Event ID 677 — Federation Service Auditing
Applies To: Windows Server 2008 R2
The Federation Service uses auditing to record success and failure audits, such as audits that are written when tokens are created and received.
Event Details
Product: | Windows Operating System |
ID: | 677 |
Source: | Microsoft-Windows-ADFS |
Version: | 6.1 |
Symbolic Name: | FailureWritingAudit |
Message: | The AD FS auditing subsystem failed to write an audit event. An unexpected error ocurred. Additional Data The data field contains a Win32 error code. |
Resolve
Configure the component to run as an appropriate principal
The auditing subsystem does not have sufficient privileges to write audits. Use one of the following procedures to configure an identity principal with the appropriate privileges.
If the failing component is the Federation Service, configure the application pool (AD FS AppPool) to run as the appropriate principal.
To perform these procedures, you must be a member of the local Administrators group, or you must have been delegated the appropriate authority.
Configure the Federation Service to run as LocalSystem, NetworkService or a custom domain principal account
To configure the Federation Service to run as LocalSystem, NetworkService, or a custom domain principal account:
- On a federation server, click Start, point to Administrative Tools, and then click Internet Information Services (IIS) Manager.
- In the console tree, click Application Pools.
- In the center pane, right-click AD FS AppPool, and then click Advanced Settings.
- In the Advanced Settings dialog box, under Process Model, click Identity, and then click the ... button.
- In the Application Pool Identity dialog box, do one of the following, depending on the type of account that you want to assign:
- Click the menu under Built-in account, click either LocalSystem or NetworkService on the menu, and then click OK twice.
- Click Custom account, and then click Set. In the Set Credentials dialog box, type the domain principal account name and password, and then click OK three times.
If the failing component is the AD FS Web Agent Authentication Service, configure this service to run as an appropriate principal.
Configure the AD FS Web Agent Authentication Service to run as LocalSystem, NetworkService, or a custom domain principal account
To configure the AD FS Web Agent Authentication Service to run as LocalSystem, NetworkService, or a custom domain principal account:
- On the AD FS-enabled Web server, click Start, point to Administrative Tools, and then click Services.
- Right-click AD FS Web Agent Authentication Service, and then click Properties.
- On the Log On tab, do one of the following, depending on the type of account that you want to assign, and then click OK:
- Click Local System account.
- Click This account, and then type a specific service account name and password.
If the failing component is the Web agent for claims-aware applications, configure the application pool for the protected application to run as an appropriate principal.
Configure the claims-aware agent to run as LocalSystem, NetworkService, or a custom domain principal account
To configure the claims-aware agent to run as LocalSystem, NetworkService, or a custom domain principal account:
- On the AD FS-enabled Web server, click Start, point to Administrative Tools, and then click Internet Information Services (IIS) Manager.
- In the console tree, click Application Pools.
- In the center pane, right-click the specific AppPool that this claims-aware application uses, and then click Advanced Settings.
- In the Advanced Settings dialog box, under Process Model, click Identity, and then click the **...**button.
- In the Application Pool Identity dialog box, do one of the following, depending on the type of account that you want to assign:
- Click the menu under Built-in account, select either LocalSystem or NetworkService on the menu, and then click OK twice.
- Click Custom account, and then click the Set button. In the Set Credentials dialog box, type the domain principal account name and password, and then click OK three times.
Verify
To verify that Active Directory Federation Services (AD FS) is working properly, attempt to access one or more federated applications from a client computer, and then check the Event Viewer logs on the federation server to make sure that AD FS is operational:
To perform these procedures, you must be a member of the local Administrators group, or you must have been delegated the appropriate authority.
To verify that Active Directory Federation Services (AD FS) is working properly:
Log on to a federation server, and then open Event Viewer.
Click Security, and then check to see if there are any Success or Failure audits that might indicate whether the client authentication or authorization request to the federated application was successful or not.
If no security events are recorded, check to see whether all federation servers that participate in this federated partnership have been configured to record security audits. To do this, you have to manually configure the Local Security Policy and enable the event log for the federation servers, using the following steps.
Note: You must apply each of these steps to all of the federation servers before you enable success or failure auditing in the Trust Policy properties of the Active Directory Federation Services snap-in. This will make it possible for the Federation Service to log either success or failure errors.
- Click Start, point to Administrative Tools, and then click Local Security Policy.
- Double-click Local Policies, and then click Audit Policy.
- In the details pane, double-click Audit object access.
- On the Audit object access Properties page, select either Success or Failure, or both, and then click OK.
- Close the Local Security Settings snap-in.
- At a command prompt, type gpupdate /force, and then press ENTER to immediately refresh the local policy.
- Repeat these steps on each of the federation servers in the partnership.
- Enable event logging for the federation server. Click Start, point to Administrative Tools, and then click Active Directory Federation Services.
- Right-click the Trust Policy node, and then click Properties.
- Scroll to the Event Log tab.
- Under Event log level, click to select and deselect the specific type of application event logs that you want to record, and then click OK.
You can also check the Application log on the AD FS-enabled Web server for more details.
To check the Application log:
- Log on to an AD FS-enabled Web server, and then open Event Viewer.
- Click Application, and then check to see whether the Web server displays any Information or Error events that were recorded by the federated application.