Wednesday, December 20, 2017

Custom installation of Azure AD Connect

Azure AD Connect Custom settings is used when you want more options for the installation. It is used if you have multiple forests or if you want to configure optional features not covered in the express installation. It is used in all cases where the express installation option does not satisfy your deployment or topology.+
Before you start installing Azure AD Connect, make sure to download Azure AD Connect and complete the pre-requisite steps in Azure AD Connect: Hardware and prerequisites. Also make sure you have required accounts available as described in Azure AD Connect accounts and permissions.+
If customized settings does not match your topology, for example to upgrade DirSync, see related documentation for other scenarios.+

Custom settings installation of Azure AD Connect

Express Settings

On this page, click Customize to start a customized settings installation.+

Install required components

When you install the synchronization services, you can leave the optional configuration section unchecked and Azure AD Connect sets up everything automatically. It sets up a SQL Server 2012 Express LocalDB instance, create the appropriate groups, and assign permissions. If you wish to change the defaults, you can use the following table to understand the optional configuration options that are available.+
Optional ConfigurationDescription
Use an existing SQL ServerAllows you to specify the SQL Server name and the instance name. Choose this option if you already have a database server that you would like to use. Enter the instance name followed by a comma and port number in Instance Name if your SQL Server does not have browsing enabled.
Use an existing service accountBy default Azure AD Connect uses a virtual service account for the synchronization services to use. If you use a remote SQL server or use a proxy that requires authentication, you need to use a managed service account or use a service account in the domain and know the password. In those cases, enter the account to use. Make sure the user running the installation is an SA in SQL so a login for the service account can be created. See Azure AD Connect accounts and permissions
Specify custom sync groupsBy default Azure AD Connect creates four groups local to the server when the synchronization services are installed. These groups are: Administrators group, Operators group, Browse group, and the Password Reset Group. You can specify your own groups here. The groups must be local on the server and cannot be located in the domain.

User sign-in

After installing the required components, you are asked to select your users single sign-on method. The following table provides a brief description of the available options. For a full description of the sign-in methods, see User sign-in.+
Single Sign On optionDescription
Password Hash SyncUsers are able to sign in to Microsoft cloud services, such as Office 365, using the same password they use in their on-premises network. The users passwords are synchronized to Azure AD as a password hash and authentication occurs in the cloud. See Password hash synchronization for more information.
Pass-through AuthenticationUsers are able to sign in to Microsoft cloud services, such as Office 365, using the same password they use in their on-premises network. The users password is passed through to the on-premises Active Directory controller to be validated.
Federation with AD FSUsers are able to sign in to Microsoft cloud services, such as Office 365, using the same password they use in their on-premises network. The users are redirected to their on-premises AD FS instance to sign in and authentication occurs on-premises.
Do not configureNeither feature is installed and configured. Choose this option if you already have a 3rd party federation server or another existing solution in place.
Enable Single Sign onThis options is available with both password sync and Pass-through authentication and provides a single sign on experience for desktop users on the corporate network. See Single sign-on for more information.
Note for AD FS customers this option is not available because AD FS already offers the same level of single sign on.
(if PTA is not released at the same time)
Sign On OptionThis options is available for password hash sync customers and provides a single sign on experience for desktop users on the corporate network.
See Single sign-on for more information.
Note for AD FS customers this option is not available because AD FS already offers the same level of single sign on.

Connect to Azure AD

On the Connect to Azure AD screen, enter a global admin account and password. If you selected Federation with AD FS on the previous page, do not sign in with an account in a domain you plan to enable for federation. A recommendation is to use an account in the default onmicrosoft.com domain, which comes with your Azure AD directory.+
This account is only used to create a service account in Azure AD and is not used after the wizard has completed.
User Sign in+
If your global admin account has MFA enabled, then you need to provide the password again in the sign-in popup and complete the MFA challenge. The challenge could be a providing a verification code or a phone call.
User Sign in MFA+
The global admin account can also have Privileged Identity Management enabled.+
If you receive an error and have problems with connectivity, then see Troubleshoot connectivity problems.+

Pages under the Sync section

Connect your directories

To connect to your Active Directory Domain Service, Azure AD Connect needs the forest name and credentials of an account with sufficient permissions.+
After entering the forest name and clicking Add Directory, a pop-up dialog appears and prompts you with the following options:+
OptionDescription
Use existing accountSelect this option if you want to provide an existing AD DS account to be used Azure AD Connect for connecting to the AD forest during directory synchronization. You can enter the domain part in either NetBios or FQDN format, that is, FABRIKAM\syncuser or fabrikam.com\syncuser. This account can be a regular user account because it only needs the default read permissions. However, depending on your scenario, you may need more permissions. For more information, see Azure AD Connect Accounts and permissions.
Create new accountSelect this option if you want Azure AD Connect wizard to create the AD DS account required by Azure AD Connect for connecting to the AD forest during directory synchronization. When this option is selected, enter the username and password for an enterprise admin account. The enterprise admin account provided will be used by Azure AD Connect wizard to create the required AD DS account. You can enter the domain part in either NetBios or FQDN format, that is, FABRIKAM\administrator or fabrikam.com\administrator.

Azure AD sign-in configuration

This page allows you to review the UPN domains present in on-premises AD DS and which have been verified in Azure AD. This page also allows you to configure the attribute to use for the userPrincipalName.+
Unverified domains
Review every domain marked Not Added and Not Verified. Make sure those domains you use have been verified in Azure AD. Click the Refresh symbol when you have verified your domains. For more information, see add and verify the domain+
UserPrincipalName - The attribute userPrincipalName is the attribute users use when they sign in to Azure AD and Office 365. The domains used, also known as the UPN-suffix, should be verified in Azure AD before the users are synchronized. Microsoft recommends to keep the default attribute userPrincipalName. If this attribute is non-routable and cannot be verified, then it is possible to select another attribute. You can for example select email as the attribute holding the sign-in ID. Using another attribute than userPrincipalName is known as Alternate ID. The Alternate ID attribute value must follow the RFC822 standard. An Alternate ID can be used with both password sync and federation. The attribute must not be defined in Active Directory as multi-valued, even if it only has a single value.+
Note+
When you enable Pass-through Authentication you must have at least one verified domain in order to continue through the wizard.+
Warning+
Using an Alternate ID is not compatible with all Office 365 workloads. For more information, refer to Configuring Alternate Login ID.+

Domain and OU filtering

By default all domains and OUs are synchronized. If there are some domains or OUs you do not want to synchronize to Azure AD, you can unselect these domains and OUs.
DomainOU filtering
This page in the wizard is configuring domain-based and OU-based filtering. If you plan to make changes, then see domain-based filtering and ou-based filtering before you make these changes. Some OUs are essential for the functionality and should not be unselected.+
If you use OU-based filtering with Azure AD Connect version before 1.1.524.0, new OUs added later are synchronized by default. If you want the behavior that new OUs should not be synchronized, then you can configure it after the wizard has completed with ou-based filtering. For Azure AD Connect version 1.1.524.0 or after, you can indicate whether you want new OUs to be synchronized or not.+
If you plan to use group-based filtering, then make sure the OU with the group is included and not filtered with OU-filtering. OU filtering is evaluated before group-based filtering.+
It is also possible that some domains are not reachable due to firewall restrictions. These domains are unselected by default and have a warning.
Unreachable domains
If you see this warning, make sure that these domains are indeed unreachable and the warning is expected.+

Uniquely identifying your users

Select how users should be identified in your on-premises directories

The Matching across forests feature allows you to define how users from your AD DS forests are represented in Azure AD. A user might either be represented only once across all forests or have a combination of enabled and disabled accounts. The user might also be represented as a contact in some forests.+
SettingDescription
Users are only represented once across all forestsAll users are created as individual objects in Azure AD. The objects are not joined in the metaverse.
Mail attributeThis option joins users and contacts if the mail attribute has the same value in different forests. Use this option when your contacts have been created using GALSync. If this option is chosen, User objects whose Mail attribute aren't populated will not be synchronized to Azure AD.
ObjectSID and msExchangeMasterAccountSID/ msRTCSIP-OriginatorSidThis option joins an enabled user in an account forest with a disabled user in a resource forest. In Exchange, this configuration is known as a linked mailbox. This option can also be used if you only use Lync and Exchange is not present in the resource forest.
sAMAccountName and MailNickNameThis option joins on attributes where it is expected the sign-in ID for the user can be found.
A specific attributeThis option allows you to select your own attribute. If this option is chosen, User objects whose (selected) attribute aren't populated will not be synchronized to Azure AD. Limitation: Make sure to pick an attribute that already can be found in the metaverse. If you pick a custom attribute (not in the metaverse), the wizard cannot complete.

Select how users should be identified with Azure AD - Source Anchor

The attribute sourceAnchor is an attribute that is immutable during the lifetime of a user object. It is the primary key linking the on-premises user with the user in Azure AD.+
SettingDescription
Let Azure manage the source anchor for meSelect this option if you want Azure AD to pick the attribute for you. If you select this option, Azure AD Connect wizard applies the sourceAnchor attribute selection logic described in article section Azure AD Connect: Design concepts - Using msDS-ConsistencyGuid as sourceAnchor. The wizard informs you which attribute has been picked as the Source Anchor attribute after Custom installation completes.
A specific attributeSelect this option if you wish to specify an existing AD attribute as the sourceAnchor attribute.
Since the attribute cannot be changed, you must plan for a good attribute to use. A good candidate is objectGUID. This attribute is not changed, unless the user account is moved between forests/domains. In a multi-forest environment where you move accounts between forests, another attribute must be used, such as an attribute with the employeeID. Avoid attributes that would change when a person marries or change assignments. You cannot use attributes with an @-sign, so email and userPrincipalName cannot be used. The attribute is also case-sensitive so when you move an object between forests, make sure to preserve the upper/lower case. Binary attributes are base64-encoded, but other attribute types remain in its unencoded state. In federation scenarios and some Azure AD interfaces, this attribute is also known as immutableID. More information about the source anchor can be found in the design concepts.+

Sync filtering based on groups

The filtering on groups feature allows you to sync only a small subset of objects for a pilot. To use this feature, create a group for this purpose in your on-premises Active Directory. Then add users and groups that should be synchronized to Azure AD as direct members. You can later add and remove users to this group to maintain the list of objects that should be present in Azure AD. All objects you want to synchronize must be a direct member of the group. Users, groups, contacts, and computers/devices must all be direct members. Nested group membership is not resolved. When you add a group as a member, only the group itself is added and not its members.+
Warning+
This feature is only intended to support a pilot deployment. Do not use it in a full-blown production deployment.+
In a full-blown production deployment, it is going to be hard to maintain a single group with all objects to synchronize. Instead you should use one of the methods in Configure filtering.+

Optional Features

This screen allows you to select the optional features for your specific scenarios.+
Warning+
If you currently have DirSync or Azure AD Sync active, do not activate any of the writeback features in Azure AD Connect.+
Optional FeaturesDescription
Exchange Hybrid DeploymentThe Exchange Hybrid Deployment feature allows for the co-existence of Exchange mailboxes both on-premises and in Office 365. Azure AD Connect is synchronizing a specific set of attributes from Azure AD back into your on-premises directory.
Exchange Mail Public FoldersThe Exchange Mail Public Folders feature allows you to synchronize mail-enabled Public Folder objects from your on-premises Active Directory to Azure AD.
Azure AD app and attribute filteringBy enabling Azure AD app and attribute filtering, the set of synchronized attributes can be tailored. This option adds two more configuration pages to the wizard. For more information, see Azure AD app and attribute filtering.
Password synchronizationIf you selected federation as the sign-in solution, then you can enable this option. Password synchronization can then be used as a backup option. For additional information, see Password synchronization.
If you selected Pass-through Authentication this option can also be enabled to ensure support for legacy clients and as a backup option. For additional information, see Password synchronization.
Password writebackBy enabling password writeback, password changes that originate in Azure AD is written back to your on-premises directory. For more information, see Getting started with password management.
Group writebackIf you use the Office 365 Groups feature, then you can have these groups represented in your on-premises Active Directory. This option is only available if you have Exchange present in your on-premises Active Directory. For more information, see Group writeback.
Device writebackAllows you to writeback device objects in Azure AD to your on-premises Active Directory for conditional access scenarios. For more information, see Enabling device writeback in Azure AD Connect.
Directory extension attribute syncBy enabling directory extensions attribute sync, attributes specified are synced to Azure AD. For more information, see Directory extensions.

Azure AD app and attribute filtering

If you want to limit which attributes to synchronize to Azure AD, then start by selecting which services you are using. If you make configuration changes on this page, a new service has to be selected explicitly by rerunning the installation wizard.+
Based on the services selected in the previous step, this page shows all attributes that are synchronized. This list is a combination of all object types being synchronized. If there are some particular attributes you need to not synchronize, you can unselect those attributes.+
Warning+
Removing attributes can impact functionality. For best practices and recommendations, see attributes synchronized.+

Directory Extension attribute sync

You can extend the schema in Azure AD with custom attributes added by your organization or other attributes in Active Directory. To use this feature, select Directory Extension attribute sync on the Optional Features page. You can select more attributes to sync on this page.+
For more information, see Directory extensions.+

Enabling Single sign on (SSO)

Configuring single sign-on for use with Password Synchronization or Pass-through authentication is a simple process that you only need to complete once for each forest that is being synchronized to Azure AD. Configuration involves two steps as follows:+
  1. Create the necessary computer account in your on-premises Active Directory.
  2. Configure the intranet zone of the client machines to support single sign on.
  3. +

Create the computer account in Active Directory

For each forest that has been added in Azure AD Connect, you will need to supply Domain Administrator credentials so that the computer account can be created in each forest. The credentials are only used to create the account and are not stored or used for any other operation. Simply add the credentials on the Enable Single sign on page of the Azure AD Connect wizard as shown:+
Note+
You can skip a particular forest if you do not wish to use Single sign on with that forest.+

Configure the Intranet Zone for client machines

To ensure that the client sign-ins automatically in the intranet zone you need to ensure that two URLs are part of the intranet zone. This ensures that the domain joined computer automatically sends a Kerberos ticket to Azure AD when it is connected to the corporate network. On a computer that has the Group Policy management tools.+
  1. Open the Group Policy Management tools
  2. Edit the Group policy that will be applied to all users. For example, the Default Domain Policy.
  3. Navigate to User Configuration\Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page and select Site to Zone Assignment List per the image below.
  4. Enable the policy, and enter the following two items in the dialog box.
    Value: `https://autologon.microsoftazuread-sso.com`  
    Data: 1  
    Value: `https://aadg.windows.net.nsatc.net`  
    Data: 1
    
  5. It should look similar to the following:
    Intranet Zones
  6. Click Ok twice.
  7. +

Configuring federation with AD FS

Configuring AD FS with Azure AD Connect is simple with just a few clicks. The following is required before the configuration.+
  • A Windows Server 2012 R2 or later server for the federation server with remote management enabled
  • A Windows Server 2012 R2 or later server for the Web Application Proxy server with remote management enabled
  • An SSL certificate for the federation service name you intend to use (for example sts.contoso.com)
  • +
Note+
You can update SSL certificate for your AD FS farm using Azure AD Connect even if you do not use it to manage your federation trust.+

AD FS configuration pre-requisites

To configure your AD FS farm using Azure AD Connect, ensure WinRM is enabled on the remote servers. In addition, go through the ports requirement listed in Table 3 - Azure AD Connect and Federation Servers/WAP.+

Create a new AD FS farm or use an existing AD FS farm

You can use an existing AD FS farm or you can choose to create a new AD FS farm. If you choose to create a new one, you are required to provide the SSL certificate. If the SSL certificate is protected by a password, you are prompted for the password.+
If you choose to use an existing AD FS farm, you are taken directly to the configuring the trust relationship between AD FS and Azure AD screen.+
Note+
Azure AD Connect can be used to manage only one AD FS farm. If you have existing federation trust with Azure AD configured on the selected AD FS farm, the trust will be re-created again from scratch by Azure AD Connect.+

Specify the AD FS servers

Enter the servers that you want to install AD FS on. You can add one or more servers based on your capacity planning needs. Join all servers to Active Directory before you perform this configuration. Microsoft recommends installing a single AD FS server for test and pilot deployments. Then add and deploy more servers to meet your scaling needs by running Azure AD Connect again after initial configuration.+
Note+
Ensure that all your servers are joined to an AD domain before you do this configuration.+

Specify the Web Application Proxy servers

Enter the servers that you want as your Web Application proxy servers. The web application proxy server is deployed in your DMZ (extranet facing) and supports authentication requests from the extranet. You can add one or more servers based on your capacity planning needs. Microsoft recommends installing a single Web application proxy server for test and pilot deployments. Then add and deploy more servers to meet your scaling needs by running Azure AD Connect again after initial configuration. We recommend having an equivalent number of proxy servers to satisfy authentication from the intranet.+
Note+
  • If the account you use is not a local admin on the AD FS servers, then you are prompted for admin credentials.
  • Ensure that there is HTTP/HTTPS connectivity between the Azure AD Connect server and the Web Application Proxy server before you run this step.
  • Ensure that there is HTTP/HTTPS connectivity between the Web Application Server and the AD FS server to allow authentication requests to flow through.
  • You are prompted to enter credentials so that the web application server can establish a secure connection to the AD FS server. These credentials need to be a local administrator on the AD FS server.+

    Specify the service account for the AD FS service

    The AD FS service requires a domain service account to authenticate users and lookup user information in Active Directory. It can support two types of service accounts:+
    • Group Managed Service Account - Introduced in Active Directory Domain Services with Windows Server 2012. This type of account provides services, such as AD FS, a single account without needing to update the account password regularly. Use this option if you already have Windows Server 2012 domain controllers in the domain that your AD FS servers belong to.
    • Domain User Account - This type of account requires you to provide a password and regularly update the password when the password changes or expires. Use this option only when you do not have Windows Server 2012 domain controllers in the domain that your AD FS servers belong to.
    • +
    If you selected Group Managed Service Account and this feature has never been used in Active Directory, you are prompted for Enterprise Admin credentials. These credentials are used to initiate the key store and enable the feature in Active Directory.+
    Note+
    Azure AD Connect performs a check to detect if the AD FS service is already registered as a SPN in the domain. AD DS will not allow duplicate SPN’s to be registered at once. If a duplicate SPN is found, you will not be able to proceed further until the SPN is removed.+

    Select the Azure AD domain that you wish to federate

    This configuration is used to setup the federation relationship between AD FS and Azure AD. It configures AD FS to issue security tokens to Azure AD and configures Azure AD to trust the tokens from this specific AD FS instance. This page only allows you to configure a single domain in the initial installation. You can configure more domains later by running Azure AD Connect again.+

    Verify the Azure AD domain selected for federation

    When you select the domain to be federated, Azure AD Connect provides you with necessary information to verify an unverified domain. See Add and verify the domain for how to use this information.+
    Note+
    AD Connect tries to verify the domain during the configure stage. If you continue to configure without adding the necessary DNS records, the wizard is not able to complete the configuration.+

    Configure and verify pages

    The configuration happens on this page.+
    Note+
    Before you continue installation and if you configured federation, make sure that you have configured Name resolution for federation servers.+

    Staging mode

    It is possible to setup a new sync server in parallel with staging mode. It is only supported to have one sync server exporting to one directory in the cloud. But if you want to move from another server, for example one running DirSync, then you can enable Azure AD Connect in staging mode. When enabled, the sync engine import and synchronize data as normal, but it does not export anything to Azure AD or AD. The features password sync and password writeback are disabled while in staging mode.+
    While in staging mode, it is possible to make required changes to the sync engine and review what is about to be exported. When the configuration looks good, run the installation wizard again and disable staging mode. Data is now exported to Azure AD from this server. Make sure to disable the other server at the same time so only one server is actively exporting.+
    For more information, see Staging mode.+

    Verify your federation configuration

    Azure AD Connect verifies the DNS settings for you when you click the Verify button.+
    Intranet connectivity checks+
    • Resolve federation FQDN: Azure AD Connect checks if the federation FQDN can be resolved by DNS to ensure connectivity. If Azure AD Connect cannot resolve the FQDN, the verification will fail. Ensure that a DNS record is present for the federation service FQDN in order to successfully complete the verification.
    • DNS A record: Azure AD Connect checks if there is an A record for your federation service. In the absence of an A record, the verification will fail. Create an A record and not CNAME record for your federation FQDN in order to successfully complete the verification.
    • +
    Extranet connectivity checks+
    • Resolve federation FQDN: Azure AD Connect checks if the federation FQDN can be resolved by DNS to ensure connectivity.
    • +
    In addition, perform the following verification steps:+
    • Validate that you can sign in from a browser from a domain joined machine on the intranet: Connect to https://myapps.microsoft.com and verify the sign-in with your logged in account. The built-in AD DS administrator account is not synchronized and cannot be used for verification.
    • Validate that you can sign in from a device from the extranet. On a home machine or a mobile device, connect to https://myapps.microsoft.com and supply your credentials.
    • Validate rich client sign-in. Connect to https://testconnectivity.microsoft.com, choose the Office 365 tab and chose the Office 365 Single Sign-On Test.

    Fixing problems with directory synchronization for Office 365

    With directory synchronization, you can continue to manage users and groups on-premises and synchronize additions, deletions, and changes to the cloud. But setup is a little complicated and it can sometimes be difficult to identify the source of problems. We have resources to help you hunt down potential issues and fix them.

    How do I know if something is wrong?

    The first indication that something is wrong is when the DirSync Status tile in the Office 365 admin center indicates there is a problem:
    The DirSync Status tile in admin center preview
    You will also receive a mail (to the alternate email and to your admin email) from Office 365 that indicates your tenant has encountered directory synchronization errors. For details see Identify directory synchronization errors in Office 365.

    How do I get Azure Active Directory Connect tool?

    In the Office 365 admin center, navigate to Users > Active users. Click the More menu and select Directory synchronization.
    In the More menu, choose Directory synchronization
    In the old Office 365 admin center, navigate to USERS >Active Users, and select Set up next to Active Directory synchronization.
    Choose Set up next to Active Directory synchronization
    Follow the instructions in the wizard to download Azure AD Connect.
    If you are still using Azure Active Directory Sync (DirSync), take a look at How to troubleshoot Azure Active Directory Sync Tool installation and Configuration Wizard error messages in Office 365 for information about the system requirements to install dirsync, the permissions you need, and how to troubleshoot common errors.
    To update from Azure Active Directory Sync to Azure AD Connect, see the upgrade instructions.

    Common causes of problems with directory synchronization in Office 365

    SymptomTop solution or solutions
    Synchronized objects aren’t appearing or updating online, or I’m getting synchronization error reports from the Service. Identity synchronization and duplicate attribute resiliency
    I have an alert in the Office 365 admin center, or am receiving automated emails that there hasn’t been a recent synchronization event
    Passwords aren’t synchronizing, or I’m seeing an alert in the Office 365 admin center that there hasn’t been a recent password synchronization Implementing password synchronization with Azure AD Connect sync
    I'm seeing an alert that Object quota exceeded We have a built-in object quota to help protect the service. If you have too many objects in your directory that need to sync to Office 365, you’ll have to contact Support to increase your quota.
    I need to know which attributes are synchronized You can find a list of all the attributes that are synced between on-premises and the cloud right here.
    I can’t manage or remove objects that were synchronized to the cloud Are you ready to manage objects in the cloud only? Or is there an object that was deleted on-premises, but is stuck in the cloud? Take a look at this Troubleshooting Errors during synchronization and support article for guidance on how to resolve these issues.
    I got an error message that my company has exceeded the number of objects that can be synchronized You can read more about the issue here.

    Other resources

    Diagnostic tools

    IDFix tool is used to perform discovery and remediation of identity objects and their attributes in an on-premises Active Directory environment in preparation for migration to Office 365. IDFix is intended for the Active Directory administrators responsible for DirSync with the Office 365 service. Download the IDFix tool from the Microsoft download center.

    Thursday, December 14, 2017

    Auto CAD Subscription Licensing Error: "Establish an Internet connection to continue"

    Issue:
    When you start an Autodesk product for Windows, you see the following error message:
    Establish an Internet connection to continue
    The Autodesk license server cannot be found. This problem can be caused by a variety of issues, including:
    ·         Internet connectivity has been lost.
    ·         The Autodesk license server is temporarily unavailable.

    Causes:
    There are many reasons for Internet connection problems. The solutions for the most common causes are listed below.
    Solution:
    Solution 1: For Autodesk 2014 and 2015 products, install the licensing security hotfix
    1.      If you have a 2014 or 2015 product and haven’t applied the Autodesk POODLE hotfix, do so now.
    2.      Follow the steps in Security Settings under Solution 2.

    Solution 2: Check your browser settings LAN settings (required in all cases)

    1.      Find the LAN settings in your browser.
    ·         In Chrome, go to Settings > Advanced > System > Open Proxy Settings > Connections > LAN Settings.
    ·         In Internet Explorer, go to Tools > Internet Options > Connections > LAN Settings.
    Alternatively, select Internet Options in the Network control panel and click LAN settings in the Internet Properties dialog.
    2.      Confirm that Automatically detect settings is not selected. The dialog should look like this:
      

    Security settings (required if you've applied the POODLE hotfix in Solution 1 or have an Autodesk 2016 or later product.)
    1.      In your browser settings, find the setting for SSL (Secure Sockets Layer) 3.0.
    ·         In Chrome, go to Settings > Advanced > System > Open proxy settings > Advanced > Settings > Security.
    ·         In Internet Explorer, go to Tools > Internet Options > Advanced > Settings > Security.
    Alternatively, select Internet Options in the Network control panel and click the Advanced tab in the Internet Properties dialog.
    2.      Scroll down to Use SSL 3.0 and confirm that it is selected.

    Solution 3: Check your proxy server settings

    If your network firewall allows Internet access only through a proxy server, change the settings on your browser to allow access to the Autodesk licensing server.
    1.      Find the LAN settings in your browser.
    ·         In the Chrome menu, go to Settings > Advanced > System > Open Proxy Settings > Connections > LAN Settings.
    ·         In Internet Explorer, go to Tools > Internet Options > Connections > LAN Settings.
    Alternatively, select Internet Options in the Network control panel and click LAN settings in the Internet Properties dialog.
    2.      Under Proxy Server, make sure that Use A Proxy Server For Your LAN is selected
    3.      Click Advanced.
    4.      In the text box under Exceptions on the Proxy Settings dialog, enter these domain addresses.
    Important: if your network uses WPAD (Web Proxy Automatic Discovery) to configure proxies, enable proxy detection.  Autodesk licensing components disable WPAD proxy detection because automatic detection can degrade performance in networks without proxy servers.

    Solution 4: Uninstall any adware or malware on your computer

    One or more of the following may be on your computer. You can search the Internet for ways to uninstall them.
    ·         If Trovi Search Protect is installed on your computer, uninstall Trovi. Trovi is a browser hijacker that you may have installed along with legitimate software.
    ·         If Wajam is installed on your computer, uninstall Wajam. Wajam is adware that displays social media posts in search results.
    ·         If DNS Unlocker is installed on your computer, uninstall DNS Unlocker. DNS Unlocker is malware that displays pop-up ads and advertising banners. 

    Solution 5: Confirm that a required port on your computer is open

    1.      Install Windows Telnet.
    a.       Open a Command prompt window. (On Windows 10, right-click Start and select Command prompt.)
    b.      Enter the following at the Command prompt:
    ·         pkgmgr /iu:"TelnetClient"
    c.       If you see the User Account Control dialog, click Yes to accept.
    d.      Click Continue.
    e.       When the Command prompt appears again, the installation is complete.
    2.      Run Telnet.
    a.       Open a new Command prompt window.
    b.      Type the following into the Command prompt window:
    ·          telnet cur.autodesk.com 443 
    c.       If you connected successfully, you see a blinking cursor. If not, close the Command prompt window and try again. You may have to try several times.
    d.      Contact your system administrator if you still can’t connect.

    Solution 6: Try additional troubleshooting measures

    If the previous solutions don’t solve your problem, try each of the following, one at a time. Test for success before trying the next one.
    ·         Shut down your computer and log in to Windows again.
    ·         Check that the local time setting is accurate on the Date and Time control panel.
    ·         Check with your system administrator to find out if any of the following are blocking your connection.
    o    A proxy server
    This article lists the supported proxy configurations for a single-user access license in a secured proxy environment.
    ·         Firewall security settings
    ·         Antivirus software
    ·         Go to the following locations and remove the specified files:
    ·         C:\Users\\AppData\Roaming\Autodesk—Delete the ADUT folder.
    ·         C:\ProgramData\FLEXnet—Delete the three files whose names begin with adskflex.
    ·         C:\Users\\AppData\Local\Autodesk\Web Services—Delete LoginState.xml.
    Note: If you don’t see a file, it may be hidden. To make it visible, follow these instructions.
    ·         If you have administrator privileges on your computer:
    ·         Right-click the product icon and select Run As Administrator.
    ·         Close the program and reopen it normally.

    Wednesday, December 6, 2017

    Configure email settings for the workflow system [AX 2012]

    Applies To: Microsoft Dynamics AX 2012 R3, Microsoft Dynamics AX 2012 R2, Microsoft Dynamics AX 2012 Feature Pack, Microsoft Dynamics AX 2012
    You can configure Microsoft Dynamics AX to send email messages to users when workflow-related events occur. For example, email messages can be sent to users when documents are assigned to them for approval. Complete the procedures in this topic to configure email settings for the workflow system.

    This task is part of a bigger process

    This topic explains how to configure email settings for the workflow system. This is step 4 in the following diagram. Configuring the email functionality in Microsoft Dynamics AX is the bigger process that you must complete. For more information about this process, see Configure email functionality in Microsoft Dynamics AX.
    How to configure email functionality

    Enable users to receive workflow-related email messages

    The first step in the process is to enable users to receive workflow-related email messages. The following procedure explains how to do this. You must complete this procedure for each Microsoft Dynamics AX user.
    NoteNote
    If you’d rather have users configure their own email settings, instruct users to do the following:
    1. Open the Microsoft Dynamics AX client.
    2. Click File > Tools > Options.
    3. Complete steps 5 – 8 in the following procedure.
    1. Open the Microsoft Dynamics AX client.
    2. Click System administration > Common > Users > Users.
    3. Select a user.
    4. Click Options.
    5. In the E-mail field, verify the email address of the selected user.
    6. Click Notifications.
    7. In the Workflow notifications section, specify how you want the user to be notified about workflow-related events. To do so, follow these steps:
      1. In the Line-item notification type list, specify how you want the user to receive workflow notifications for line items.
        • Grouped – Notifications for line items are grouped into a single email message.
        • Individual – An email message is sent for each line item.
      2. If you want the user to receive notifications in the Microsoft Dynamics AX client, select the Show notifications in the Microsoft Dynamics AX client check box.
        If you select the Show notifications in the Microsoft Dynamics AX client check box, you can also specify whether you want the user to receive notifications as pop-up messages. If you want the user to receive pop-up messages, select the Show pop-ups for notifications check box.
      3. If you want the user to receive notifications as email, select the Send notifications in email check box.
    8. Click Close.
    9. The Users page is redisplayed. Select another user and repeat steps 4-8.

    Determine how many email templates you need to create for the workflow system

    Determine how many email templates you need to create for the workflow system. You can create multiple email templates, or just two email templates (as explained below). Your business needs will help you determine how many email templates you need to create. For example, you may want to:
    • Create an email template for every workflow.
    • Create an email template for every workflow type.
      In this scenario, all workflows of a certain type would use the same email template. See Workflow types for a list of all the types of workflows you can create.
    • Create two email templates.
      In this scenario, one email template would be used by all workflows that are used across the whole organization. The other email template would be used by all workflows that are company-specific. See Workflow types for more information about how each type of workflow is used.

    Create email templates

    After you have determined how many email templates to create, you can create the templates. For instructions on how to do this, see Configure email functionality in Microsoft Dynamics AX.

    Use placeholders

    When you create email templates, we recommend that you use placeholders. When email messages are generated, these placeholders will be replaced with specific text from the workflow.
    For example, suppose that you entered the placeholder %subject% in the email template. In this example, when email is generated and sent to users, that placeholder will be automatically replaced with the text found in the Work item subject field. Similarly, if you enter %message% in the email template, that placeholder will be replaced with the text found in the Work item instructions field.
    Placeholders will be replaced with this text.
    For more information about how to insert placeholders in email templates, see Configure email functionality in Microsoft Dynamics AX.

    Specify when each email template will be used

    When you configure the properties of a workflow, you can select the email template that should be used to generate email messages for the workflow. For step-by-step instructions, see Configure the properties of a workflow.
    Select an email template for the workflow
    If you do not select an email template when you configure a workflow, a default template will be used. You can specify which email template is the default template by completing the following procedures.

    Specify the default email template for organization-wide workflows

    Some workflows are used to process documents that are associated with your whole organization. Complete the following procedure to specify the default email template that will be used to generate notifications for organization-wide workflows.
    To view a list of organization-wide workflows, see Workflow types.
    1. Click System administration > Setup > Workflow > Workflow parameters.
    2. Select an email template from the list.
      The list will display email templates that were created when the Show system e-mails check box was marked in the E-mail templatesform.
    3. Click Close to save your changes.

    Specify the default email template for organization-specific workflows

    Some workflows are used to process documents that are associated with a specific organization, such as a legal entity. Complete the following procedure to specify the default email template that will be used to generate notifications for organization-specific workflows.
    To view a list of organization-specific workflows, see Workflow types.
    1. Click Organization administration > Setup > Workflow > Workflow parameters.
    2. Select an email template from the list.
      The list will display email templates that were created when the Show system e-mails check box was not marked in the E-mail templates form.
    3. Click Close to save your changes.