Monday, November 3, 2014

Easy Esxi patching

These are the sites I went to and the commands I ran.



Heere is a great site to get exsi patches without logging into vmware
https://esxi-patches.v-front.de/


esxi goto configuration page
choose security profile
enable esx shell and ssh

ssh into vmware server

run these commands

esxcli network firewall ruleset set -e true -r httpClient

esxcli network firewall ruleset set -e true -r httpClient
esxcli software profile update -d https://hostupdate.vmware.com/software/VUM/PRODUCTION/main/vmw-depot-index.xml -p ESXi-6.0.0-2494585-standard

esxcli network firewall ruleset set -e true -r httpClient
esxcli software profile update -d https://hostupdate.vmware.com/software/VUM/PRODUCTION/main/vmw-depot-index.xml -p ESXi-6.0.0-20160104001-standard

Reboot

esxcli network firewall ruleset set -e true -r httpClient
esxcli software profile update -d https://hostupdate.vmware.com/software/VUM/PRODUCTION/main/vmw-depot-index.xml -p ESXi-6.0.0-20161104001-standard

Reboot

6.0 update 3
 esxcli network firewall ruleset set -e true -r httpClient
esxcli software profile update -d https://hostupdate.vmware.com/software/VUM/PRODUCTION/main/vmw-depot-index.xml -p ESXi-6.0.0-20170202001-standard


Sunday, September 21, 2014

Linux service startup

http://www.linuxtopia.org/HowToGuides/services.html

How to find and configure the services which start when a Linux system boots up


A typical Linux system can be configured to boot into one of 5 different runlevels. During the boot process the init process looks in the /etc/inittab file to find the default runlevel. Having identified the runlevel it proceeds to execute the appropriate startup scripts located in the /etc/rc.d sub-directory.

For example if you have a runlevel of 5 configured then the init process will work through the list of startup scripts located in /etc/rc.d/rc5.d. These startup scripts start either with the letter "S" or "K" followed by a number and then a (hopefully) description word. For example the startup script for NFS (Networked File System) is typcically S60nfs whilst the stratup script for YUM system might be called K01yum.

Scripts that start with an "S" are invoked before those prefixed with a "K". The number in the filename controls the order in which the script will be executed with that group (either "S" or "K"). You wouldn't, for example, want to start NFS before the basic networking is up and running. It is also worth noting that the files in the rc.d sub-directories are not the actual scripts themselves but rather symbolic links to the actual files located in /etc/rc.d/init.d.

There are number of ways to control what services get started wihtout having to delve into the /etc/rc.d sub-directories yourself.

The command line tool chkconfig (usually located in /sbin) can be used to list and configure which services get started at boot time. To list all service settings run the following command:

    /sbin/chkconfig --list

This will display a long list of services showing whether or not they are started up at various runlevels. You may want to narrow the search down using grep. For example to list the entry for the HTTP daemon you would do the following:

    /sbin/chkconfig --list | grep httpd

which should result in something like:

    httpd           0:off   1:off   2:off   3:on    4:off   5:off    6:off

Alternatively you may just be interested to know what gets started for runlevel 3:

    /sbin/chkconfig --list | grep '3:on'

chkconfig can also be used to change the settings. If we wanted the HTTP service to start up when we at runlevel 5 we would issue the following command:

    /sbin/chkconfig --level 5 httpd on

A number of graphical tools are also available for administering services. On RedHat 9 you can run the following command:

    redhat-config-services

The equivalent command on RedHat Fedora Core is:

    system-config-services

The above graphical tools allow you to view which services will start for each runlevel, add or remove services for each runlevel and also manually start or stop services.

Another useful tool if you do not have a graphical desktop running or access via a remote server is the ntsysv command. ntsysv resides in /sbin on most systems. Whilst a convenient tool when you don't have an X server running the one draw back of ntsysv is that it only allows you to change the settings for the current runlevel.

Fail2ban notes



http://itswapshop.com/content/how-view-and-remove-banned-ips-fail2ban-ubuntu-1004

http://lintut.com/easy-steps-to-install-fail2ban-on-centos-6-5-protect-sshftp-using-fail2ban/


Enable EPEL means Extra Packages for Enterprise Linux

http://lintut.com/enable-epel-repository/

# wget http://download.fedoraproject.org/pub/epel/6/i386/epel-release-6-8.noarch.rpm
# rpm -ivh epel-release-6-8.noarch.rpm

IP Tables reference

http://wiki.centos.org/HowTos/Network/IPTables


bind9 reference

http://www.zytrax.com/books/dns/ch7/xfer.html#allow-notify

http://www.microhowto.info/howto/configure_bind_as_a_slave_dns_server.html

https://www.digitalocean.com/community/tutorials/how-to-setup-dns-slave-auto-configuration-using-virtualmin-webmin-on-ubuntu


RSync backup script

http://www.pointsoftware.ch/howto-local-and-remote-snapshot-backup-using-rsync-with-hard-links/

might have to modify script to allow for failure on space check.


Rescan SCSI bus on linux

http://www.cyberciti.biz/tips/vmware-add-a-new-hard-disk-without-rebooting-guest.html

echo "- - -" > /sys/class/scsi_host/host#/scan


Install LSI Tool on ESXi

Install LSI Tool on ESXi

http://mycusthelp.info/LSI/_cs/AnswerPreview.aspx?sSessionID=6624973237KEWXDGRIO%5B%5BVFPOJVD%5BZDFFLWTOSCF&inc=7968

Remeber to add hosts entry on server for esx box name

Remove trend micro

Remove trend micro

http://esupport.trendmicro.com/Pages/How-do-I-remove-old-or-new-versions-of-Trend-Micro-products-in-my-comp.aspx

indows Vista or Windows 7
  1. Select your Windows operating system version to download the Trend Micro Diagnostic Toolkit.
  2. http://esupport.trendmicro.com/media/10278586/EN-1037161_05.jpg
Uninstall software

Saturday, September 20, 2014

Fix for Event ID 6398 due to CEIP Data Collection for SharePoint Foundation

To isolate event

Go to Central Admin - monitoring - review job definitions - job history (left) and change the view (right) to Failed jobs. Click on Failed link and you should get similar error messages logged. Review the job (check configuration) to fix and if not needed disable it.


Then to fix 

http://support.microsoft.com/kb/2616940

You can implement the following workaround to disable the CEIP Data Collection Job.

1.) Launch an elevated SharePoint 2010 Management Shell

2.) Run the following command to find out the current status of CEIP at the Farm and Site level

Get-SPBrowserCustomerExperienceImprovementProgram -Farm <- This will return the status of the Browser CEIP at the farm level
(Get-SPFarm).CEIPEnabled <- This will return the status of the CEIP at the farm level
(Get-SPWebApplication).BrowserCEIPEnabled <- This will return the status of the CEIP at the site level

3.) If CEIP is enabled, run the following commands to disable CEIP at the Farm and Site level

Set-SPBrowserCustomerExperienceImprovementProgram -Farm -Enable:$FALSE
Set-SPBrowserCustomerExperienceImprovementProgram -WebApplication "SBS SharePoint" -Enable:$FALSE

4.) Next, open SharePoint 2010 Central Administration

5.) Click System Settings

6.) Click Configure Privacy Options under Farm Management

7.) Under the section Customer Experience Improvement Program, select the radio button for 'No, I don't wish to participate.' and then click OK.

8.) Next, disable the CEIP Data Collection job by running the following command

Get-SPTimerJob job-ceip-datacollection | Disable-SPTimerJob

9.) Run IISRESET /noforce from an elevated command prompt.

Thursday, May 22, 2014

AD FS 2.0 How to force rollover on certificates with office 365 and federated services

http://social.technet.microsoft.com/wiki/contents/articles/1424.ad-fs-2-0-how-to-enable-and-immediately-use-autocertificaterollover.aspx

AD FS 2.0: How to Enable and Immediately Use AutoCertificateRollover

Summary



When the GUI Initial Configuration Wizard (ICW) of AD FS 2.0 has been executed, AutoCertificateRollover is automatically enabled by default and the token-signing and token-decrypting certificates are self-signed and maintained by the AD FS 2.0 service.
When the command line ICW of AD FS 2.0 has been executed, AutoCertificateRollover is either on or off depending on the syntax you provided at the command line.
You can optionally turn off AutoCertificateRollover post-ICW by running the following from PowerShell:
Add-PSSnapin Microsoft.Adfs.Powershell
Set-ADFSProperties -AutoCertificateRollover $false
If you have turned off AutoCertificateRollover in the past and you want to turn it back on, there are a few things you need to consider:
  •  
    • Simply turning AutoCertificateRollover back on via PowerShell will not immediately cause the self-signed certificates to be generated
    • The self-signed certificates will only be generated once the critical threshold (close to expiration) of your existing certificates has been met
    • There is a way to immediately cause the self-signed certificates to be generated, but this will cause service outage with your partners until they have refreshed from your federation metadata. We recommend causing the certificate generation after hours to avoid an outage. Alternatively, you could work closely with your partners to ensure that they are ready to immediately update via federation metadata (causing a short outage).
If you decide to let the existing certificates hit the critical threshold instead of invoking the certificate generation process, then you only need to re-enable AutoCertificateRollover.
If you decide that you want to immediately generate new self-signed certificates, then you need to first re-enable AutoCertificateRollover and then issue a PowerShell command to invoke immediate certificate generation.

PowerShell command to re-enable AutoCertificateRollover:
Add-PSSnapin Microsoft.Adfs.PowershellSet-ADFSProperties -AutoCertificateRollover $true
PowerShell command to immediately generate new self-signed certificates:
Add-PSSnapin Microsoft.Adfs.Powershell
Update-AdfsCertificate -Urgent

ad fs 2.0 how to replace the ssl service communications token signing and token decrypting certificates

http://social.technet.microsoft.com/wiki/contents/articles/2554.ad-fs-2-0-how-to-replace-the-ssl-service-communications-token-signing-and-token-decrypting-certificates.aspx


AD FS 2.0: How to Replace the SSL, Service Communications, Token-Signing, and Token-Decrypting Certificates



Replacing the SSL and Service Communications certificate



*Note - Replacing the SSL and Service Communications certificates go hand-in-hand. Any time you are replacing one of these certificates, you must also replace the other. SSL certificates exist on all Federation Servers and Federation Server Proxy servers. Service Communications certificates only exist on Federation Servers.

1. Obtain a new certificate with the following requirements    a. Enhanced Key Usage is at least Server Authentication. If you are obtaining this from an internal MS Exterprise CA, the Web Server template will work fine.
    b. Subject or Subject Alternative Name (SAN) must contain the DNS name of your Federation Service or an appropriate wildcard name
           Example: sso.contoso.com or *.contoso.com
    c. You may wish to generate the certificate request and mark the private key exportable so that you can move the certificate from one server to others in the case when you have a Federation Server farm or at least one Federation Server Proxy.
    d. Take note of which server was used to generate the certificate request. The private key is generated and stored here. When you receive the certificate from the issuing CA, you will need to bring that file back to the server where the request was initiated so that you can create a private/public key pair.
    e. The issuing CA that you choose is important because your Federation Server(s), Federation Server Proxy(ies), and all clients accessing your Federation Service must be able to chain to a trusted root certification authority when validating the SSL certificate. Customers will typically use a 3rd party, public CA for the SSL and Service Communications certificate.

2. ACL the SSL and Service Communications certificate to allow Read access for the AD FS 2.0 service account*Note - This step must be completed on all Federation Servers only.

    a. Click StartRun, type MMC.exe, and press Enter
    b. Click FileAdd/Remove Snap-in
    c. Double-click Certificates
    d. Select Computer account and click Next    e. Select Local computer and click Finish    f. Expand Certificates (Local Computer), expand Personal, and select Certificates
    g. Right-click your new SSL and Service Communications certificate, select All Tasks, and select Manage Private Keys
    h. Add Read access for your AD FS 2.0 service account and click OK    i. Close the Certificates MMC

3. Bind the new SSL and Service Communications certificate to the web site in IIS which hosts the Federation Service*Note - This step must be completed on all Federation Servers and Federation Server Proxy servers.
    a. In IIS7 on Windows Server 2008 and Windows Server 2008 R2, you will select the web site, right-click, Edit Bindings, and select the SSL port, Edit, and use the drop-dwon to select the new SSL certificate:

        

*Note - Be careful when making your certificate selection. Your old SSL certificate and new SSL certificate will likely have the same subject name and/or friendly name, and this may make it difficult to differentiate between the two certificates. When in doubt, use thumbprint matching (see the Thumbprint Matching section at the end of this article).

4. Set a new Service Communications certificate in the AD FS 2.0 Management console*Note - This step needs to be completed just one time on a single Federation Server in the farm. Proxies are not involved here, and other Federation Servers in a farm will pick up this change automatically.

    a. Launch AD FS 2.0 Management from the Administrative Tools menu
    b. Expand Service and select Certificates    c. In the Actions pane, click Set Service Communications Certificate...


    d. You will be presented with a list of certificates that are valid for Service Communications. If you find that your new certificate is not being presented in the list, you need to go back and make sure that a. the certificate is in the local computer Personal store with private key associated, and b. the certificate has the Server Authentication EKU.
    e. Select your new Service Communications certificate and click OK* Note: Be careful when making your certificate selection. Your old Service Communications certificate and new Service Communications certificate might have the same subject name and/or friendly name, and this may make it difficult to differentiate between the two certificates. When in doubt, use thumbprint matching (see the Thumbprint Matchingsection at the end of this article).



5. Test SSL functionality for internal and external users to ensure that SSL is working as expected on the Federation Servers and the Federation Server Proxy servers.


Replacing the Token-Signing certificate


*Note - If you are utilizing the AutoCertificateRollover feature of AD FS 2.0, you do not need to manually replace the Token-Signing certificate. AutoCertificateRollover will create a self-signed Token-Signing certificate for you and set it as the Primary Token-Signing certificate when a time threshold has been met. The new Token-Signing certificate is published in your Federation Metadata, and Relying Party (RP) partners who can consume Federation Metadata will automatically pick up the change whenever they pull your Federation Metadata document. You should work with your RP partners to see how often they pull for Federation Metadata so that, in the event of a certificate replacement, they will experience little to no downtime before trusting your new certificate. If your RP partners cannot consume Federation Metadata, you should be aware of when AutoCertificateRollover will set a new Primary Token-Signing certificate and you will need to plan accordingly to send the public key portion of this certificate to your RP partners.

1. Check to see if you are utilizing AutoCertificateRollover    a. Launch PowerShell on a Federation Server
    b. Run the following commands:
        Add-Pssnapin Microsoft.Adfs.Powershell
        Get-ADFSProperties
    c. Look for the value of AutoCertificateRollover in the output. It will show True or False    d. If the result of step c. is True, then you are finished, and you should take special note of everything in the *Noteabove. If the result of step c. is False, then you will need to maintain the Token-Signing certificate manually, and you should move on to the next step.

2. Obtain a new certificate with the following requirements    a. It is common to think that a specific Enhanced Key Usage (EKU) is needed for the Token-Signing certificate, but this is, in fact, not correct. The only requirement for usage is that Key Usage (KU) must contain at least Digital Signature. We have seen a lot of customers go through the trouble of obtaining a Code Signing EKU certificate. Again, EKU is not required for Token-Signing.
    b. Subject and/or Subject Alternative Name (SAN) does not matter. We recommend using something like "AD FS Token-Signing" or "Contoso SSO Token-Signing" so that you know exactly what the certificate is used for when you see it.
    c. Take note of which server was used to generate the certificate request. The private key is generated and stored here. When you receive the certificate from the issuing CA, you will need to bring that file back to the server where the request was initiated so that you can create a private/public key pair.
    d. When choosing an issuing CA, remember that only your Federation Servers, your RP Federation Servers and RP applications need to be able to chain to a trusted root certification authority when validating your Token-Signing certificate. You could save on the cost of a 3rd party certificate by using an internal PKI-issued certificate or a self-signed certificate. If you choose to use an internal PKI, your Federation Servers, RP Federation Servers and RP applications must trust your PKI root. If you choose to use a self-signed certificate, your Federation Servers and Resource Partner Federation Servers must import the self-signed certificate to the Trusted Root Certification Authorities store in order to trust the self-signed certificate.

3. Decide how your RP partners will trust the new Token-Signing certificate

RP partners who can consume Federation Metadata

You should replace the Token-Signing certificate and instruct the RP partners to pull for your new Federation Metadata to pick up the new certificate.

RP partners who can NOT consume Federation MetadataYou must manually send them the public key of your new Token-Signing Certificate. Send your new Token-Signing certificate public key (.cer file or .p7b if you wish to include the entire chain) to all of your RPs. Have the partner implement changes on their side to trust the new certificate. If the RP partner is using AD FS 2.0, the following will apply.

On the RP partner AD FS 2.0 server:    a. Launch AD FS 2.0 Management from the Administrative Tools menu
    b. Expand Trust Relationships, select Claims Provider Trusts, and select the trust that was created for you
    c. Right-click the trust name and select Properties    d. Select the Certificates tab and Add the new Token-Signing certificate
    e. Click OK



4. Add the new Token-Signing certificate    a. Launch AD FS 2.0 Management from the Administrative Tools menu
    b. Expand Service and select Certificates    c. In the Actions pane, click Add Token-Signing Certificate...    d. You will be presented with a list of certificates that are valid for Token-Signing. If you find that your new certificate is not being presented in the list, you need to go back and make sure that a. the certificate is in the local computer Personal store with private key associated, and b. the certificate has the Digital Signature KU.
    e. Select your new Token-Signing certificate and click OK* Note: Be careful when making your certificate selection. Your old Token-Signing certificate and new Token-Signing certificate might have the same subject name and/or friendly name, and this may make it difficult to differentiate between the two certificates. When in doubt, use thumbprint matching (see the Thumbprint Matching section at the end of this article).



5. ACL the private key to allow Read access to the AD FS 2.0 service account    a. When you add a new Token-Signing certificate, you receive a warning reading: "Ensure that the private key for the chosen certificate is accessible to the service account for this Federation Service on each server in the farm":



    b. Click StartRun, type MMC.exe, and press Enter
    c. Click FileAdd/Remove Snap-in
    d. Double-click Certificates
    e. Select Computer account and click Next    f. Select Local computer and click Finish    g. Expand Certificates (Local Computer), expand Personal, and select Certificates
    h. Right-click your new Token-Signing certificate, select All Tasks, and select Manage Private Keys
    i. Add Read access for your AD FS 2.0 service account and click OK    j. Close the Certificates MMC

6. Set the new Token-Signing certificate as Primary    a. With the Certificates node in AD FS 2.0 Management selected, you should now see two certificates listed under Token-Signing:
        i.  Your old Token-Signing certificate
        ii. Your new Token-Signing certificate
    b. Select your new Token-Signing certificate, right-click, and select Set as primary    c. Leave the old certificate as secondary for rollover purposes. You should plan to remove the old certificate once you are confident it is no longer needed for rollover, or when the certificate has expired.
            i. Current users' SSO sessions are signed and possibly also encrypted using the OLD certificate
            ii. Current AD FS 2.0 Proxy Trust relationships utilize tokens that are signed and encrypted using the OLD certificate




7. Test the new Token-Signing certificate by sending a SAML assertion to your RP partners and RP applications

Replacing the Token-Decrypting certificate


*Note - If you are utilizing the AutoCertificateRollover feature of AD FS 2.0, you do not need to manually replace the Token-Decrypting certificate. AutoCertificateRollover will create a self-signed Token-Decrypting certificate for you and set it as the Primary Token-Decrypting certificate when a time threshold has been met. The new Token-Decrypting certificate is published in your Federation Metadata, and Claims Provider (CP) partners who can consume Federation Metadata will automatically pick up the change whenever they pull your Federation Metadata document. You should work with your CP partners to see how often they pull for Federation Metadata so that, in the event of a certificate replacement, they will experience little to no downtime before utilizing your new certificate for token encryption. If your CP partners cannot consume Federation Metadata, you should be aware of when AutoCertificateRollover will set a new Primary Token-Decrypting certificate and you will need to plan accordingly to send the public key portion of this certificate to your CP partners.

1. Check to see if you are utilizing AutoCertificateRollover    a. Launch PowerShell on a Federation Server
    b. Run the following commands:
        Add-Pssnapin Microsoft.Adfs.Powershell
        Get-ADFSProperties
    c. Look for the value of AutoCertificateRollover in the output. It will show True or False    d. If the result of step c. is True, then you are finished, and you should take special note of everything in the *Noteabove. If the result of step c. is False, then you will need to maintain the Token-Decrypting certificate manually, and you should move on to the next step.

2. Obtain a new certificate with the following requirements    a. It is common to think that a specific Enhanced Key Usage (EKU) is needed for the Token-Decrypting certificate, but this is, in fact, not correct. The only requirement for usage is that Key Usage (KU) must contain at least Key Encipherment. We have seen a lot of customers go through the trouble of obtaining a Code Signing EKU certificate. Again, EKU is not required for Token-Decrypting.
    b. Subject and/or Subject Alternative Name (SAN) does not matter. We recommend using something like "AD FS Token-Decrypting" or "Contoso SSO Token-Decrypting" so that you know exactly what the certificate is used for when you see it.
    c. Take note of which server was used to generate the certificate request. The private key is generated and stored here. When you receive the certificate from the issuing CA, you will need to bring that file back to the server where the request was initiated so that you can create a private/public key pair.
    d. When choosing an issuing CA, remember that only your Federation Servers and CP partners need to be able to chain to a trusted root certification authority when validating your Token-Decrypting certificate. You could save on the cost of a 3rd party certificate by using an internal PKI-issued certificate or a self-signed certificate. If you choose to use an internal PKI, your Federation Servers and CP partners must trust your PKI root. If you choose to use a self-signed certificate, your Federation Servers and CP partners must import the self-signed certificate to the Trusted Root Certification Authorities store in order to trust the self-signed certificate.

3. Decide how your CP partners will trust the new Token-Decrypting certificate
CP partners who can consume Federation Metadata

You should replace the Token-Decrypting certificate and instruct the CP partners to pull for your new Federation Metadata to pick up the new certificate.

 CP partners who can NOT consume Federation MetadataYou must manually send them the public key of your new Token-Decrypting certificate. Send your new Token-Decrypting certificate public key (.cer file or .p7b if you wish to include the entire chain) to all of your CPs. Have the partner implement changes on their side to trust the new certificate. If the CP partner is using AD FS 2.0, the following will apply.

On the CP partner AD FS 2.0 server:    a. Launch AD FS 2.0 Management from the Administrative Tools menu
    b. Expand Trust Relationships, select Relying Party Trusts, and select the trust that was created for you
    c. Right-click the trust name and select Properties    d. Select the Encryption tab and click Browse... to select the new Token-Decrypting certificate
    e. Click OK


4. Add the new Token-Decrypting certificate    a. Launch AD FS 2.0 Management from the Administrative Tools menu
    b. Expand Service and select 
Certificates    c. In the Actions pane, click Add Token-Decrypting certificate...
    d. You will be presented with a list of certificates that are valid for Token-Decrypting. If you find that your new certificate is not being presented in the list, you need to go back and make sure that a. the certificate is in the local computer Personal store with private key associated, and b. the certificate has the Key Encipherment KU.
    e. Select your new Token-Decrypting certificate and click 
OK

* Note: Be careful when making your certificate selection. Your old Token-Decrypting certificate and new Token-Decrypting certificate might have the same subject name and/or friendly name, and this may make it difficult to differentiate between the two certificates. When in doubt, use thumbprint matching (see theThumbprint Matching section at the end of this article).



5. ACL the private key to allow Read access to the AD FS 2.0 service account    a. When you add a new Token-Decrypting certificate, you receive a warning reading: "Ensure that the private key for the chosen certificate is accessible to the service account for this Federation Service on each server in the farm":


   b. Click StartRun, type MMC.exe, and press Enter    c. Click File, Add/Remove Snap-in    d. Double-click Certificates    e. Select Computer account and click Next    f. Select Local computer and click Finish    g. Expand Certificates (Local Computer), expand Personal, and selectCertificates
    h. Right-click your new Token-Decrypting certificate, select All Tasks, and select Manage Private Keys
    i. Add Read access for your AD FS 2.0 service account and click OK
    j. Close the Certificates MMC

6. Set the new Token-Decrypting certificate as Primary    a. With the Certificates node in AD FS 2.0 Management selected, you should now see two certificates listed under Token-Decrypting:
        i.  Your old Token-Decrypting certificate
        ii. Your new Token-Decrypting certificate
    b. Select your new Token-Decrypting certificate, right-click, and select Set as primary    c. Leave the old certificate as secondary for rollover purposes. You should plan to remove the old certificate once you are confident it is no longer needed for rollover, or when the certificate has expired.
            i. Current users' SSO sessions are signed and possibly also encrypted using the OLD certificate
            ii. Current AD FS 2.0 Proxy Trust relationships utilize tokens that are signed and encrypted using the OLD certificate



7. Test the new Token-Decrypting certificate by having your CP partners send you an encrypted SAML assertion

More Information


Thumbprint Matching

1. View the properties of the certificate (double-click the certificate in the Certificates MMC or in Windows Explorer. Within an application interface, you may be presented with a control to View Certificate or similar).
2. Select the Details tab
3. Scroll down to the Thumbprint property and select it:



4. Take note of the first 4 characters and the last 4 characters (this usually gives us a good idea of thumbprint uniqueness)
    Example from the screenshot above: 92 e3 and d8 6c

5. Repeat steps 1-4 on another certificate and compare the noted values


Were you looking for AD FS 1.x information regarding certificate replacement?

AD FS 1.0 and 1.1: How to Replace the SSL, Token-Signing, and Federation Server Proxy Certificates -http://social.technet.microsoft.com/wiki/contents/articles/ad-fs-1-0-and-1-1-how-to-replace-the-ssl-token-signing-and-federation-server-proxy-certificates.aspx

Have you recently enabled AutoCertificateRollover and you need to immeditately self-sign new Token-Signing and Token-Decrypting certificates?

AD FS 2.0: How to Enable and Immediately Use AutoCertificateRollover -http://social.technet.microsoft.com/wiki/contents/articles/ad-fs-2-0-how-to-enable-and-immediately-use-autocertificaterollover.aspx