Share via

Manage a federation trust

Applies to: Exchange Server 2013

A federation trust establishes a trust relationship between a Microsoft Exchange 2013 organization and the Microsoft Entra authentication system and supports federated sharing with other federated Exchange organizations. Normally, you shouldn't have to manage or modify the federation trust after it's created. However, there may be circumstances that require adding or removing federated domains or resetting the domain used to configure the organization identifier (OrgID) for the federation trust.


Modifying an existing federation trust, especially the primary shared domain used to define the OrgID, can disrupt federated sharing between federated Exchange organizations or for hybrid deployments with Microsoft 365 or Office 365 organizations.

For additional management tasks related to Federation, see Federation procedures.


This feature of Exchange Server 2013 isn't fully compatible with Office 365 operated by 21Vianet in China and some feature limitations may apply. For more information, see Learn about Office 365 operated by 21Vianet.

What do you need to know before you begin?

  • Estimated time to complete: 30 minutes.

  • You need to be assigned permissions before you can perform this procedure or procedures. To see what permissions you need, see the Federation and certificates permissions entry in the Exchange and Shell infrastructure permissions topic.

  • You will need to add a TXT record to your public DNS for each new federated domain added to the federation trust. Review the requirements for adding a TXT record with the organization that hosts your public DNS records.

  • For the purposes of this topic, an existing federation trust was configured with the following settings:

    • is the primary shared domain for the federation trust. (This domain will not be changed.)

    • The federated domains and are included in the existing federation trust.

    • is an accepted domain in the Exchange organization.

  • This topic also covers other federation management tasks, such as viewing and managing certificates used for the federation trust and viewing federation trust parameter information in the Shell.

  • For information about keyboard shortcuts that may apply to the procedures in this topic, see Keyboard shortcuts in the Exchange admin center.

Use the EAC to manage a federation trust

  1. On an Exchange 2013 server in your on-premises organization, navigate to the Organization > Sharing.

  2. In the Federation Trust section, click Modify.

  3. In Sharing-Enabled Domains, skip Step 1 because the primary sharing domain isn't changing.

  4. In Step 2, select the domain and then click Remove Remove icon. to remove the domain from the federated trust.

  5. In Step 2, click Add Add Icon..

  6. In Select Accepted Domains, select from the list of accepted domains, and then click OK to add the domain to the federated trust.


    A federated domain proof string will be created for the domain. You must create separate TXT record on your public DNS for this domain.

  7. Using the federated domain proof string created for the domain, create a TXT record on your public DNS server. Depending on the update schedule of your public DNS host, replication of DNS changes may take 15 minutes or longer.

  8. After the TXT record is created and replicated, click Update.

Use the Shell to manage a federation trust

  1. This example removes the domain from the federation trust.

    Remove-FederatedDomain -DomainName
  2. This example adds the domain to the federation trust.

    Add-FederatedDomain -DomainName

For detailed syntax and parameter information, see Remove-FederatedDomain and Add-FederatedDomain.

Run the following Shell commands to manage other aspects of a federation trust:

  1. View the federated OrgID and federated domains

    This example displays the Exchange organization's federated OrgID and related information, including federated domains and status.

  2. View federation trust certificates

    This example displays the previous, current, and next certificates used by the federation trust "Microsoft Entra authentication".

    Get-FederationTrust "Azure AD authentication" | Select Org*certificate
  3. Check federation certificates status

    This example displays the state of federation certificates on all Mailbox and Client Access servers in the organization.

  4. Configure the federation trust to use a certificate as the next certificate

    This example configures the federation trust "Microsoft Entra authentication" to use the certificate with the provided thumbprint as the next certificate. After the certificate is deployed to all Exchange servers in the organization, you can use the PublishCertificate switch to configure the federation trust to use this certificate as the current certificate.

    Set-FederationTrust "Azure AD authentication" -Thumbprint AC00F35CBA8359953F4126E0984B5CCAFA2F4F17
  5. Configure the federation trust to use the next certificate as the current certificate

    This example configures the federation trust Microsoft Entra authentication to use the next certificate as the current certificate and publishes it to the Microsoft Entra authentication system.

    Set-FederationTrust "Azure AD authentication" -PublishFederationCertificate


    Before configuring the federation trust to use the next certificate as the current federation certificate, make sure that the certificate is deployed on all Exchange servers in your organization. Use the Test-FederationTrustCertificate cmdlet to check the deployment status of the certificate.

  6. Refresh federation metadata and certificate from the Microsoft Entra authentication system

    This example refreshes the federation metadata and certificate of the Microsoft Entra authentication system for the federation trust Microsoft Entra authentication.

    Set-FederationTrust "Azure AD authentication" -RefreshMetadata

For detailed syntax and parameter information, see the following topics:


There are additional considerations if the tenant is hosted in the Office 365 U.S. Government GCC High or DoD environment. In these environments, you must run the Set-FederationTrust cmdlet in the on-premises Exchange environment with a different value for the MetadataUrl parameter. See Set-FederationTrust for more information.

How do you know this worked?

The successful completion of the Sharing-enabled domains wizard is your first indication that you configured the federation trust as expected.

To further verify success, do the following:

  1. Run the following Shell command to verify the federation trust information.

    Get-FederationTrust | format-list
  2. Run the following Shell command to verify that federation information can be retrieved from your organization. For example, verify that the and domains are returned in the DomainNames parameter.

    Get-FederationInformation -DomainName <your primary sharing domain>


Having problems? Ask for help in the Exchange forums. Visit the forums at Exchange Server.