Important�This section contains steps that tell you how to modify the registry. However, serious problems might occur if you modify the registry incorrectly. Therefore, make sure that you follow these steps carefully. For added protection, back up the registry before you modify it. Then, you can restore the registry if a problem occurs. For more information about how to back up and restore the registry, click the following article number to view the article in the Microsoft Knowledge Base:�
322756 How to back up and restore the registry in Windows
To verify that the Trusting Party entry is missing or corrupted in the AD FS 2.0 Management console, follow these steps:
- Sign in to the core AD FS server.
- Click Start, point to All Programs, click Administrative Tools, and then click AD FS 2.0 Management.
- In the management console, expand AD FS 2.0, expand Trust Relationships, and then expand Relying Party Trusts.
- Verify that the Microsoft Office365 Identity Platform entry is present and that it matches the following taxonomy:
- On the Monitoring tab, verify the following settings:
- On the Identifiers tab, verify the following settings:
- Display Name: Microsoft Office 365 Identity Platform
- Relying party identifiers:
� https://login.microsoftonline-int.com/extSTS.srf
urn:federation:MicrosoftOnlineINT
- On the Endpoints�tab, verify the following settings for the�WS-Federation Passive Endpoints:
- URL: https://login.microsoftonline-int.com/login.srf
- Index: 0
- Binding: POST
- Default: Yes
- ResponseURL: <blank>
- On the Advanced tab, verify the following setting:
Secure hash algorithm: SHA-1
Note All other tabs and fields are intentionally left blank.
If the entry is present, but the entry does not match the taxonomy that is listed, update the entry manually to resolve the issue. Or, delete the entry, and then continue with one of the following methods. If the entry is missing, continue with one of the following methods.
Method One: Re-add /update the Federated Domain Relying Party Trust
- Click Start, point to All Programs, click Microsoft Online Services, right-click Microsoft Online Services Module for Windows PowerShell, and then click Run As Administrator.
- At the command line, type the following commands, and press ENTER after each command:
- connect-MSOLService
Note�Log on by using Office 365-managed administrator account credentials in this command. - If you run these commands on a server that is not�in the AD FS 2.0 Federation Server farm, type�Set-MsolADFSContext -Computer:<AD FS Servername>
- Update-MSOLFederatedDomain -DomainName<Identity_Federated_(AD FS)_Domain_Name>�
Method Two: Remove hardcoded federation metadata endpoint
- Open�Registry Editor, and then locate the following registry entry:
HKEY_LOCAL_MACHINE\Software\Microsoft\MOCHA\IdentityFederation
- If the string value FederationMetadataURL�exists, delete the string value. This will restore the normal functionality of�using the metadata endpoint from the Relying Party Trust entry in AD FS 2.0.