To work around this issue, remove the client access policy from the AD FS 2.0 federation server on the primary node in the AD FS 2.0 federation server farm. To do this, follow these steps:
- Click Start, point to All Programs, point to Administrator Tools, and then click AD FS 2.0 Management.
- In the left navigation pane, click AD FS 2.0, click Trust Relationships, click Relying Party Trusts, right-click Microsoft Office 365 Identity Platform, and then click Edit Claim Rule.
- On the Issuance Authorization Rules tab, remove all the entries that are listed except the Permit Access to All Users rule. To remove an entry, select it, and then click Remove Rule.
- If the Permit Access to All Users entry isn't present, and if the list is empty after you perform step 3, click Add Rule, select Permit All Users from the drop-down list, click Next, and then click Finish.
After you follow these steps, test SSO-enabled user access to make sure that the default AD FS 2.0 behavior to allow all client connections is restored.
Resolution 1: Implement an AD FS 2.0 federation server proxy as part of the Office 365 SSO and identity federation architecture
For more info about how to implement AD FS 2.0 federation services, go to the following Microsoft website:
Resolution 2: Check the client access policy
Verify that the client access policy was applied correctly. For more info, go to the following Microsoft TechNet website:
For help in configuring client access policy rules in AD FS 2.0 for Office 365 SSO, contact Office 365 technical support.