Microsoft. The fiercely competitive software giant is positioning its wares for cloud computing with software and services. The companys two cash cows operating. Download the latest from Windows, Windows Apps, Office, Xbox, Skype, Windows 10, Lumia phone, Edge Internet Explorer, Dev Tools more. Help for all Office apps. Set up your Office 365 subscription. Find howto articles and video tutorials. Contact our Answer Techs for assisted support. Run Microsoft Office Over Network For Good' title='Run Microsoft Office Over Network For Good' />Microsoft Silverlight library, learning resources, downloads, support, and community. Evaluate and find out how to install and use Silverlight. Certificate. Rollover state. On your AD FS server, open Power. Shell. Check that the Auto. Certificate. Rollover value is set to True. Get Adfsproperties. Note. If you are using AD FS 2. Add Pssnapin Microsoft. Adfs. Powershell. Step 2 Confirm that AD FS and Azure AD are in sync. On your AD FS server, open the Azure AD Power. Shell prompt, and connect to Azure AD. Note. You can download Azure AD Power. Shell here. Connect Msol. Service. Check the certificates configured in AD FS and Azure AD trust properties for the specified domain. Get Msol. Federation. Property Domain. Name lt domain. FL Source, Token. Signing. Certificate. If the thumbprints in both the outputs match, your certificates are in sync with Azure AD. Step 3 Check if your certificate is about to expire. In the output of either Get Msol. Federation. Property or Get Adfs. Certificate, check for the date under Not After. If the date is less than 3. Does not matter. Renew the token signing certificate automatically recommended You dont need to perform any manual steps if both of the following are true You have deployed Web Application Proxy, which can enable access to the federation metadata from the extranet. You are using the AD FS default configuration Auto. Certificate. Rollover is enabled. Check the following to confirm that the certificate can be automatically updated. The AD FS property Auto. Certificate. Rollover must be set to True. This indicates that AD FS will automatically generate new token signing and token decryption certificates, before the old ones expire. The AD FS federation metadata is publicly accessible. Check that your federation metadata is publicly accessible by navigating to the following URL from a computer on the public internet off of the corporate network https yourFSnamefederationmetadata2. FSnameis replaced with the federation service host name your organization uses, such as fs. If you are able to verify both of these settings successfully, you do not have to do anything else. Example https fs. Renew the token signing certificate manually You may choose to renew the token signing certificates manually. For example, the following scenarios might work better for manual renewal Token signing certificates are not self signed certificates. The most common reason for this is that your organization manages AD FS certificates enrolled from an organizational certificate authority. Network security does not allow the federation metadata to be publicly available. In these scenarios, every time you update the token signing certificates, you must also update your Office 3. Power. Shell command, Update Msol. Federated. Domain. Step 1 Ensure that AD FS has new token signing certificates. Non default configuration. If you are using a non default configuration of AD FS where Auto. Certificate. Rollover is set to False, you are probably using custom certificates not self signed. For more information about how to renew the AD FS token signing certificates, see Guidance for customers not using AD FS self signed certificates. Federation metadata is not publicly available. On the other hand, if Auto. Certificate. Rollover is set to True, but your federation metadata is not publicly accessible, first make sure that new token signing certificates have been generated by AD FS. Confirm you have new token signing certificates by taking the following steps Verify that you are logged on to the primary AD FS server. Check the current signing certificates in AD FS by opening a Power. Shell command window, and running the following command PS C Get ADFSCertificate Certificate. Type token signing. Note. If you are using AD FS 2. Add Pssnapin Microsoft. Adfs. Powershell first. Look at the command output at any certificates listed. If AD FS has generated a new certificate, you should see two certificates in the output one for which the Is. Primary value is True and the Not. After date is within 5 days, and one for which Is. Primary is False and Not. After is about a year in the future. If you only see one certificate, and the Not. After date is within 5 days, you need to generate a new certificate. To generate a new certificate, execute the following command at a Power. Shell command prompt PS C Update ADFSCertificate Certificate. Type token signing. Verify the update by running the following command again PS C Get ADFSCertificate Certificate. Type token signing. Two certificates should be listed now, one of which has a Not. After date of approximately one year in the future, and for which the Is. Primary value is False. Step 2 Update the new token signing certificates for the Office 3. Update Office 3. 65 with the new token signing certificates to be used for the trust, as follows. Open the Microsoft Azure Active Directory Module for Windows Power. Shell. Run credGet Credential. When this cmdlet prompts you for credentials, type your cloud service administrator account credentials. Run Connect Msol. Service Credential cred. This cmdlet connects you to the cloud service. Creating a context that connects you to the cloud service is required before running any of the additional cmdlets installed by the tool.