mirror of
https://github.com/Set-OutlookSignatures/Set-OutlookSignatures.git
synced 2026-04-26 10:45:52 +03:00
[GH-ISSUE #116] Standard Users - Problem connecting to Microsoft Graph. Exit. #50
Labels
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/Set-OutlookSignatures-Set-OutlookSignatures#50
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @CarlInLV on GitHub (May 29, 2024).
Original GitHub issue: https://github.com/Set-OutlookSignatures/Set-OutlookSignatures/issues/116
Originally assigned to: @CarlInLV on GitHub.
Issue happens in the latest release
Previously solved issues and documentation
Code of Conduct
What happened?
Converting to issue from discussion #114
Set-OutlookSignaturesResult-CarlInLV.txt
Verbose log
@GruberMarkus commented on GitHub (May 29, 2024):
Problem:
That looks as if your test user is not a domain use but a local user ... which I guess is not the case.
What's the output of the following PowerShell commands when your test user executes them?
@CarlInLV commented on GitHub (May 29, 2024):
Windows PowerShell
Copyright (C) Microsoft Corporation. All rights reserved.
Try the new cross-platform PowerShell https://aka.ms/pscore6 PS C:\Users\testact2> ([System.Security.Principal.WindowsIdentity]::GetCurrent()).User.Value >>
PS C:\Users\testact2>
@GruberMarkus commented on GitHub (May 29, 2024):
What about
whoami /upn?@CarlInLV commented on GitHub (May 29, 2024):
test.account2@NameRedacted.Gov (the UPN is accurate)
@CarlInLV commented on GitHub (May 29, 2024):
testact2 is the pre-Windows 2000 User logon name and Test.Account2 is the User logon name
@GruberMarkus commented on GitHub (May 29, 2024):
Very strange. I need to think about that a bit.
@GruberMarkus commented on GitHub (May 29, 2024):
I have seen this error only once, a few years ago. The root cause could never be determined, because the problem mysteriously and spontaniously solved itself.
Please test if the attached alpha version solves your problem.
Set-OutlookSignatures.rename-to-ps1.txt
@CarlInLV commented on GitHub (May 29, 2024):
Same result with the standard account and also with the help desk account (has local admin permissions on the workstation).
Result-Alpha-Verbose-CarlInLV.txt
Result-AlphaTest-CarlInLV.txt
@GruberMarkus commented on GitHub (May 30, 2024):
We are one step further, because user detection is working now, so we have a login hint for Graph.
Integrated Windows Authentication fails with an unspecified error. Usually, the message is much more detailed.
Graph auth fails very fast. The whole process takes 17 seconds, although the timeout is configured for two minutes.
As you use a .gov domain: Is your tenant in the public Azure/M365 cloud, or do you use one of the national clouds (AzureUSGovernment, AzureUSGovernmentDOD)?
Are you sure that your default browser does not open? Maybe its in the background. What if you change your default browser to Edge?
Please also run a test with v4.12.0 instead of v4.12.2. It could be a bug in an auth library that was updated.
@GruberMarkus commented on GitHub (May 30, 2024):
I think that I focused on the wrong thing.
The error message for two different authentication mechanisms is identical and very generic and unspecific: "An error occurred while sending the request."
At the dame time, it works if you use an account with domain admin rights, but not with accounts that are unprivileged or ate local admins.
I think the real question is: Which (security) settings do you apply to your users, that are not applied to Domain Admins?
That could be Windows settings, antivirus and firewall configurations, and many more.
I think you should investigate on this direction - especially if v4.12.0 shows the same behavior as v4.12.2.
@CarlInLV commented on GitHub (May 30, 2024):
Our tenant is in the public Azure/M365 cloud (we just started using our .gov a month ago). I reverted back to 4.12.0 and ran another test. I am sure that the default browser does not open when I click OK to the popup message. I checked the running processes as well, no Chrome or Edge running in the background. Next I removed Chrome, set Edge as the default browser and ran another test - same result.
Next I will begin investigating our security settings since 4.12.0 showed the same behavior as 4.12.2.
@CarlInLV commented on GitHub (May 30, 2024):
I just got it to work for our HelpDesk account (has local admin on the workstations). The change that I made right before that test was disabling the Carbon Black sensor (antivirus). Edit 1 - Testing with v.4.12.0. Edit 2 - now testing with a standard user account. Edit 3 - I noticed that when it works, the popup message doesn't appear.
@CarlInLV commented on GitHub (May 30, 2024):
Adding Set-OutlookSignatures.ps1 to the antivirus exclusions list looks like it was the final piece of this puzzle. Set-OutlookSignatures is now working here with the standard users in addition to the power users & Domain Admins. Thank you, @GruberMarkus very much!