How to Renew an Expired AD FS Certiticate

How to Renew an Expired AD FS Certiticate Leave a comment

Read this information to learn the way to renew expired certificates in Active Directory Federation Service (AD FS) and their WAP servers.

Step 0: Review the Problem Background and Overview

Earlier at this time (eighth April 2025), my supervisor instructed me that the certificates in our AD FS servers had expired. He had already bought a brand new publicly signed certificates.

So, my process was to renew the certificates within the AD FS servers.

When an AD FS certificates expires, the service stops, and customers can not entry it. Needless to say, resolving this drawback was a excessive precedence.

I’ve by no means carried out this process earlier than, so I did just a few net searches and located this text: ADFS: Changing the Certificate. The referenced article is nice, but it surely coated simply the steps to renew the AD FS certificates, not the WAP server certificates.

An additional search led me to one other article, – Replace ADFS/WAP SSL certificates – which confirmed me how to renew the WAP servers’ certificates.

While these referenced articles are nice, none supplied a complete step-by-step information to performing this all-important SysAdmin process. After efficiently renewing the certificates in my servers, I made a decision to doc the total steps for my readers.

Here are they’re:

Step 1: Get a New Publicly Signed Certificate

This step is clear, however I included it for completeness. You can order a certificates from any certificates supplier.

Meanwhile, it can be crucial to be sure that the certificates meets the necessities outlined in necessities for ADFS tlsssl certificates.

Step 2: Add a Temp Self-Signed Wildcard Cert to ADFS

Since ADFS requires some certificates to operate, use the steps beneath to create and add a brief self-signed wildcard certificates to the first AD FS Server.

  1. If the AD FS service is stopped, begin it. To do that, seek for and open the Services MMC, right-click the Active Directory Federation Services service, and choose Start.
  1. To verify that the AD FS server you’re signed in to is the first server, open the AD FS Management console through Server Manager.
To confirm that the AD FS server you're signed in to is the primary server, open the AD FS Management console via Server Manager.

If the server is the first server, it can show the AD FS providers. The secondary Federation server – see my second screenshot beneath – is not going to show the AD FS service.

If the server is the primary server, it will display the AD FS services.

The secondary server additionally shows the first federation server (blurred in my screenshot beneath).

The secondary Federation server - see my second screenshot below - will not display the AD FS service.
  1. Sign in to the first AD FS server and open Windows PowerShell as administrator. Then, run the command beneath to get the standing of the present certificates.
Get-ADFSCertificate –CertificateKind token-signing

As seen within the certificates’s Not After property, it expired in March 14th 2025.

Get-ADFSCertificate –CertificateType token-signing - As seen in the certificate's Not After property, it expired in March, 2025.
  1. After that, allow certificates rollover and generate a brand new certificates by operating these instructions.
Set-ADFSProperties -AutoCertificateRollover $true
Update-ADFSCertificate –CertificateKind token-signing
  1. Finally, confirm that the self-signed cert has been assigned to the AD FS server by operating the Get-ADFSCertificate command once more:
Get-ADFSCertificate –CertificateKind token-signing

The command’s outcomes ought to listing two certificates. One ought to have a Not After date sooner or later, whereas the opposite ought to have the IsPrimary worth False.

Two certificates should be listed now. One should have a Not After date in the future. Meanwhile, the other cert should have the IsPrimary value False.
Two certificates should be listed now. One should have a Not After date in the future. Meanwhile, the other cert should have the IsPrimary value False.

Step 3: Import the New Public Signed Cert to the AD FS Server’s Local Store

Perform the steps on this part on the major and secondary AD FS servers.

  1. Double-click the PFX file of the certificates you bought from a certificates supplier in Step 1. Then, on the primary web page of the import wizard, choose Local Machine.

If you select the primary possibility—Current person—you received’t have the option to set the AD FS server to use this certificates later on this information.

  1. The certificates’s file path will probably be displayed on the next web page. Click Next to proceed to the following web page.
On the following page, the certificate's file path will be displayed. Click Next to progress to the next page.
  1. Finally, enter the certificates’s PFX password and import it to the native pc’s certificates retailer. See my screenshots beneath for steerage.
Import the New Public Signed Cert to the AD FS Server's Local Store - final steps 1 of 3
Import the New Public Signed Cert to the AD FS Server's Local Store - final steps 2 of 3
Import the New Public Signed Cert to the AD FS Server's Local Store - final steps 2 of 3

Repeat the above steps within the secondary AD FS server. Then, run the command beneath on the major server to disable the AD FS certificates rollover.

Set-ADFSProperties -AutoCertificateRollover $false

Step 4: Grant the AD FS AD Service Account Access to the Cert Private Key

  1. Get the title of the Active Directory Service account for AD FS from the Log On tab of the properties of the Active Directory Federation Services service. You require this account later on this part.

Search for and open Services. Then, right-click Active Directory Federation Services, choose Properties, then the Log On tab.

Get the name of the Active Directory Service account for AD FS from the Log On tab of the properties of the Active Directory Federation Service service. You require this account later in this section.
  1. Search for and open MMC as administrator (right-click MMC from the search end result and select Run as administrator).
Search for and open MMC as administrator (right-click MMC from the search result and choose Run as administrator).
  1. Then, on the MMC, click on File and choose Add/Remove snap-in…Then, choose Certificates > Add.
Then, on the MMC, click File and select Add/Remove snap-in...
Then, select Certificates > Add.
  1. Next, select Computer account on the Certificate snap-in wizard, then click on Next. Finally, select Local pc (the pc this console is operating on), then choose Finish, OK. See my screenshots beneath for steerage.
Next, choose Computer account on the Certificate snap-in wizard, then click Next.
Finally, choose Local computer (the computer this console is running on), then select Finish.
Local computer (the computer this console is running on),
  1. Expand Certificates (Local pc), Personal and left-click Certificates on the MMC console. Then, right-click the certificates you imported in Step 3 and level to All Tasks > Manage Private Keys.

The most up-to-date cert ought to have an expiry date sooner or later.

Expand Certificates (Local computer), Personal and left-click Certificates on the MMC console. Then, right-click the certificate you imported in Step 3 and point to All Tasks > Manage Private Keys.
  1. The above motion opens the Permissions properties for the certificates’s non-public keys. Click the Add button.
The above action opens the Permissions properties for the certificate's private keys. Click the Add button.
  1. Then, click on Object Types > Select Service Accounts, OK. After that, enter the title of your AD FS service account within the Enter the thing names to choose area and grant it full management.
Then, click Object Types > Select Service Accounts, OK. After that, enter the name of your AD FS service account and grant full control.

Repeat steps 1 to 5 above within the secondary AD FS server.

Step 5: Renew the Certificate within the AD FS Servers

  1. Launch the AD FS administration console (through Server Manager). Then, broaden Service > Certificates and select Set Service Communication Certificate.
Launch the AD FS management console (via Server Manager). Then, expand  Service > Certificates and choose Set Service Communication Certificate.
  1. On the Windows Security pop-up, choose More decisions. Then, select the brand new certificates and click on OK.
Then, choose the new certificate and click OK.
  1. Repeat steps 1 and a couple of above to exchange the Token-decryption and Token-signing certs. Finally, delete all of the previous certificates.
  2. When you end the above steps, the brand new certificates ought to be listed for the Service communications, Token-decryption, and Token-signing sections of the Certificates blade.
When you finish the above steps, you should have the new certificate listed for Service communications, Token-decryption, and Token-signing.
  1. After that, get the certificates’s thumbprint by right-clicking it, choosing View Certificate, and selecting the Details tab > Thumbprint. Then, choose and duplicate the certificates’s thumbprint with Ctrl + C.
After that, get the certificate's thumbprint by right-clicking it, selecting View Certificate, and choosing the Details tab > Thumbprint. Then, select and copy the certificate's thumbprint with Ctrl + C.
You can get the certificate's thumbprint by right-clicking it, selecting View Certificate,
  1. Paste the thumbprint in a notepad and take away all areas.
  1. Run the command beneath – from the PowerShell console you opened as administrator – to re-enable AD FS rollover. Then, verify that the brand new certificates is on the market in AD FS by operating the second command.
Set-ADFSProperties -AutoCertificateRollover $true
Get-adfsCertificate
  1. After that, set the AD FS server to use the brand new cert by operating the command beneath. Replace every little thing in daring together with your cert Thumbprint.
Set-AdfsSslCertificate -Thumbprint <enter your certificates thumprint right here>
  1. Then, set the cert rollover to true and restart the ADFS service. Finally, run the Get-AdfsSslCertificate command to verify that the AD FS server makes use of the brand new certificates.
Set-ADFSProperties -AutoCertificateRollover $true
Restart-Service ADFSSRV
Get-AdfsSslCertificate
Finally, run the Get-AdfsSslCertificate command to confirm that the AD FS server uses the new certificate.

Step 6: Renew the Certificate on the AD FS WAP Servers

  1. Copy the PFX file of the general public signed certificates to your first AD FS WAP server and repeat Step 3 (hyperlink opens in a brand new browser tab) part of this information.
  2. After that, open PowerShell as administrator and run these instructions.
#1. Configure the WAP service to use the brand new certificates

Set-WebApplicationProxySslCertificate -Thumbprint <enter your certificates thumprint right here>

#2. Re-establish the proxy belief of the WAP server with the AD FS server. This command will immediate you to enter an AD account with permissions to the AD FS service

Install-WebApplicationProxy -CertificateThumbprint <enter your certificates thumprint right here> -FederationServiceIdentify <enter your AD FS federation service FQDN right here>

#3. Finally, replace the SSL cert for each revealed app

Get-WebApplicationProxyApplication | Set-WebApplicationProxyApplication -ExteriorCertificateThumbprint <enter your certificates thumprint right here>

Re-establish the proxy trust of the WAP server with the AD FS server. This command will prompt you to enter an AD account with permissions to the AD FS service
  1. Repeat steps 1 and a couple of above in your second WAP server.

Conclusion

After finishing the steps outlined on this detailed information, if you open the front-end website of your AD FS service on a browser, it can now not show a certificates error. Furthermore, in the event you open the location’s certificates, it ought to show the brand new certificates.

After completing the steps outlined in this detailed guide, when you open the front-end site of your AD FS service on a browser, it will no longer display a certificate error. If you open the site's certificate, it should display the new certificate.

I admit that renewing a certificates in an AD FS server is comparatively complicated. Following this detailed information, I’m assured you will have accomplished the duty efficiently, however I might nonetheless like to hear your ideas.

Let me know what you concentrate on this information and in the event you met your aim by following it. You can present suggestions by responding to our “Was this page helpful?” suggestions request beneath.

Leave a Reply