am facing the same issue!!
any suggestion please?
This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Hi,
So, I have a working ADFS 2019 Server, fronted by a WAP 2019 Server, that is currently working to serve requests for an on-premise Exchange 2019 Server for OWA/ECP.
I'm trying to add Azure MFA to my ADFS authentication for OWA mainly, using Azure Active Directory Free which is included with my Office365 subscription.
My domain is federated & when I authenticate to Office365 with a user I have assigned to use MFA, they are properly asked & able to authenticate using Azure MFA, but the same doesn't happen for my OWA/ECP connections & I get this error after entering in my email only:
• Activity ID: 3f40b225-b4f0-41c4-5500-0080020000c1
• Relying party: Mail - OWA
• Error details: Exception calling SAS.
• Node name: 67599f4b-8fec-4830-8baa-b6baffd154d5
• Error time: Wed, 22 Sep 2021 20:21:13 GMT
• Cookie: enabled
• User agent string: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.82 Safari/537.36 Edg/93.0.961.52
This is the associated error on my ADFS server:
Encountered error during federation passive request.
Additional Data
Protocol Name:
wsfed
Relying Party:
https://xxx.com/owa/
Exception details:
System.Exception: Exception calling SAS. ---> System.Net.WebException: The remote server returned an error: (401) Unauthorized.
at System.Net.HttpWebRequest.GetResponse()
at Microsoft.IdentityServer.Aad.Sas.HttpClientHelper.PostXml[TRequest,TResponse](String url, TRequest request, Action`1 httpRequestModifier)
at Microsoft.IdentityServer.Aad.Sas.RealSasProvider.GetAvailableAuthenticationMethods(GetAvailableAuthenticationMethodsRequest request)
at Microsoft.IdentityServer.Adapter.AzureMfa.PrimaryAuthenticationAdapter.ProcessUsernameOathCodePin(IAuthenticationContext authContext, IProofData proofData, Claim[]& outgoingClaims)
--- End of inner exception stack trace ---
at Microsoft.IdentityServer.Adapter.AzureMfa.PrimaryAuthenticationAdapter.ProcessUsernameOathCodePin(IAuthenticationContext authContext, IProofData proofData, Claim[]& outgoingClaims)
at Microsoft.IdentityServer.Adapter.AzureMfa.PrimaryAuthenticationAdapter.TryEndAuthentication(IAuthenticationContext authContext, IProofData proofData, HttpListenerRequest request, Claim[]& outgoingClaims)
at Microsoft.IdentityServer.Web.Authentication.External.ExternalAuthenticationHandlerBase.TryEndAuthentication(IAuthenticationContext authContext, IProofData proofData, HttpListenerRequest request, Claim[]& adapterClaims)
at Microsoft.IdentityServer.Web.Authentication.Azure.AzurePrimaryAuthenticationHandler.Process(ProtocolContext context)
at Microsoft.IdentityServer.Web.Authentication.AuthenticationOptionsHandler.Process(ProtocolContext context)
at Microsoft.IdentityServer.Web.PassiveProtocolListener.OnGetContext(WrappedHttpListenerContext context)
System.Net.WebException: The remote server returned an error: (401) Unauthorized.
at System.Net.HttpWebRequest.GetResponse()
at Microsoft.IdentityServer.Aad.Sas.HttpClientHelper.PostXml[TRequest,TResponse](String url, TRequest request, Action`1 httpRequestModifier)
at Microsoft.IdentityServer.Aad.Sas.RealSasProvider.GetAvailableAuthenticationMethods(GetAvailableAuthenticationMethodsRequest request)
at Microsoft.IdentityServer.Adapter.AzureMfa.PrimaryAuthenticationAdapter.ProcessUsernameOathCodePin(IAuthenticationContext authContext, IProofData proofData, Claim[]& outgoingClaims)
Lastly, these are the steps I followed to configure my ADFS server for Azure MFA.
Thinking it's something in the claim issuance I need to adjust, but I'm not exactly sure what?
am facing the same issue!!
any suggestion please?
Hello @djtheri ,
Thanks for reaching out and apologies for delayed response.
Looking at above error message it seems to be related with "Azure MFA Certificates" which used by AD FS for authenticating so if Azure MFA certificate expired then you may get (401) Unauthorized
.
I would recommend you to check the validity period of Azure MFA certificate on each AD FS server to determine the expiration date. If you find expired then create new certificate or nearing expiry date then renew it per this guidance.
Hope this helps
------
Please "Accept the answer" if the information helped you. This will help us and others in the community as well.