-
Notifications
You must be signed in to change notification settings - Fork 790
Update how-to-connect-emergency-ad-fs-certificate-rotation.md #1695
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
@Macorder-hub : Thanks for your contribution! The author(s) and reviewer(s) have been notified to review your proposed change. |
Learn Build status updates of commit 98fe8b0: ✅ Validation status: passed
For more details, please refer to the build report. |
@omondiatieno - Can you review the proposed changes? IMPORTANT: When the changes are ready for publication, adding a #label:"aq-pr-triaged" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I left a few minor suggestions. We also need to add the image via the internal repo
To revoke the old Token Signing Certificate that AD FS is currently using, you need to determine the thumbprint of the token-signing certificate. From your ADFS Server do the following: | ||
|
||
1. Connect to the Microsoft Online Service by running in PowerShell `Connect-MsolService`. | ||
1. Connect to the Microsoft Entra Module by running in PowerShell: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
1. Connect to the Microsoft Entra Module by running in PowerShell: | |
1. Connect to the Microsoft Entra PowerShell module: |
|
||
*`Get-EntraFederationProperty -DomainName <your_domain.com> | FL Source, SigningCertificate`. | ||
|
||
1. Copy down the thumbprint. You'll use it later to remove the existing certificates. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
1. Copy down the thumbprint. You'll use it later to remove the existing certificates. | |
1. Copy the thumbprint. You'll use it later to remove the existing certificates. |
|
||
>[!IMPORTANT] | ||
You can get the **-InternalDomainFederationId** value by running the commando below: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
You can get the **-InternalDomainFederationId** value by running the commando below: | |
You can get the **-InternalDomainFederationId** value by running the following command: |
* `Get-EntraFederationProperty -DomainName your_domain.com` | ||
|
||
1. To update the certificate information in Microsoft Entra ID, run the following command: `Update-MsolFederatedDomain` and then enter the domain name when prompted. | ||
<img width="1774" height="165" alt="Get-EntraFedProperty" src="https://github.com/user-attachments/assets/5eac3a9f-a1e8-49e7-b3fb-36360a2ee211" /> |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We'll need to add this image via the private repo. I'll help with that.
Updates covered in an internal PR: https://github.com/MicrosoftDocs/entra-docs-pr/pull/9727 #please-close |
Important doc to be updated as soon as possible. Information is outdated since it is still making references to the deprecated MSOL Module.