Replies: 8 comments
-
Hi @Drakeii For information this is about "System" encryption. For information: the TCP flows between the different MFA servers are also encrypted in the same way. What do you mean by "The nodes are geographically far from each other"? As a general rule in the ADFS architecture, multiple servers are positioned for redundancy and for performance (large number of users). but are centralized. Can you look at the different points indicated. Thanks in advance for your feedback. redhook |
Beta Was this translation helpful? Give feedback.
-
Hi @redhook62 Thanks for the descriptive answer. I removed the key HKLM\Software\MFA\MFAID and restarted the service. I can see that both keys, MFAID as well as DelegatedAdminGroup contain the same value on every node. Still it would not work. I deleted the files system.db and config.db on the affected nodes and restarted the service, this did not help either. What I mean by "The nodes are geographically far from each other" is that 3 of the ADFS servers are relatively close to each other, all in EMEA region, and the 2 new ADFS servers are in APJ region, increasing response time between each other. Also, I noticed in the event logs one more event while restarting the service (during start) with Event ID 2000:
Exception rethrown at [0]: |
Beta Was this translation helpful? Give feedback.
-
Yes, this is corrected in the May release, for the weekend. And as for information in the registry, this will no longer exist in version 4, where you can choose your key... regards |
Beta Was this translation helpful? Give feedback.
-
Hi @redhook62 Thanks for the response and upcoming news. Kind regards |
Beta Was this translation helpful? Give feedback.
-
In some months... |
Beta Was this translation helpful? Give feedback.
-
Hi, @Drakeii can you google
This still seems to come from your new servers regards |
Beta Was this translation helpful? Give feedback.
-
Hi, @Drakeii have you tried this : Register-MFASystemMasterKey -Deploy regards |
Beta Was this translation helpful? Give feedback.
-
Hi @redhook62 Thanks for the hints. We have tried those as well, without success. Some settings were modified recently which affected the gMSA retrieving the keys. For the existing nodes it seems it was OK as it was probably cached, for the new ones it would fail, hence the cryptographic error log. However, on the primary node, after trying to add the newest server as a new node again, this time including an RSA Key reset, the command returned an error: In the event log, we would find a new event ID 2000: It seems there is an unhandled exception for the SChannel somewhere, reporting back to the system, putting the Service into "Faulty" state, which leads the service to refuse any further calls to it until it has been restarted. I would assume this is related to the gMSA using the wrong credentials when trying to retrieve the private key (after the change mentioned above) as this seems to lead to a Fatal error for SChannel: Restarting SChannel service on all servers seems to fix the issue, at least until the next unhandled exception occurs. Kind regards |
Beta Was this translation helpful? Give feedback.
-
Hi,
We have installed 2 new ADFS servers and joined them to the MFA farm as well. The initial installation would not register them automatically, hence we manually run the command on the new nodes:
Register-MFAComputer -ServerName "servername_to_add" -NoRSAKeyReset
We have also run the commands for Firewall Rules and Private Key ACL on each and every MFA/ADFS node, as stated in the Wiki - by the way, there is a typo in the command for ACL, missing one "c" in "access":
Set-MFAFirewallRules
Update-MFACertificatesAcessControlList
Firewall port is open, as Test-NetConnection -Port 5987 is successful between ADFS servers.
3 of the servers (that were in the farm previously) can retrieve the secret key for the users in MMC.
The two new servers, however, show an empty secret key for the users in MMC.
When trying to authenticate, the user GUI returns the error SECURITY ERROR: Invalid Key for User
On the AD FS server, MFA Service logs the following:
Event ID: 0
`(RSAEncryption Decrypt) : Crytographic error for user
The parameter is incorrect.
at System.Security.Cryptography.NCryptNative.DecryptDataOaep(SafeNCryptKeyHandle key, Byte[] data, String hashAlgorithm)
at System.Security.Cryptography.RSACng.Decrypt(Byte[] data, RSAEncryptionPadding padding)
at Neos.IdentityServer.MultiFactor.RSAEncryption.GetDecryptedKey(Byte[] encryptedBytes, String username)
`
Event ID: 666
Error decrypting value for Pass Phrase Encryption : Keyset does not exist
(Same for Administrator Pin, Default Users Pin and Mail Provider Account)
What else are we missing here?
Some additional info:
We are using Active Directory as storage
All nodes are running Windows server 2022
The nodes are geographically far from each other
Beta Was this translation helpful? Give feedback.
All reactions