Active Directory Internal Domain Federation

This table represents the Active Directory Internal Domain Federation resource from Microsoft Azure.

azure.ad_internal_domain_federation

Fields

TitleIDTypeData TypeDescription
_keycorestring
active_sign_in_uricorestringURL of the endpoint used by active clients when authenticating with federated domains set up for single sign-on in Microsoft Entra ID. Corresponds to the ActiveLogOnUri property of the Set-EntraDomainFederationSettings PowerShell cmdlet.
federated_idp_mfa_behaviorcorestringDetermines whether Microsoft Entra ID accepts the MFA performed by the federated IdP when a federated user accesses an application that is governed by a conditional access policy that requires MFA. The possible values are: acceptIfMfaDoneByFederatedIdp, enforceMfaByFederatedIdp, rejectMfaByFederatedIdp, unknownFutureValue. For more information, see federatedIdpMfaBehavior values.
idcorestringThe unique identifier for an entity. Read-only.
is_signed_authentication_request_requiredcoreboolIf true, when SAML authentication requests are sent to the federated SAML IdP, Microsoft Entra ID will sign those requests using the OrgID signing key. If false (default), the SAML authentication requests sent to the federated IdP aren't signed.
issuer_uricorestringIssuer URI of the federation server.
metadata_exchange_uricorestringURI of the metadata exchange endpoint used for authentication from rich client applications.
namecorestring
next_signing_certificatecorestringFallback token signing certificate that can also be used to sign tokens, for example when the primary signing certificate expires. Formatted as Base64 encoded strings of the public portion of the federated IdP's token signing certificate. Needs to be compatible with the X509Certificate2 class. Much like the signingCertificate, the nextSigningCertificate property is used if a rollover is required outside of the auto-rollover update, a new federation service is being set up, or if the new token signing certificate isn't present in the federation properties after the federation service certificate has been updated.
passive_sign_in_uricorestringURI that web-based clients are directed to when signing in to Microsoft Entra services.
password_reset_uricorestring
preferred_authentication_protocolcorestringPreferred authentication protocol. The possible values are: wsFed, saml, unknownFutureValue.
prompt_login_behaviorcorestringSets the preferred behavior for the sign-in prompt. The possible values are: translateToFreshPasswordAuthentication, nativeSupport, disabled, unknownFutureValue.
resource_groupcorestring
sign_out_uricorestringURI that clients are redirected to when they sign out of Microsoft Entra services. Corresponds to the LogOffUri property of the Set-EntraDomainFederationSettings PowerShell cmdlet.
signing_certificatecorestringCurrent certificate used to sign tokens passed to the Microsoft identity platform. The certificate is formatted as a Base64 encoded string of the public portion of the federated IdP's token signing certificate and must be compatible with the X509Certificate2 class. This property is used in the following scenarios: if a rollover is required outside of the autorollover update a new federation service is being set up if the new token signing certificate isn't present in the federation properties after the federation service certificate has been updated. Microsoft Entra ID updates certificates via an autorollover process in which it attempts to retrieve a new certificate from the federation service metadata, 30 days before expiry of the current certificate. If a new certificate isn't available, Microsoft Entra ID monitors the metadata daily and will update the federation settings for the domain when a new certificate is available.
signing_certificate_update_statuscorejsonProvides status and timestamp of the last update of the signing certificate.
subscription_idcorestring
subscription_namecorestring
tagscorehstore