AD Federation Service (2016) SSL certificate issue?

EnterpriseArchitect 4,741 Reputation points
2020-09-24T07:56:39.947+00:00

Hi All,

I'm running Windows Server 2016 (1) Active/ (3) Passive ADFS servers, the below issue is happening on the passive node.

AD domain is single AD domain: domain.com
The same Wildcard SSL certificate *.domain.com has been imported successfully to the other ADFS 2016 servers with no issue.

When I upload the ADFS Server 2016 logs into https://adfshelp.microsoft.com/DiagnosticsAnalyzer/Analyze

I got the error like in the screenshot below:
k6RK3.png

The description of the error is:

The diagnostic threw an unhandled exception.

System.ArgumentOutOfRangeException: Index was out of range. Must be non-negative and less than the size of the collection.
   at System.ThrowHelper.ThrowArgumentOutOfRangeException(ExceptionArgument argument, ExceptionResource resource)
   at System.Collections.Generic.List`1.get_Item(Int32 index)
   at Microsoft.Identity.Federation.AdfsToolbox.Core.Framework.PowerShell.PowerShellProvider.GetAdfsSslCertificate()
   at Microsoft.Identity.Federation.AdfsToolbox.Core.Framework.PowerShell.PowerShellProvider.GetFederationCertificate(FederationCertificateType type)
   at Microsoft.Identity.Federation.AdfsToolbox.Core.Diagnostics.Modules.CertificateValidity.SslValidity.GetCertificate()
   at Microsoft.Identity.Federation.AdfsToolbox.Core.Diagnostics.Modules.CertificateValidity.ValidityBase.RunDiagnostic()
   at Microsoft.Identity.Federation.AdfsToolbox.Core.Diagnostics.Modules.DiagnosticModuleBase.Execute()

How to fix the issue as above?

Active Directory Federation Services
Active Directory Federation Services
An Active Directory technology that provides single-sign-on functionality by securely sharing digital identity and entitlement rights across security and enterprise boundaries.
1,189 questions
{count} votes

2 answers

Sort by: Most helpful
  1. EnterpriseArchitect 4,741 Reputation points
    2020-10-02T07:41:28.01+00:00

    After remote desktop into PRDADFS2-VM (secondary server)

    I have already manually imported the *.domain.com SSL certificate.PFX file.

    Add-AdfsFarmNode -ServiceAccountCredential (Get-Credential) -PrimaryComputerName PRDADFS1-VM.domain.com -CertificateThumbprint CFHH542125AE8C06F4968AF2468E62699124AF53 -OverwriteConfiguration
    

    The result is:

    WARNING: The SSL certificate subject alternative names do not support hostname 'certauth.ADFS.domain.com'. Configuring certificate authentication binding on port '49443' and hostname ' ADFS.domain.com'.

    WARNING: Failed to register SSL bindings for Device Registration Service: An item with the same key has already been added.

    0 comments No comments

  2. EnterpriseArchitect 4,741 Reputation points
    2020-12-02T07:01:46.947+00:00

    Still the same issue, even after reinstalling the server.
    See the screenshot: https://i.imgur.com/oiyLsC1.png
    oiyLsC1.png

    I have also executed the steps described in https://learn.microsoft.com/en-us/windows-server/identity/ad-fs/operations/ad-fs-support-for-alternate-hostname-binding-for-certificate-authentication

    This is the error message:

    Set-AdfsAlternateTlsClientBinding :   
    PS0317: One or more of AD FS servers returned errors during execution of command 'Set-AdfsAlternateTlsClientBinding'.   
    Error information:   
    PS0316: AD FS Server: 'localhost', Error: 'The specified SSL certificate with thumbprint 'B6DA73B83A759D' does not meet the requirements for configuring alternate Tls Client binding.  
    PS0316: AD FS Server: 'ADFS02-VM.DOMAIN.com', Error: 'The specified SSL certificate with thumbprint 'B6DA73B83A759DEE37F9' does not meet the requirements for configuring alternate Tls Client binding.   
    
    0 comments No comments