Difficulties to use smart card login with Azure AD

Syla, Lukas 1 Reputation point
2022-12-14T09:39:40.527+00:00

I'm trying to test CBA using smart cards on windows login. According to this article (https://learn.microsoft.com/en-us/azure/active-directory/authentication/concept-certificate-based-authentication-smartcard), there are no further actions on windows' side required. When I try to sign in with the smart card linked to my Azure AD account, the login window says "No valid certificates found on this smart card. Please try another smart card or contact your administrator". However, the same smart card works with the web login to Azure.

The machine is a Windows 10 Pro VM which is Azure AD joined. CBA works on web login. A virtual smart card is used for this procedure. The certificates are enabled for smart card login and the certificate chain is intact. What other causes could this issue have?

Microsoft Security | Microsoft Entra | Microsoft Entra ID
{count} votes

1 answer

Sort by: Most helpful
  1. Marilee Turscak-MSFT 37,206 Reputation points Microsoft Employee Moderator
    2022-12-16T19:37:27.547+00:00

    Hi @Syla, Lukas

    There are a few things you could do to diagnose the cause of this error. Do you see any other errors such as AADSTS50017 in addition to the "No valid certificates" error? If so, there should be more details indicating the root cause of the issue.

    1) Please check the Azure event logs to see if there are any sign-in events related to this error.

    2) Please confirm that you have met all of the requirements for the CBA configuration and followed each of the steps. https://learn.microsoft.com/en-us/azure/active-directory/authentication/how-to-certificate-based-authentication#steps-to-configure-and-test-azure-ad-cba

    3) Make sure that all of the prerequisites are met:

    • Disable TLS inspection on the certauth endpoint to make sure the client certificate request succeeds as part of the TLS handshake.
    • Azure has a requirement to know the full certificate chain so it can validate user certificates, so the root certificate needs to be added.
    • The user must have access to a user certificate (issued from a trusted Public Key Infrastructure configured on the tenant) intended for client authentication to authenticate against Azure AD.
      • Each CA should have a certificate revocation list (CRL) that can be referenced from internet-facing URLs. If the trusted CA doesn't have a CRL configured, Azure AD won't perform any CRL checking, revocation of user certificates won't work, and authentication won't be blocked.
      • If CBA is enabled on the tenant, all users will see the link to Use a certificate or smart card on the password page. However, only the users in scope for CBA will be able to authenticate successfully against an application that uses Azure AD as their Identity provider (IdP).

    I've also reached out to the product team to check for additional information about your scenario. I'll get back with what they say, though having the event logs would make this easier to troubleshoot.

    -
    If the information helped you or was relevant to you, please Accept the answer. This will help us as well as others in the community who might be researching similar issues.


Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.