Replies: 17 comments 12 replies
-
Hi @mastertIT It is clear that you have a configuration concern on your side. Having had too much information on your paltform, ADFS 2022 OK, but is a VM or a server, TPM or not, configuration of the domains, Creential of the super-user, Adds or SQL configuration, etc... ? I confirm that on our ADFS 2022 test platforms, we do not have this type of concern. Please test with this build and send us all detailed traces. regards |
Beta Was this translation helpful? Give feedback.
-
Beta Was this translation helpful? Give feedback.
-
Ok, so no worries with your infrastructure. let us know regards |
Beta Was this translation helpful? Give feedback.
-
Barebones. No firewall or av setup on this server as it's not in production yet. That fact that it errors out on pulling the security descriptors is curious as that explains why it denies me access to the settings. MFA has never been setup in this environment before. |
Beta Was this translation helpful? Give feedback.
-
The debug stack you submitted only indicates that the "MFA Notification Hub" service is not available or stopped. This log appears when you restart this service (to be seen on our side, but rather on the OS side, and only with W2022). We tested with TPM activated or not As a result, in this case you actually get the message "PS0033: This Cmdlet must be executed with ADFS Administration rights granted for the current user!". On our side, the only constraint is that by default the service must run under the "System" account, which allows it to contact ADDS under the machine account. The "MFA Notification Hub" service must imperatively be started. regards |
Beta Was this translation helpful? Give feedback.
-
okay, what we've attempted so far:
REBOOT |
Beta Was this translation helpful? Give feedback.
-
Hi, @mastertIT As indicated before, the MFA service runs by default with the System account, this account by default has access to the entire machine, therefore to the MFA application directory. It doesn't make sense that there is access denied. either you changed the account or the adfs machine is not on the same domain (resource forest). You must therefore solve this problem, the service does not modify attributes in ADDS, but must have the right to request general attributes, and moreover attract SIDs for different accounts. With the system account, this is not a problem because it is the machine that accesses ADDS (on the domain where this machine is registered). I enclose a last build, which you will beta test for us. regards |
Beta Was this translation helpful? Give feedback.
-
this is an entirely new server. since we last spoke. deleted the vm and reinstalled windows and added adfs to the existing sql federation forest. NO OTHER CHANGES WERE MADE. updated MFA to attached version before testing the below.
|
Beta Was this translation helpful? Give feedback.
-
Hi @mastertIT Several things.
About the rights
About Eventlog
About ADFS Administrators Group
What you can test
regards redhook Sample for rights
|
Beta Was this translation helpful? Give feedback.
-
Some news ? |
Beta Was this translation helpful? Give feedback.
-
Crawled through our entire active directory topology. zero issues with CA still have the failed to retrieve security descriptors error on running the MFA plugin. can we build a version of the plugin without the authentication builtin? |
Beta Was this translation helpful? Give feedback.
-
Hi @mastertIT Thank you for all those informations. We also have a Windows 2022 platform in ADDS multi-forests, and co-federation between distinct ADFS platforms. All this to say, that we don't do any particular things. To retrieve the SIDs, some of which are purely local to each server, as indicated before, the server requests its domain under the account of the machine, it would do the same thing to check a login on the machine. Another point, disabling the SID check in the pluggin, won't change anything because the pluggin's config is stored in the ADFS databases (built-in ADFS...), so effectively an unauthorized user will not be able to manipulate the console ADFS or the plugin. So as indicated, there is a problem on your platform.. you can try 2 things to test
test each option one at a time and then together. Don't forget to run the powershell commands in admin mode. Tomorrow, I will provide you with a build with detailed logs on the SID recovery part. to see exactly what the problem is. regards |
Beta Was this translation helpful? Give feedback.
-
|
Beta Was this translation helpful? Give feedback.
-
Hi, @mastertIT Funny thing, are you still using Windows XP? Otherwise, first delete the system.db file and retest after restarting the MFA service. Then, if you want me to intervene on your server.
regards redhook |
Beta Was this translation helpful? Give feedback.
-
no it was a meme. access has been emailed to you |
Beta Was this translation helpful? Give feedback.
-
Hi @mastertIT I will ask you as a workaround to test this. In your resource forest (the forest where the ADFS servers are located) create a group of users in which you will position your delegated administrators. The reason seems as follows: the recovery of SIDs is carried out by the system account of your ADFS server, or under the ADFS machine account. this machine has no rights on other ADDS forests, but only on its resource forest. therefore any access to a remote forest is denied, which is the goal when setting up a forest of resources. There are therefore 2 approaches, either assign your users to local groups or resource domain, or through trust relationships give rights to the ADFS machine on other forests. If this is confirmed, we can consider doing something in the future, but I think it would not be a good solution, it is on the side of the ADDS infrastructure that we must manage all this. regards redhook |
Beta Was this translation helpful? Give feedback.
-
Beta Was this translation helpful? Give feedback.
-
Anytime the MFA Plugin is opened or a registermfa is attempted this error shows up in the event viewer and this error shows in the plugin:
the settings in adfs are as shown:
ADFS uses a managed service account, and the logged in user is part of the adfs admin group and is also a local administrator.
the server is a freshly installed server 2022 with ADFS installed.
Beta Was this translation helpful? Give feedback.
All reactions