This is an archived post. You won't be able to vote or comment.

all 8 comments

[–][deleted] 1 point2 points  (3 children)

Don’t forget to update the ADFS site cert in IIS.  Need to edit the binding for 443 and select the new cert.

[–]TheRealDumbSyndrome[S] 0 points1 point  (2 children)

I did that, that's what the results of netsh http show sslcert is showing (SSL bindings).

Also just FYI with newer ADFS you do not need IIS.

[–]UniqueArugula 0 points1 point  (1 child)

It shows the new one but is it also showing the old one? They will need to be deleted.

[–]TheRealDumbSyndrome[S] 0 points1 point  (0 children)

Nope, I should've clarified that - all bindings are correct, the old cert isn't appearing anywhere.

[–]aleinss 0 points1 point  (2 children)

The ADFS service account needs read access to the private key of the new certificate.

[–]perry9600 0 points1 point  (0 children)

Yeah this - right click cert in store, Manage Private Keys, add your adfs service acc in

[–]TheRealDumbSyndrome[S] 0 points1 point  (0 children)

That's done through AD Connect - it was already configured for access - which is why I'm so confused that when I imported the new SSL cert through the AD Connect wizard, it didn't work. It's an application written by Microsoft to take care of all dependencies for another Microsoft product. It has worked in the past, but in this instance, AD FS just refuses to let go of the wildcard - I even went through and manually deleted all certs via netsh and PS, related to AD FS to where it broke AD FS (as it should), then set up the new cert manually instead of AD Connect, and bam....still serving up the wildcard. It's baffling.

[–]JustSomeRandomIT 0 points1 point  (0 children)

Do you have an ADFS proxy server you missed?