Event ID - 639

Event Id639
SourceMicrosoft-Windows-ADFS
DescriptionThe Federation Service encountered an error while loading the trust policy. An account partner is misconfigured. The AllowedTrustedWindowsDomains field is configured for an account partner for which Windows trust is not enabled. Field: AllowedTrustedWindowsDomains If this error occurs during startup of the Federation Service, the Federation Service will be not be able to start, and all requests to the Federation Service will fail until the configuration is corrected. If this error occurs while the Federation Service is running, the Federation Service will continue to use the last trust policy that was loaded successfully. User Action This error should occur only if the trust policy file has been modified without use of the AD FS administrative tools. Either enable Windows trust on the account partner or remove the AllowedTrustedWindowsDomains field.
Event Information According to Microsoft :

Cause :

This event is logged when the Federation Service encountered an error while loading the trust policy.

Resolution :

Review the Windows trust setting

This error occurs only if the trust policy file has been modified without the use of the Active Directory Federation Services snap-in.

Either select the Windows trust check box on the account partner or remove the AllowedTrustedWindowsDomains field from the trust policy file.

To perform this procedure, you must be a member of the local Administrators group, or you must have been delegated the appropriate authority.

To configure an account partner to use Windows trust using the Active Directory Federation Services snap-in:
  1. On the federation server, click Start , point to Administrative Tools , and then click Active Directory Federation Services .
  2. Double-click Federation Service , double-click Trust Policy , double-click Partner Organizations , and then double-click Account Partners .
  3. Right-click the account partner that you want to configure to use Windows trust, and then click Properties .
  4. On the Windows Trust tab, click Use Windows trust relationship .
  5. In Trusted Active Directory domains and forests , do one of the following, and then click OK :
  • Click All Active Directory domains and forests if you want to allow users in all trusted domains in the account partner forest and in any forest that is trusted by the account partner forest, and then click OK .
  • Click Specified Active Directory domains and forests (press ENTER to separate entries) if you want to specify only the domains where you want to allow federated access. Type a domain name, press ENTER, and then repeat this action to add each domain in the account partner forest and in any other trusted forests for the users that you want to grant access to resources.
Verify :

Verify that you can access the Active Directory Federation Services (AD FS)-enabled application from a client browser and that the resource can be accessed.
Reference LinksEvent ID 639 from Source Microsoft-Windows-ADFS

Catch threats immediately

We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.

See what we caught

Did this information help you to resolve the problem?

Yes: My problem was resolved.
No: The information was not helpful / Partially helpful.