Federated identity management using Active Directory Federation Services
Anyone has an idea?
This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
We are using ADFS on Windows Server 2019. External login to O365 will authenticate via this ADFS server instead of Azure AD.
Recently we have been trying on the Extranet Smart Lockout feature.
In order to see how it would work, we have set the lockout mode to enforce.
set the ExtranetLockoutMode to <ADFSSmartLockoutEnforce>
Things seems to work as expected, except for one issue - when a user got locked, we cannot unlock the account via powershell.
Here's the scenario.
PS C:\Users\administrator.contoso> Get-AdfsAccountActivity -Identity ******@contoso.com
Identifier : contoso\Extest01
BadPwdCountFamiliar : 6
BadPwdCountUnknown : 0
LastFailedAuthFamiliar : 12/5/2020 5:18:11 PM
LastFailedAuthUnknown : 12/5/2020 4:51:56 PM
FamiliarLockout : True
UnknownLockout : False
FamiliarIps : {202.xxx.xxx.109}
PS C:\Users\administrator.contoso> Reset-AdfsAccountLockout ******@contoso.com -Location Familiar
PS C:\Users\administrator.contoso> Get-AdfsAccountActivity -Identity ******@contoso.com
Identifier : contoso\Extest01
BadPwdCountFamiliar : 0
BadPwdCountUnknown : 0
LastFailedAuthFamiliar : 12/5/2020 5:18:11 PM
LastFailedAuthUnknown : 12/5/2020 4:51:56 PM
FamiliarLockout : False
UnknownLockout : False
FamiliarIps : {202.xxx.xxx.109}
Please help to see if there is anything missing here. Thanks in advanced.
Additional information.
We have set the ESL via the following powershell:
Set-AdfsProperties -EnableExtranetLockout $true -ExtranetLockoutThreshold 3 -ExtranetObservationWindow (new-timespan -Minutes 10) -ExtranetLockoutRequirePDC $false
Federated identity management using Active Directory Federation Services