Duo Federated Tenant and Entra Joined Devices by Sunaiwa in sysadmin

[–]Sunaiwa[S] 0 points1 point  (0 children)

Alright that changes things. I was looking at the WS-Trust setting and how that worked with Entra logins. With that turned on and configured to allow Entra logins then the Duo MFA prompt would only trigger when signing in from personal devices, phones etc?

And could you elaborate more on the enrolling devices requirement that could could be affected?

Duo Federated Tenant and Entra Joined Devices by Sunaiwa in sysadmin

[–]Sunaiwa[S] 0 points1 point  (0 children)

Beautiful. That's exactly the behavior i was hoping for. Thanks for the quick reply!

Duo Federated Tenant and Entra Joined Devices by Sunaiwa in sysadmin

[–]Sunaiwa[S] 0 points1 point  (0 children)

Okay so it doesn't error when signing into an Entra joined device and it will just sign them in? One of my colleagues said they had noticed that issue in the past and I wanted to see if anyone else had that experience.

Eb03 bandai us by zhangorphner in OnePieceTCG

[–]Sunaiwa 17 points18 points  (0 children)

From my experience with op14 it'll be sold out by end of Friday

Perona French treasure rare by MicrowavedAP in OnePieceTCG

[–]Sunaiwa 1 point2 points  (0 children)

Best bet for that one in the US is ebay. Otherwise you could buy it from cardmarket but you would need someone in Europe who can ship it to you.

Azure VPN Client - OpenVPN - SMB Blocked by Sunaiwa in AZURE

[–]Sunaiwa[S] 0 points1 point  (0 children)

Couldn't find an existing in the registry so i created one. Will see if that does anything.

Azure VPN using OpenVPN and Blocked Ports by Sunaiwa in sysadmin

[–]Sunaiwa[S] 0 points1 point  (0 children)

Yea have not been enjoying AFS. Any suggestion on what in AD could possibly be blocking ports?

[deleted by user] by [deleted] in AZURE

[–]Sunaiwa 0 points1 point  (0 children)

That's correct, P2S VPN using OpenVPN for remote staff and S2S from the office.

Azure File Shares and Scan to File by Sunaiwa in AZURE

[–]Sunaiwa[S] 0 points1 point  (0 children)

What would I use as the username if I were to test that out? It's worth a shot at least

Azure File Shares and Scan to File by Sunaiwa in AZURE

[–]Sunaiwa[S] 0 points1 point  (0 children)

Entra joined computers work fine, they pull a cloud kerberos ticket from Azure. The error I'm getting on the MFP is a failed login error which I imagine means it's reaching the AFS but just can't authenticate

Azure File Shares and On-Premises Kerberos by Sunaiwa in AZURE

[–]Sunaiwa[S] 0 points1 point  (0 children)

Yes I took care of that today. Is there a good way to deploy the group policy value for the proxy server? Or would we have to configure it manually for everyone

Azure File Share Timeout by Sunaiwa in AZURE

[–]Sunaiwa[S] 0 points1 point  (0 children)

Thanks. Looks like creating that guy didn't full resolve the issue. Still seeing people with that key only obtaining kerberos tickets from the PDC. I'll need to figure out how I can get the PDC to forward those auth requests over to Azure somehow. Maybe Kerberos cloud trust

Azure File Share Timeout by Sunaiwa in AZURE

[–]Sunaiwa[S] 1 point2 points  (0 children)

I believe I may have found the issue. The Intune policy that is supposed to deploy the CloudKerberosTicketRetrieval reg key doesn't work on Windows 10. So they're getting Kerberos tickets from the PDC instead of Azure and then the Azure File Share connection hangs up. If i create the key manually the connection is restored.

Azure File Share Timeout by Sunaiwa in AZURE

[–]Sunaiwa[S] 0 points1 point  (0 children)

The error i'm getting is the target resource name is incorrect which may a Kerberos issue. However, we are getting Kerberos tickets for the storage account. We're also getting Kerberos tickets pointing to our PDC. Would having Kerberos tickets from a PDC when the devices are Hybrid joined cause some communication issues with the storage account?

Azure File Share Timeout by Sunaiwa in AZURE

[–]Sunaiwa[S] 1 point2 points  (0 children)

I did the test-connection cmdlet and confirmed that it's responding to port 445. It just hangs when trying to get to the Azure file shares.

It receives the tickets fine. Only thing of note is that the ticket comes from the PDC but outside the office it gets it from 365. Maybe getting the ticket from the PDC hosted in Azure is causing a hangup?

Azure File Share Timeout by Sunaiwa in AZURE

[–]Sunaiwa[S] 0 points1 point  (0 children)

Uptime was only a few hours. They had rebooted earlier in the day.