Azure AD Connect: troubleshooting pass-through authentication - Microsoft Inside (2023)

  • Article

This article helps you find information on troubleshooting common Azure AD pass-through authentication issues.

Important

If you experience user login issues with pass-through authentication, do not disable the feature or uninstall pass-through authentication agents without having a cloud-only global administrator account or hybrid identity administrator account to which to turn. learn aboutadd a cloud-only global admin account. Performing this step is critical and ensures that you are not locked out of your tenant.

General questions

Check the status of the feature and authentication agents

Make sure the pass-through authentication feature is still enabledActivatedin your tenant and shows the status of the approval agentsAsset, and notIdle. You can check the status by going toAzure AD connectionsheet onLogin to the administration center.

Azure AD Connect: troubleshooting pass-through authentication - Microsoft Inside (1)

Azure AD Connect: troubleshooting pass-through authentication - Microsoft Inside (2)

User login error messages

If the user can't sign in with pass-through authentication, you might see one of the following user errors on the Azure AD sign-in screen:

ErrorDescriptionSolution
AADSTS80001Cannot connect to Active DirectoryMake sure that the agent servers are members of the same AD forest as the users whose passwords need to be validated and can connect to Active Directory.
AADSTS80002Timed out connecting to Active DirectoryVerify that Active Directory is available and responding to agent requests.
AADSTS80004The username passed to the agent was invalidMake sure the user tries to log in with the correct username.
AADSTS80005Validation encountered an unpredictable WebExceptionA temporary error. Try the request again. If it continues to fail, contact Microsoft Support.
AADSTS80007An error occurred while communicating with Active DirectoryCheck the agent logs for more information and verify that Active Directory is working as expected.

Users get invalid username/password error

This can happen when a user's on-premises UserPrincipalName (UPN) is different from the user's cloud UPN.

To confirm that this is the problem, first test that the pass-through authentication agent is working correctly:

  1. Create a test account.

  2. Import the PowerShell module on the agent machine:

    Import module "C:\Program Files\Microsoft Azure AD Connect Authentication Agent\Modules\PassthroughAuthPSModule\PassthroughAuthPSModule.psd1"
  3. Run the Invoke PowerShell command:

    Invoke-PassthroughAuthOnPremLogonSolucionador de problemas
  4. When prompted for credentials, enter the same username and password you used to log in (https://login.microsoftonline.com).

If you get the same username/password error, it means that the pass-through authentication agent is working correctly and the problem could be that the local UPN is not routable. For more information, seeAlternate Login ID Configuration.

Important

If the Azure AD Connect server is not joined to a domain, a requirement is mentioned in theAzure AD Connect: Prerequisites, the invalid username/password problem occurs.

Azure portal sign-in failure reasons (requires Premium license)

If your tenant has an Azure AD Premium license associated with it, you can also take a looklogin activity reportin thatLogin to the administration center.

navigate toAzure Active Directory->loginsin thatblue portaland click on the login activity of a specific user. Look afterLOGIN ERROR CODEField. Assign the value of this field to an error cause and solution using the following table:

Error code when logging inReason for login failureSolution
50144The user's Active Directory password has expired.Reset the user's password in your local Active Directory.
80001No authentication agent available.Install and register an authentication agent.
80002Authentication agent password validation request timed out.Check if your Active Directory is accessible from the authentication agent.
80003Invalid response received by the authentication agent.If the issue can be reproduced consistently across multiple users, check your Active Directory settings.
80004Incorrect username (UPN) used in the login request.Ask the user to sign in with the correct username.
80005Authentication Agent: An error occurred.transient error. Try it again later.
80007The authentication agent cannot connect to Active Directory.Check if your Active Directory is accessible from the authentication agent.
80010The authentication agent cannot decrypt the password.If the issue can be consistently reproduced, install and register a new authentication agent. And uninstall the current one.
80011The authentication agent could not retrieve the decryption key.If the issue can be consistently reproduced, install and register a new authentication agent. And uninstall the current one.
80014The validation request was answered after the maximum elapsed time was exceeded.Authentication agent timed out. Please open a support ticket with the error code, correlation ID, and timestamp for more details on this error.

Important

Pass-through authentication agents authenticate users to Azure AD by validating their usernames and passwords against Active Directory by callingWin32 LogonUser API. As a result, if you have configured the "Login To" setting in Active Directory to restrict workstation login access, you will also need to add servers that host Pass-Through Authentication Agents to the "Login To" server list. . If you don't do this, your users won't be able to sign in to Azure AD.

Problems installing the authentication agent

an unexpected error occurred

Collect agent logsfrom the server and contact Microsoft Support with your problem.

Authentication agent registration issues

Authentication agent registration failed due to blocked ports

Make sure the server where the authentication agent is installed can communicate with the listed URLs and ports of our serviceare.

Authentication agent registration failed due to account or token authorization errors

Be sure to use a cloud-only global administrator account or hybrid identity administrator account for all Azure AD Connect or standalone authentication agent setup and registration operations. There is a known issue with MFA-enabled global administrator accounts; disable MFA temporarily (just to complete operations) as a workaround.

an unexpected error occurred

Collect agent logsfrom the server and contact Microsoft Support with your problem.

Problems uninstalling the authentication agent

Warning message when uninstalling Azure AD Connect

If you have enabled pass-through authentication in your tenant and you try to uninstall Azure AD Connect, the following warning message appears: "Users will not be able to sign in to Azure AD unless you have other pass-through authentication agents installed on other servers".

Make sure your configuration isvery accessiblebefore uninstalling Azure AD Connect to avoid breaking user sign-in.

Problems activating the function

Feature activation failed because no authentication agents were available

You must have at least one active authentication agent to enable pass-through authentication in your tenant. You can install an authentication agent by installing Azure AD Connect or a standalone authentication agent.

Feature activation failed due to blocked ports

Make sure that the server where Azure AD Connect is installed can communicate with the specified URLs and ports of our service.are.

Feature activation failed due to token or account authorization error

Make sure to use a cloud-only global administrator account when enabling the feature. There is a known issue with global administrator accounts enabled for multi-factor authentication (MFA); disable MFA temporarily (just to complete the operation) as a workaround.

Collecting Pass-Through Authentication Agent logs

Depending on the type of problem you may be having, look for the Passthrough Authentication Agent log files in different places.

Azure AD Connect logs

For installation related errors, see the Azure AD Connect logs%ProgramData%\AADConnect\trace-*.log.

Authentication Agent event logs

For authentication agent related errors, open the Event Viewer app on the server and check belowApplications: og servicelogfiler\Microsoft\AzureAdConnect\AuthenticationAgent\Admin.

For detailed analysis, enable "Session" logging (right-click inside the Event Viewer app to find this option). Do not run the authentication agent with this logging enabled during normal operations; it is used for troubleshooting only. The log content is only visible after logging is disabled again.

Detailed trace logs

To troubleshoot user login errors, look for trace logs in%ProgramData%\Microsoft\Azure AD Connect Authentication Agent\Trace\. These logs include the reasons why a specific user's login failed when using the pass-through authentication feature. These errors are also linked to the login failure causes listed in the login failure causes table. The following is an example login entry:

AzureADConnectAuthenticationAgentService.exe error: 0: Passthrough authentication request failed. Request ID: 'df63f4a4-68b9-44ae-8d81-6ad2d844d84e'. Reason: '1328'. ThreadId=5 DateTime=xxxx-xx-xxTxx:xx:xx.xxxxxxZ

You can get descriptive details about the error ('1328' in the example above) by opening a command prompt and running the following command (Note: Replace '1328' with the actual error number you see in your logs):

Net help message 1328

Azure AD Connect: troubleshooting pass-through authentication - Microsoft Inside (4)

Domain controller log files

If audit logging is enabled, additional information can be found in the security logs of your domain controllers. An easy way to query the login requests sent by the pass-through authentication agents is as follows:

    

Performance Monitor Counters

Another way to monitor authentication agents is to trace specific Performance Monitor counters on each server where the authentication agent is installed. Use the following global counters (# PTA approvals,Failed #PTA approvalsy#PTA successful approvals) and error counters (# PTA authentication error):

Azure AD Connect: troubleshooting pass-through authentication - Microsoft Inside (5)

Important

Pass-through authentication provides high availability by using multiple authentication agents andit's notload balancing. Depending on your configuration,it's notall their authentication agents receive approx.fairnumber of requests. A specific authentication agent may not receive any traffic.

Top Articles
Latest Posts
Article information

Author: Duane Harber

Last Updated: 07/19/2023

Views: 6217

Rating: 4 / 5 (51 voted)

Reviews: 90% of readers found this page helpful

Author information

Name: Duane Harber

Birthday: 1999-10-17

Address: Apt. 404 9899 Magnolia Roads, Port Royceville, ID 78186

Phone: +186911129794335

Job: Human Hospitality Planner

Hobby: Listening to music, Orienteering, Knapping, Dance, Mountain biking, Fishing, Pottery

Introduction: My name is Duane Harber, I am a modern, clever, handsome, fair, agreeable, inexpensive, beautiful person who loves writing and wants to share my knowledge and understanding with you.