Monthly Archives: November 2015

Yammer identity integration with Office 365 now released

Yammer identities and the profile updates have been decoupled from the identity management and synchronization in the other Office 365 services, and setting up synchronization of identities to Yammer has required deploying and configuring the Yammer Directory Synchronization (DSync), a separate tool from the Azure AD Sync/Azure AD Connect used for Office 365. After the… Read More »

Resolving “Windows could not start Active Directory Federation Services service”

After installing and configuring the ADFS role on the primary federation server, the ADFS role is installed on the secondary federation server. The ADFS Configuration Wizard resulted in and error, which made me go back to the primary server to verify that everything was working – it was not … As the GMSA account was… Read More »

Resolving “A certificate registered for use by Microsoft Dynamics CRM has expired” error in CRM 2013

A while after renewing and replacing the Service Communication certificate on the ADFS server, and updating the CRM Internet Facing Deployment to use the new public certificate, the Dynamics CRM Server 2013 started to throw a series of errors in the Application log every 15 minutes: First 3x event 25089: Log Name: Application Source: MSCRMMonitoringTest… Read More »

Microsoft Cloud services expanding in Europe

Microsoft has announced that they are preparing an expansion of the Microsoft Cloud from the existing two datacenters in Ireland and the Netherlands, with an additional regional datacenter in the United Kingdom. Microsoft Azure and Office 365 services is expected to be generally available from the new datacenter in last part of 2016. The Dynamics… Read More »

SHA-1 Deprecation timeline accelerated

SHA-1 and SHA-2 are cryptographic ‘Hash’ algorithms, that are used in the digital signatures that forms the foundation certificates are built on. Over time, cryptographic algorithms become relatively weaker as they are exposed to  attacks through both the availability of increasingly powerful computers and advanced cryptanalysis. The use of the signing algorithm SHA-1 is being… Read More »