Troubleshoot Active Directory Federation Services Idp-initiated sign-on (2024)

  • Article

The Active Directory Federation Services (AD FS) sign-on page can be used to check if authentication is working. This test is done by navigating to the page and signing in. Also, you can use the sign-in page to verify that all SAML 2.0 relying parties are listed.

Enable the Idp-initiated sign on page

By default, AD FS in Windows 2016 doesn't have the sign on page enabled. To enable the page, you can use the PowerShell command Set-AdfsProperties. Use the following procedure to enable the page:

  1. Open Windows PowerShell.

  2. Enter Get-AdfsProperties and hit enter.

  3. Verify the EnableIdpInitiatedSignonPage property is set to false.

    Troubleshoot Active Directory Federation Services Idp-initiated sign-on (1)

  4. In PowerShell, enter Set-AdfsProperties -EnableIdpInitiatedSignonPage $true.

  5. PowerShell doesn't provide a confirmation for the Set-AdfsProperties command. To confirm the EnableIdpInitatedSignonPage property is set to true, enter the Get-AdfsProperties command again and check the value for the property.

    Troubleshoot Active Directory Federation Services Idp-initiated sign-on (2)

Test authentication

Use the following procedure to test AD FS authentication with the Idp-initiated sign on page.

  1. Open a web browser, and go to the Idp sign on page. Your URL might look like https://sts.contoso.com/adfs/ls/idpinitiatedsignon.aspx.

  2. You should be prompted to sign-in. Enter your credentials.

    Troubleshoot Active Directory Federation Services Idp-initiated sign-on (3)

  3. If the process succeeds, you’re signed in.

Test authentication with seamless sign in

You can test the seamless sign-in experience by making sure the URL for your AD FS servers is added to the local intranet zone of your internet options. Use the following procedure:

  1. On a Windows 10 client, select Start and enter internet options and select Internet Options.

  2. Select the Security tab, select Local intranet, and then select Sites.

    Troubleshoot Active Directory Federation Services Idp-initiated sign-on (4)

  3. Select Advanced.

  4. Enter your URL and select Add. Select Close.

    Troubleshoot Active Directory Federation Services Idp-initiated sign-on (5)

  5. Select Ok. Then select Ok to close the internet options.

  6. Open a web browser and go to the Idp sign on page. Your URL might look like https://sts.contoso.com/adfs/ls/idpinitiatedsignon.aspx.

  7. Select the sign in button. You should automatically sign in and not be prompted for credentials.

    Troubleshoot Active Directory Federation Services Idp-initiated sign-on (6)

Known Issues

The AD FS sign-on page can't be used to initiate a sign in with a claims provider trust that's configured with a WS-Federation passive endpoint only. Register a relying party such as ClaimsXRay to verify that a WS-Federation claims provider trust works as intended.

Next Steps

Feedback

Coming soon: Throughout 2024 we will be phasing out GitHub Issues as the feedback mechanism for content and replacing it with a new feedback system. For more information see: https://aka.ms/ContentUserFeedback.

Submit and view feedback for

Troubleshoot Active Directory Federation Services Idp-initiated sign-on (2024)
Top Articles
Latest Posts
Article information

Author: Greg Kuvalis

Last Updated:

Views: 5903

Rating: 4.4 / 5 (75 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Greg Kuvalis

Birthday: 1996-12-20

Address: 53157 Trantow Inlet, Townemouth, FL 92564-0267

Phone: +68218650356656

Job: IT Representative

Hobby: Knitting, Amateur radio, Skiing, Running, Mountain biking, Slacklining, Electronics

Introduction: My name is Greg Kuvalis, I am a witty, spotless, beautiful, charming, delightful, thankful, beautiful person who loves writing and wants to share my knowledge and understanding with you.