Skip to content Skip to sidebar Skip to footer

There Was a Problem Authenticating. Please Try Again Later. Code: 12020

Skip to principal content

Troubleshoot Azure Agile Directory Pass-through Authentication

This article helps yous find troubleshooting data virtually common bug regarding Azure AD Pass-through Authentication.

Of import

If you are facing user sign-in issues with Pass-through Authentication, don't disable the feature or uninstall Pass-through Authentication Agents without having a cloud-just Global Administrator account or a Hybrid Identity Administrator account to fall back on. Learn about adding a cloud-merely Global Administrator account. Doing this footstep is disquisitional and ensures that you don't get locked out of your tenant.

General issues

Check status of the feature and Authentication Agents

Ensure that the Laissez passer-through Authentication characteristic is notwithstanding Enabled on your tenant and the condition of Hallmark Agents shows Active, and not Inactive. You can check status past going to the Azure Ad Connect bract on the Azure Active Directory admin center.

Azure Active Directory admin center - Azure AD Connect blade

Azure Active Directory admin center - Pass-through Authentication blade

User-facing sign-in fault messages

If the user is unable to sign into using Laissez passer-through Authentication, they may see 1 of the following user-facing errors on the Azure AD sign-in screen:

Mistake Description Resolution
AADSTS80001 Unable to connect to Active Directory Ensure that amanuensis servers are members of the same Advertisement forest as the users whose passwords need to be validated and they are able to connect to Active Directory.
AADSTS8002 A timeout occurred connecting to Active Directory Bank check to ensure that Active Directory is available and is responding to requests from the agents.
AADSTS80004 The username passed to the agent was non valid Ensure the user is attempting to sign in with the correct username.
AADSTS80005 Validation encountered unpredictable WebException A transient mistake. Retry the request. If information technology continues to fail, contact Microsoft support.
AADSTS80007 An fault occurred communicating with Active Directory Check the amanuensis logs for more information and verify that Agile Directory is operating as expected.

Users get invalid username/password error

This can happen when a user's on-premises UserPrincipalName (UPN) is different than the user's cloud UPN.

To ostend that this is the consequence, beginning test that the Pass-through Hallmark amanuensis is working correctly:

  1. Create a test business relationship.

  2. Import the PowerShell module on the agent machine:

                      Import-Module "C:\Programme Files\Microsoft Azure AD Connect Authentication Agent\Modules\PassthroughAuthPSModule\PassthroughAuthPSModule.psd1"                                  
  3. Run the Invoke PowerShell command:

                      Invoke-PassthroughAuthOnPremLogonTroubleshooter                                  
  4. When you are prompted to enter credentials, enter the same username and password that are used to sign in to (https://login.microsoftonline.com).

If you become the same username/password error, this ways that the Pass-through Authentication agent is working correctly and the event may exist that the on-premises UPN is non-routable. To larn more, come across Configuring Alternating Login ID.

Important

If the Azure Ad Connect server isn't domain joined, a requirement mentioned in Azure AD Connect: Prerequisites, the invalid username/password issue occurs.

Sign-in failure reasons on the Azure Active Directory admin center (needs Premium license)

If your tenant has an Azure AD Premium license associated with it, you can too await at the sign-in activity report on the Azure Active Directory admin center.

Azure Active Directory admin center - Sign-ins report

Navigate to Azure Active Directory -> Sign-ins on the Azure Agile Directory admin center and click a specific user's sign-in activeness. Look for the SIGN-IN Mistake CODE field. Map the value of that field to a failure reason and resolution using the post-obit table:

Sign-in fault code Sign-in failure reason Resolution
50144 User's Active Directory password has expired. Reset the user'due south countersign in your on-bounds Agile Directory.
80001 No Authentication Agent available. Install and register an Authentication Agent.
80002 Authentication Amanuensis'south password validation request timed out. Bank check if your Active Directory is reachable from the Authentication Agent.
80003 Invalid response received by Hallmark Amanuensis. If the problem is consistently reproducible beyond multiple users, check your Active Directory configuration.
80004 Incorrect User Principal Proper name (UPN) used in sign-in request. Ask the user to sign in with the right username.
80005 Authentication Agent: Error occurred. Transient error. Try again later.
80007 Authentication Agent unable to connect to Active Directory. Check if your Agile Directory is reachable from the Authentication Agent.
80010 Authentication Agent unable to decrypt password. If the trouble is consistently reproducible, install and annals a new Authentication Amanuensis. And uninstall the electric current one.
80011 Authentication Agent unable to retrieve decryption central. If the problem is consistently reproducible, install and annals a new Hallmark Amanuensis. And uninstall the current one.
80014 Validation request responded subsequently maximum elapsed time exceeded. Authentication agent timed out. Open a back up ticket with the error lawmaking, correlation ID, and timestamp to become more details on this error

Important

Pass-through Hallmark Agents authenticate Azure Advertizing users by validating their usernames and passwords against Agile Directory by calling the Win32 LogonUser API. As a result, if you take set the "Logon To" setting in Active Directory to limit workstation logon access, you will have to add together servers hosting Pass-through Authentication Agents to the list of "Logon To" servers as well. Failing to practise this will cake your users from signing into Azure Advertizing.

Authentication Agent installation issues

An unexpected error occurred

Collect amanuensis logs from the server and contact Microsoft Support with your issue.

Authentication Agent registration problems

Registration of the Authentication Agent failed due to blocked ports

Ensure that the server on which the Hallmark Agent has been installed tin can communicate with our service URLs and ports listed here.

Registration of the Authentication Agent failed due to token or account potency errors

Ensure that y'all use a deject-only Global Administrator account or a Hybrid Identity Administrator account for all Azure Advert Connect or standalone Authentication Agent installation and registration operations. In that location is a known issue with MFA-enabled Global Ambassador accounts; turn off MFA temporarily (just to complete the operations) as a workaround.

An unexpected error occurred

Collect agent logs from the server and contact Microsoft Support with your issue.

Hallmark Agent uninstallation issues

Warning bulletin when uninstalling Azure AD Connect

If you have Pass-through Authentication enabled on your tenant and you try to uninstall Azure AD Connect, information technology shows you the post-obit warning bulletin: "Users will not be able to sign-in to Azure AD unless you lot accept other Pass-through Authentication agents installed on other servers."

Ensure that your setup is highly available before you uninstall Azure Advertizing Connect to avert breaking user sign-in.

Problems with enabling the feature

Enabling the characteristic failed because in that location were no Authentication Agents available

You demand to take at least i agile Authentication Agent to enable Laissez passer-through Hallmark on your tenant. Y'all tin can install an Authentication Agent by either installing Azure AD Connect or a standalone Authentication Agent.

Enabling the characteristic failed due to blocked ports

Ensure that the server on which Azure Advertising Connect is installed tin can communicate with our service URLs and ports listed hither.

Enabling the feature failed due to token or business relationship authorisation errors

Ensure that you lot use a cloud-only Global Administrator account when enabling the feature. There is a known issue with multi-factor authentication (MFA)-enabled Global Ambassador accounts; turn off MFA temporarily (simply to consummate the operation) equally a workaround.

Collecting Laissez passer-through Authentication Agent logs

Depending on the type of upshot you may have, y'all need to wait in different places for Pass-through Authentication Agent logs.

Azure Ad Connect logs

For errors related to installation, cheque the Azure AD Connect logs at %ProgramData%\AADConnect\trace-*.log.

Authentication Agent event logs

For errors related to the Authentication Agent, open up the Event Viewer application on the server and bank check under Application and Service Logs\Microsoft\AzureAdConnect\AuthenticationAgent\Admin.

For detailed analytics, enable the "Session" log (right-click inside the Event Viewer awarding to notice this option). Don't run the Authentication Agent with this log enabled during normal operations; utilise only for troubleshooting. The log contents are only visible after the log is disabled again.

Detailed trace logs

To troubleshoot user sign-in failures, wait for trace logs at %ProgramData%\Microsoft\Azure AD Connect Authentication Agent\Trace\. These logs include reasons why a specific user sign-in failed using the Pass-through Authentication feature. These errors are likewise mapped to the sign-in failure reasons shown in the preceding sign-in failure reasons table. Post-obit is an case log entry:

                              AzureADConnectAuthenticationAgentService.exe Error: 0 : Passthrough Authentication request failed. RequestId: 'df63f4a4-68b9-44ae-8d81-6ad2d844d84e'. Reason: '1328'.         ThreadId=5         DateTime=xxxx-xx-xxTxx:xx:xx.xxxxxxZ                          

You can get descriptive details of the fault ('1328' in the preceding example) by opening upwardly the command prompt and running the following command (Note: Supersede '1328' with the actual error number that you come across in your logs):

Internet helpmsg 1328

Pass-through Authentication

Domain Controller logs

If audit logging is enabled, additional data tin can be found in the security logs of your Domain Controllers. A simple fashion to query sign-in requests sent by Laissez passer-through Authentication Agents is as follows:

                              <QueryList>     <Query Id="0" Path="Security">     <Select Path="Security">*[EventData[Information[@Proper noun='ProcessName'] and (Information='C:\Program Files\Microsoft Azure AD Connect Authentication Amanuensis\AzureADConnectAuthenticationAgentService.exe')]]</Select>     </Query>     </QueryList>                          

Functioning Monitor counters

Some other style to monitor Authentication Agents is to track specific Performance Monitor counters on each server where the Hallmark Agent is installed. Use the following Global counters (# PTA authentications, #PTA failed authentications and #PTA successful authentications) and Fault counters (# PTA authentication errors):

Pass-through Authentication Performance Monitor counters

Of import

Pass-through Hallmark provides high availability using multiple Authentication Agents, and not load balancing. Depending on your configuration, not all your Hallmark Agents receive roughly equal number of requests. It is possible that a specific Authentication Amanuensis receives no traffic at all.

willistheareetweet.blogspot.com

Source: https://docs.microsoft.com/en-us/azure/active-directory/hybrid/tshoot-connect-pass-through-authentication

Post a Comment for "There Was a Problem Authenticating. Please Try Again Later. Code: 12020"