Event Id | 128 |
Source | Microsoft-Windows-ADFS |
Description | The AD FS Web Agent Authentication Service was not able to start. The authentication service has not been configured to run as a principal that has been granted the ""Impersonate a client after authentication"" privilege (SeImpersonatePrivilege). Users will not be able to access protected resources until the authentication service can be restarted. User Action Either grant the AD FS authentication service principal the ""Impersonate a client after authentication"" privilege or configure the service to run as a principal that has already been granted the ""Impersonate a client after authentication"" privilege. (For example, configure the authentication service to run as LocalSystem.) This privilege is granted by default to the SERVICE group, but on a hardened server it may be necessary to grant the privilege explicitly. |
Event Information | According to Microsoft : Cause : This event is logged when the AD FS Web Agent Authentication Service was not able to start. Resolution : Configure the AD FS Web Agent Authentication Service with the Impersonate a client after authentication privilege Add the account that is specified on the Log On tab of the AD FS Web Agent Authentication Service to the AD FS-enabled Web server computer using the Local Security Policy snap-in. Using this snap-in, either grant the account the Impersonate a client after authentication privilege or configure the service to run as an account that has already been granted the Impersonate a client after authentication privilege. For example, configure the authentication service to run as LocalSystem. To perform this procedure, you must be a member of the local Administrators group, or you must have been delegated the appropriate authority. To grant an account the "Act as part of the operating system" privilege:
Verify that you can access the Active Directory Federation Services (AD FS)-enabled application from a client browser and that the resource can be accessed with the appropriate authorization. If you cannot access the application successfully, verify that the Windows token-based agent is configured with correct URL values and that all configuration parameters contain valid values. To perform this procedure, you must be a member of the local Administrators group, or you must have been delegated the appropriate authority. To verify that the Windows token-based agent is configured with correct values:
|
Reference Links | Event ID 128 from Source Microsoft-Windows-ADFS |
Catch threats immediately
We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.