These proactive emails are geared towards ensuring that you are prepared for certificate replacement, if needed.
By default, AD FS 2.0 utilizes self-signed certificates for token-signing and token-decrypting. This feature is called AutoCertificateRollover, and you can ensure that this is enabled by examining a couple of items:
Add-PsSnapin Microsoft.Adfs.Powershell Get-AdfsProperties
Add-PsSnapin Microsoft.Adfs.Powershell
Get-AdfsProperties
3. In the output, find AutoCertificateRolloverEnabled and note if it is set to True or False. If it is set to True, then AD FS 2.0 is set to renew these certificates automatically for you. If it is set to False, you have manually disabled AutoCertificateRollover, and you intend to replace these certificates on your own.
Windows Azure AD will automatically pull new certificate information from your Federation Metadata XML (published by your Federation Service) in order to learn about your new certificates. No action is required as long as AutoCertificateRollover is enabled in AD FS 2.0.
Microsoft offers a push tool so that you are automatically pushing your Federation Metadata to Office 365 on a schedule. We recommend ALL of our identity federation customers run this tool as an added measure to ensure metadata freshness between your federation service and ours:
http://gallery.technet.microsoft.com/scriptcenter/Office-365-Federation-27410bdc
NOTE: The –SupportMultipleDomain parameter is ONLY needed if you have multiple top-level domains (TLDs) that are utilizing Federated authentication. If you have just one Federated top-level domain, do NOT utilize the –SupportMultipleDomain parameter Import-Module MsOnline Connect-MsolService Update-MsolFederatedDomain –DomainName “enter-your-Federated-domain-name-here” -SupportMultipleDomain
NOTE: The –SupportMultipleDomain parameter is ONLY needed if you have multiple top-level domains (TLDs) that are utilizing Federated authentication. If you have just one Federated top-level domain, do NOT utilize the –SupportMultipleDomain parameter
Import-Module MsOnline
Connect-MsolService
Update-MsolFederatedDomain –DomainName “enter-your-Federated-domain-name-here” -SupportMultipleDomain
3. Verify your metadata is fresh (certificate thumbprints match) by executing the following command:
Get-MsolFederationProperty –DomainName “enter-your-Federated-domain-name-here”
ONLY if you have DISABLED AutoCertificateRollover, you will need to manually replace the token-signing and token-decrypting certificates based on the following guidance: