question

JonMercer-8382 avatar image
0 Votes"
JonMercer-8382 asked JonMercer-8382 commented

Issue Azure AD Join

The end result is to be able to use Hello for Business. Not doing anything with FS.

Have a DC, that is linked to AAD through Connect using HASH.

All devices currently show Azure AD registered.

Have gone in the AAD Connect configuration and done this process to enable SCP - https://docs.microsoft.com/en-us/azure/active-directory/devices/hybrid-azuread-join-managed-domains.

It has been left to percolate for a couple hours, and nothing has changed for the device status, and not changing to Hybrid AAD Joined.

If I run dsregcmd /status, it shows it is just domain joined. There is an error listed in the discover step.
Error Phase: discover
Client ErrorCode: 0x801c001d

https://enterpriseregistration.windows.net - If I go through my browser, it fails to connect saying endpoint not found. There is though nothing blocking outbound traffic.
https://login.microsoftonline.com - Works fine
https://device.login.microsoftonline.com - Error about not being able to sign in. If I open in private mode, it wants a certificate, which I only have one, and it fails on it.

I am kind of stuck, and having to jump around through 20 different Microsoft Doc's is not helping.

azure-ad-connect
5 |1600 characters needed characters left characters exceeded

Up to 10 attachments (including images) can be used with a maximum of 3.0 MiB each and 30.0 MiB total.

JonMercer-8382 avatar image
1 Vote"
JonMercer-8382 answered sikumars commented

We couldn't login with the pin, since that feature after Hybrid Azure AD joining them came up with a new message saying basically unable to sign-in because it didn't recognize the network. It also wasn't InTune joined, just standard AD joined. After trying different things, and talking with our consultant, it was found by their suggestion, that suspending, and then clearing out the TPM after AAD Connect had done its thing, was needed to be able to setup the Hello features. After that, was able to setup the pin without any issue.

Basically had to make sure the computers OU was selected in AAD connect, and then it would convert to a Hybrid AAD join status so that the Hello system knew of the computer. Then for whatever reason (certificates is my guess) had to suspend, and clear out the TPM to get rid of the unable to sign-in message with Hello Pin in our case, and after the reboot, was able to add it.

The only thing I am wondering about, is it didn't ask for a second factor when setting up the pin. We setup people with phone authentication, but all it asked for during the setup of the pin was the login password.

Now to deal with InTune.

· 1
5 |1600 characters needed characters left characters exceeded

Up to 10 attachments (including images) can be used with a maximum of 3.0 MiB each and 30.0 MiB total.

Glad that you were able to isolate the issue also thanks for leveraging Microsoft Q&A forum.

0 Votes 0 ·
sikumars avatar image
1 Vote"
sikumars answered sikumars edited

Hello @JonMercer-8382,

Thanks for reaching out.

Are you facing discover issue with multiple devices or specific device? which version of Windows facing registration issue? also can you confirm, do you have Single forest AD or multi-forest environment because if devices are across from multiple Active Directory forests then you must create the SCP object in each forest root as explained over here.

Generally, we would get discover error when device couldn't retrieve SCP information or it could retrieve SCP information from local AD, but device failed to establish connection with Azure AD service endpoint for device registration.

First, verify if SCP keywords can be retrieved from domain joined device using PowerShell as explained in this article , outcome should look similar to below example and the field names are case-sensitive. Make sure that they are exactly azureADName: and azureADId:

 azureADName:contoso.com
 azureADId:62f988bf-####-####-####-############

The value for azureADName: can be any of the custom or default domain names configured in Azure AD, such "contoso.onmicrosoft.com" or "contoso.com" domain name since you are using Pass Hash Synchronization not AD FS federation. azureADId: is tenant ID of your Azure Active Directory Tenant.

Second, verify these service endpoints accessible in System Context (In computer account) not user context . You can test this by doing the following:

Note: Where verifiedDomain is the customers domain name. E.g. Contoso.com or Contoso.onmicrosoft.com. If it is working you will see response similar to:

142404-image.png



Alternatively, you could use following script Registration Connectivity script and Device Registration Troubleshooter Tool which is very straight forward and help us in validating all prerequisite for device registration as these script validate internet connectivity under the system context also, it checks for SSL/TLS handshake and report as failure if any.

Hope this helps.


Please "Accept the answer" if the information helped you. This will help us and others in the community as well.



image.png (42.1 KiB)
5 |1600 characters needed characters left characters exceeded

Up to 10 attachments (including images) can be used with a maximum of 3.0 MiB each and 30.0 MiB total.

JonMercer-8382 avatar image
0 Votes"
JonMercer-8382 answered JonMercer-8382 edited

Are you facing discover issue with multiple devices or specific device: Multiple Devices

Which version of Windows facing registration issue: Windows 10 1909 and newer

Can you confirm, do you have Single forest AD or multi-forest environment: Single forest AD

When I run this in PS, nothing comes up, just goes to the command prompt. Changed the DC to our information, which was verified correct with the get-adrootdse command.

$scp = New-Object System.DirectoryServices.DirectoryEntry;

$scp.Path = "LDAP://CN=62a0ff2e-97b9-4513-943f-0d221bd30080,CN=Device Registration Configuration,CN=Services,CN=Configuration,DC=fabrikam,DC=com";

$scp.Keywords;

Farther down with this, there isn't a AdPrep folder on my system.

Import-Module -Name "C:\Program Files\Microsoft Azure Active Directory Connect\AdPrep\AdSyncPrep.psm1";

$aadAdminCred = Get-Credential;

Initialize-ADSyncDomainJoinedComputerSync –AdConnectorAccount [connector account name] -AzureADCredentials $aadAdminCred;

One thing I have wondered is an issue, is that our domain is not .com, but .local, and if that could cause an issue.


For the PSExec command, I had to go to https://docs.microsoft.com/en-us/sysinternals/downloads/psexec and then download, extract, and then go to its location in command prompt, then the command you posted ran.

It looks like it worked.

https://enterpriseregistration.windows.net/EnrollmentServer/DeviceEnrollmentWebService.svcurn:ms-drs:enterpriseregistration.windows.net1.0https://login.microsoftonline.com/16434642-8eaf-485f-a032-99937cbe0a74/oauth2/authorizehttps://login.microsoftonline.com/16434642-8eaf-485f-a032-99937cbe0a74/oauth2/tokenhttps://login.microsoftonline.com/ulsonline.net/wsfedhttps://enterpriseregistration.windows.net/EnrollmentServer/device/urn:ms-drs:enterpriseregistration.windows.net1.0https://login.microsoftonline.com/https://device.login.microsoftonline.com/https://enterpriseregistration.windows.net/https://enterpriseregistration.windows.net/EnrollmentServer/key/urn:ms-drs:enterpriseregistration.windows.net1.0

Running the PS script under https://docs.microsoft.com/samples/azure-samples/testdeviceregconnectivity/testdeviceregconnectivity/ was successful.

Running the DSRegTool and got the following:

Test 1 was successful

Test 2 was successful

Test 3 (Hybrid AD Join) failed in two areas:
Testing if connected to AzureAD - device is NOT connected to Azure AD
Testing Tenant ID - Tenant ID is not configured correctly, and gave the same registry location as in test 4.

Test 4 (verify SCP) Failed: Says the Tenant ID is not configured correctly and to make sure it is configured correctly in the registry.
142450-image.png



Test 5 (verify health of device) failed with the same device is NOT connected to Azure AD, though it offers to go through the procedure of adding it by running dsregcmd /join, then run test 3.

Test 6 (verify PRT) passed for the PRT registry value

Ran the dsregcmd /join, and then tried test 3 again, and it still fails saying it isn't joined, and not happy with a registry entry.

Something changed at some point though, because when I run dsregcmd /status. The diagnostic data has changed to:
Error Phase - Pre-Check
Client ErrorCode - 0x1
It has a line of site to the domain, because I can login, and access network shared locations.


image.png (8.2 KiB)
5 |1600 characters needed characters left characters exceeded

Up to 10 attachments (including images) can be used with a maximum of 3.0 MiB each and 30.0 MiB total.

JonMercer-8382 avatar image
0 Votes"
JonMercer-8382 answered NagappanVeerappan-MSFT commented

So I fixed this issue. We had done a selective number of people for AAD Connect, but had not added the computers. Once that was done, those computers switched to Hybrid AAD Join. Though after that, Hello stopped working. Seems there is an issue with the PRT.

5 |1600 characters needed characters left characters exceeded

Up to 10 attachments (including images) can be used with a maximum of 3.0 MiB each and 30.0 MiB total.

NagappanVeerappan-MSFT avatar image
0 Votes"
NagappanVeerappan-MSFT answered JonMercer-8382 edited

Were you login to the device using PIN before it become HAADJ?. Do you have this device Intune managed?

5 |1600 characters needed characters left characters exceeded

Up to 10 attachments (including images) can be used with a maximum of 3.0 MiB each and 30.0 MiB total.

NagappanVeerappan-MSFT avatar image
1 Vote"
NagappanVeerappan-MSFT answered

Thanks, Saw your post over the mail. But its not yet reflected here.

Yes, you were using convenience PIN, which won't work once your device become HAADJ (once you synced to AAD). you need to clear TPM or clear NGC container via certutil -deleteHellocontainer
You will be able to get WHFB provisioned. MFA used if you login with password during provisioning. if you already use Phone sign-in to authenticate on the device it carry MFA signal and help you to satisfy the MFA requirement to provision WHFB.

5 |1600 characters needed characters left characters exceeded

Up to 10 attachments (including images) can be used with a maximum of 3.0 MiB each and 30.0 MiB total.

NagappanVeerappan-MSFT avatar image
1 Vote"
NagappanVeerappan-MSFT answered JonMercer-8382 commented

WHFB login here after with PIN/Bio - treated as MFA's Sign-in (strong authentication credentials aka NGC credentials). so no more MFA prompts from that machine for that user.

· 1
5 |1600 characters needed characters left characters exceeded

Up to 10 attachments (including images) can be used with a maximum of 3.0 MiB each and 30.0 MiB total.

It was more of it didn't ask for MFA when setting up the WHFB pin, which I was expecting, not just for it to ask for just the login password.

Pin was not setup on any system until after they were Hybrid AAD joined, so not sure why we have to clear the TPM if that is the cause. It isn't to much of an issue for our local people, but will be a bit of a pain for our remote since they don't have admin rights.

If I do the PowerShell command certutil -deleteHellocontainer command, does bitlocker need to be suspended first? From what I am finding, it doesn't look like it, but just want to verify, so I don't have to deal with the 48 digit recovery key. If this doesn't have to be run as command prompt/PowerShell admin, that would be nice.

0 Votes 0 ·
JonMercer-8382 avatar image
1 Vote"
JonMercer-8382 answered NagappanVeerappan-MSFT commented

Not sure why my post didn't come through, had moved it to the general discussion.

We couldn't login with the pin, since that feature after Hybrid Azure AD joining them came up with a new message saying basically unable to sign-in because it didn't recognize the network. It also wasn't InTune joined, just standard AD joined. After trying different things, and talking with our consultant, it was found by their suggestion, that suspending, and then clearing out the TPM after AAD Connect had done its thing, was needed to be able to setup the Hello features. After that, was able to setup the pin without any issue.

Basically had to make sure the computers OU was selected in AAD connect, and then it would convert to a Hybrid AAD join status so that the Hello system knew of the computer. Then for whatever reason (certificates is my guess) had to suspend, and clear out the TPM to get rid of the unable to sign-in message with Hello Pin in our case, and after the reboot, was able to add it.

The only thing I am wondering about, is it didn't ask for a second factor when setting up the pin. We setup people with phone authentication, but all it asked for during the setup of the pin was the login password.

Now to deal with InTune.

· 1
5 |1600 characters needed characters left characters exceeded

Up to 10 attachments (including images) can be used with a maximum of 3.0 MiB each and 30.0 MiB total.

Thanks, Now I see here. My answers are already there above. Please let me know if any further help needed

2 Votes 2 ·
NagappanVeerappan-MSFT avatar image
0 Votes"
NagappanVeerappan-MSFT answered

@JonMercer-8382 - Yes, you don't need admin right to clear NGC container via "certutil -deleteHelloconatiner" user can run this in normal prompt. it clears immediately any previously stored credentials. you can want to automate via logon script as well .
Caution: this would be a one time operation. if you repeat that command after provisioning WHFB PIN/Bio. This will clear up WHFB cred as well. Then user will end up in loop of provisioning and deletion upon logout and login back.

5 |1600 characters needed characters left characters exceeded

Up to 10 attachments (including images) can be used with a maximum of 3.0 MiB each and 30.0 MiB total.

JonMercer-8382 avatar image
0 Votes"
JonMercer-8382 answered JonMercer-8382 commented

For the sake of testing, I tried the certutil -deletehellocontainer on a system that already had the Hello PIN setup, rebooted, and now I can't re-add the pin, because the sign-in is only available when connected to the organization's network came back. I had to suspend Bitlocker, and clear the TPM, reboot, and then could put the pin back in.

Could there be something I did that is causing a certificate to push in to the TPM, that Hello doesn't like?

· 2
5 |1600 characters needed characters left characters exceeded

Up to 10 attachments (including images) can be used with a maximum of 3.0 MiB each and 30.0 MiB total.

If you do run "certutil -deleteHellocontainer" on WHFB PIN provisioned machine. the user will loose those (PIN/Bio) credentials and they sign-out or restart. Then they left with Password to sign-in. They can not use PIN/Bio. you need to sign-in with Password and get the dsregcmd /status , you will see Ngc Pre-req at the end like below "PreReqResult : WillProvision"
Then you can provision the WHFB PIN/Bio, if not detected in the past login, max next logoff/login back you will see again Provisioning screen pop-up.

0 Votes 0 ·
JonMercer-8382 avatar image JonMercer-8382 NagappanVeerappan-MSFT ·

That is what I expected to happen, not sure why it went back to saying it can't find the org's network, and I had to clear the TPM again.

0 Votes 0 ·