">2</span><span style="padding-left: 6px;font-weight:bold;">Copy the exported certificate to your Exchange servers.</span></h2>
<h2><span style="background-color: #fecb39; border: 1px solid #181818; padding: 2px 5px; border-radius: 3px; font-weight: bold;font-size:16px!Important;">3</span><span style="padding-left: 6px;font-weight:bold;">Import the certficate on your Exchange servers:</span></h2>
<div class="wpe-box wpe-box-note3"
<span style="color: #232366;"><strong>MMC &gt; Add/Remove Snap-in &gt; Certificates &gt; Computer Account &gt; Next &gt; Finish &gt; Ok</strong></span></p>
<p>Expand Trusted Root Certificates :<br />
<span style="color: #232366;"><strong>Right-click on Certificates &gt; All Tasks &gt; Import &gt; Local Machine &gt; Choose the exported certificate &gt; Next &gt; Next &gt; Finish<br />
</strong></span>
</div>
<h3>To import the certificate via PowerShell:</h3>
<div class="wpe-box wpe-box-note3">
<span style="font-weight:bold;">Import-Certificate -FilePath</span><span style="color:#993333; font-weight:bold;"> &#8220;PathToTheCertficate&#8221;</span><span style="font-weight:bold;"> -CertStoreLocation Cert:\LocalMachine\Root</span></p>
</div>
<h2><span style="background-color: #fecb39; border: 1px solid #181818; padding: 2px 5px; border-radius: 3px; font-weight: bold;font-size:16px!Important;">4</span><span style="padding-left: 6px;font-weight:bold;">Open an elevated PowerShell on your ADFS Server and type:</span></h2>
<div class="wpe-box wpe-box-note3" style="margin-top: 26px;">
<p><strong>Get-ADFSProperties | *cert* | fl</strong></p>
</div>
<p>Set the value of the AutoCertificationRollover attribute to $False :</p>
<div class="wpe-box wpe-box-note3">
<p><strong>Set-ADFSProperties -AutoCertificationRollover <span style="color: #993333; font-weight: bold;">$False</span></strong></p>
</div>
<p><span style="text-align:justify;">Open the AD FS Management Console and set the secondary ADFS Token Signing Certificate as primary.</p>
<p>Do the same with the ADFS Encryption Certificate ( under Token-decrypting ).</span></p>
<p><span class="wpe-box wpe-box-error1" style="color: #333;display:inline-block;text-align:justify;"><strong>From this point on you will have an interruption in your ADFS services until the new primary ADFS certificate has been introduced on the Exchange Servers with CAS role. We do this in step 6 !</strong></span></p>
<p>After the new certificates ( ADFS Token Signing and ADFS Encryption ) have been assigned as primary set the AutoCertificationRollover attribute to $True again :</p>
<div class="wpe-box wpe-box-note3">
<p><strong>Set-ADFSProperties -AutoCertificationRollover <span style="color: #993333; font-weight: bold;">$True</span></strong></p>
</div>
<h2><span style="background-color: #fecb39; border: 1px solid #181818; padding: 2px 5px; border-radius: 3px; font-weight: bold;font-size:16px!Important;">5</span><span style="padding-left: 6px;font-weight:bold;">Copy the Thumprint of the new ADFS Token Signing Certificate:</span></h2>
<p>In an elevated ADFS Powershell use the following command :</p>
<div class="wpe-box wpe-box-note3">
<p><strong>Get-ADFSCertificate -CertificateType &#8220;Token Signing&#8221; | Fl</strong></p>
</div>
<p><span style="text-align:justify;">In case of more certificates focus on the &#8216;not Before&#8217; and &#8216;not After&#8217; date to find the current primary certificate! Copy the thumbprint.</span></p>
<h2><span style="background-color: #fecb39; border: 1px solid #181818; padding: 2px 5px; border-radius: 3px; font-weight: bold;font-size:16px!Important;">6</span><span style="padding-left: 6px;font-weight:bold;">Introduce the new ADFS Token Signing Certificate on your Exchange Servers:</span></h2>
<p>Open an elevated Exchange Powershell and paste the thumbprint at the end of the following command :</p>
<div class="wpe-box wpe-box-note3">
<p><strong>Set-OrganizationConfig -ADFSSignCertificateThumbprint <span style="color: #993333; font-weight: bold;">ThumbprintGoesHere</span></strong></p>
</div>
<p>Make an <strong>iisreset /noforce</strong> on all Exchange Servers with CAS role installed.</p>
<p>Perform a login via OWA to verify that it works.<br />
&nbsp;<br />
&nbsp;<br />
Would you like to disable IPv6 on a Server Core ?<br />
<a class="wpe-button wpe-button-blue" href="https://webbanshee.net/disable-ipv6-on-server-core/" rel="noopener noreferrer">Disable IPv6</a></p>
<p>The post <a rel="nofollow" href="https://webbanshee.net/adfs-token-signing-certificate/">Renew ADFS Token Signing Certificate</a> appeared first on <a rel="nofollow" href="https://webbanshee.net">Webbanshee</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://webbanshee.net/adfs-token-signing-certificate/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1118</post-id>	</item>
		<item>
		<title>OWA inbox not refreshing</title>
		<link>https://webbanshee.net/owa-inbox-not-refreshing/</link>
					<comments>https://webbanshee.net/owa-inbox-not-refreshing/#respond</comments>
		
		<dc:creator><![CDATA[WebBanshee]]></dc:creator>
		<pubDate>Wed, 15 Feb 2017 17:56:34 +0000</pubDate>
				<category><![CDATA[Serverside]]></category>
		<category><![CDATA[ADFS]]></category>
		<category><![CDATA[OWA]]></category>
		<guid isPermaLink="false">http://webbanshee.net/?p=734</guid>

					<description><![CDATA[<p><a class="ex-link" href="https://webbanshee.net/owa-inbox-not-refreshing/"><img src="https://webbanshee.net/wp-content/uploads/2017/10/OWAInboxRefreshing.svg" /><span class="exTeaser">When your OWA inbox is not refreshing and new mails are not displayed automatically.</span><br />
<span class="exText">The mails are just displayed after a manual refresh of the inbox, or when you switch to another folder and back to inbox again.<span class="exreadmore">...read more<br />
</span></span></a></p>
<p>The post <a rel="nofollow" href="https://webbanshee.net/owa-inbox-not-refreshing/">OWA inbox not refreshing</a> appeared first on <a rel="nofollow" href="https://webbanshee.net">Webbanshee</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>When your OWA inbox is not refreshing and new mails are not displayed automatically.<br />
The mails are just displayed after a manual refresh of the inbox , or when you switch to another folder and back to inbox again.</p>
<p>This happens usually after being idle for some time in OWA.<br />
Ok , this information is a starting point. We use ADFS servers in our environment.<br />
ADFS provides cookies with expiry times to users and tokens with expiry times to relying application servers. ( in this case Exchange Servers ) .</p>
<p><strong>First I open on the ADFS Server the Active Directory Module For Windows PowerShell :</strong></p>
<div class="wpe-box wpe-box-note">
<p><a href="https://webbanshee.net/wp-content/uploads/2017/02/ADFS_PS.png"><img loading="lazy" class="alignnone wp-image-814 size-medium" src="https://webbanshee.net/wp-content/uploads/2017/02/ADFS_PS-300x90.png" alt="ADFS PS - OWA inbox not refreshing" width="300" height="90" srcset="https://webbanshee.net/wp-content/uploads/2017/02/ADFS_PS-300x90.png 300w, https://webbanshee.net/wp-content/uploads/2017/02/ADFS_PS.png 469w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
</div>
<p>Since you aren&#8217;t logged off after a certain time there is no need to check the SSOLifetime under ADFS Properties.  W<span style="font-size: 16px;">hich is set to 12 hours in our environment. It is just the OWA inbox not refreshing.<br />
</span></p>
<p>It seems the session on application server level is timely limited and gets only alive after some manual interaction from user side.</p>
<p><strong>So I check the relying party trust where I can see the cause for this behaviour :</strong></p>
<div class="wpe-box wpe-box-note">
<p><strong>Get-AdfsRelyingPartyTrust | select Identifier, Token* | fl<br />
</strong></p>
</div>
<p>The TokenLifeTime for the Identifier which belongs to OWA is set to 60 ( in Minutes )</p>
<p><strong>To raise the TokenLifeTime for OWA I use the following command :</strong></p>
<div class="wpe-box wpe-box-note">
<p><strong>Get-AdfsRelyingPartyTrust -Identifier &#8220;https://Your_OWA_URL/owa&#8221; | Set-AdfsRelyingPartyTrust -TokenLifetime 720</strong></p>
</div>
<p>This raises the TokenLifeTime for the relying application URL ( in this case OWA ) to 12 hours or 720 minutes. The same LifeTime as the Cookie LifeTime for user sessions.</p>
<p>OWA inbox not refreshing problem solved !</p>
<p>The post <a rel="nofollow" href="https://webbanshee.net/owa-inbox-not-refreshing/">OWA inbox not refreshing</a> appeared first on <a rel="nofollow" href="https://webbanshee.net">Webbanshee</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://webbanshee.net/owa-inbox-not-refreshing/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">734</post-id>	</item>
	</channel>
</rss>
