How to get federation settings of a domain in Microsoft Entra ID

Federated domain configurations define how authentication flows between Entra ID and trusted systems. For IT admins, tracking SAML or WS-Fed settings, claims mappings, and domain trust requirements can get complex, especially when multiple domains are in play. Fortunately, there are straightforward ways to review and manage these details.

  • M365 admin center
  • PowerShell
  • ADManager Plus
 

How to get federation settings of a domain in Microsoft Entra ID using Entra admin center

  1. Sign in to the Entra ID admin center.
  2. Navigate to Entra ID > External Identities.
  3. Under All identity providers, select Custom.
  4. Choose the domain you want to review.
  5. The page will display the federation settings for that domain.
A comprehensive report showing how to get federation settings of a domain in the Entra admin center

How to get federation settings of a domain in Microsoft Entra ID using Windows PowerShell

  • Connect to the Azure AD PowerShell.
    Connect-MgGraph -Scopes "Domain.Read.All"
  • Follow the below cmdlet to get federation settings.
    Get-MgDomainFederationConfiguration
  • To get details for a specific domain
    Get-MgDomainFederationConfiguration -DomainId "yourdomain.com"

Example use case to get federation settings of the domain "testdomain.com"

Example query

Connect-MgGraph -Scopes "Domain.Read.All"
Get-MgDomainFederationConfiguration -DomainId "testdomain.com"

Example output

Id : 5a72f94b-3d49-4f86-82d0-99bcac45f913
DomainId : testdomain.com
DisplayName : Testdomain
IssuerUri : http://sts.testdomain.com/adfs/services/trust
PassiveSignInUri : https://sts.testdomain.com/adfs/ls/
ActiveSignInUri : https://sts.testdomain.com/adfs/services/trust/2005/usernamemixed
SigningCertificate: MIIDpzCCApegAwIBAgIQBf6ZQwK8+E...
LogOffUri : https://sts.testdomain.com/adfs/ls/?wa=wsignout1.0
PreferredAuthenticationProtocol : SAML

How to get federation settings of a domain in Microsoft Entra ID using Graph PowerShell

The syntax is as follows:

Get-MgDomainFederationConfiguration
-DomainId <String>
[-ExpandProperty <String[]>]
[-Property <String[]>]
[-Filter <String>]
[-Search <String>]
[-Skip <Int32>]
[-Sort <String[]>]
[-Top <Int32>]
[-ResponseHeadersVariable <String>]
[-Headers <IDictionary>]
[-PageSize <Int32>]
[-All]
[-CountVariable <String>]
[<CommonParameters>]

Example use case to get the federation settings of the domain "testdomain.com"

Example query

Get-MgDomainFederationConfiguration -DomainId "testdomain.com"

Example output

Id : 9b4e06db-2c6e-41d1-8b75-0a4a6a1d9f30
DomainId : testdomain.com
DisplayName :Testdomain
IssuerUri : http://sts.testdomain.com/adfs/services/trust
PassiveSignInUri : https://sts.testdomain.com/adfs/ls/
ActiveSignInUri : https://sts.bitscloud.com/adfs/services/trust/2005/usernamemixed
SigningCertificate : MIIC6jCCAdKgAwIBAgIQAJD4n6q6J...
LogOffUri : https://sts.testdomain.com/adfs/ls/?wa=wsignout1.0
PreferredAuthenticationProtocol : SAML

The output shows the federation settings for the domain testdomain.com in Microsoft Entra ID. It has a unique configuration Id tied to this domain, with a DisplayName that identifies the federation service. Authentication requests are redirected to the domain's identity provider through the IssuerUri, PassiveSignInUri, and ActiveSignInUri, which in this case point to ADFS. A SigningCertificate is in place to validate tokens issued by that provider. When users sign out, they're redirected to the LogOffUri. The federation here runs on the SAML protocol, which Entra ID uses to handle authentication for this domain.

Why use ADManager Plus for Microsoft 365 management and reporting

ADManager Plus helps Microsoft 365 admins, with a clean, intuitive interface that makes everyday Microsoft 365 tasks simpler.

User and group management

Create, modify, and manage users, groups, and licenses at scale. Perform bulk updates, assign or revoke licenses, adjust group memberships, and track license usage with ease.

Access reviews

Schedule periodic access reviews of group memberships and privileges to ensure only the right people retain access. Strengthen compliance and maintain least-privilege policies effortlessly.

Automation

Cut down routine admin work by automating user provisioning, license assignments, attribute updates, and group management. Configure once and let the system take care of it on schedule.

Delegation

Assign admin responsibilities with role-based access controls so teams can operate efficiently without compromising security.

Automated report generation

Schedule and generate up-to-date reports automatically, and export them in multiple formats to stay audit-ready always.

Important tips

  • Regularly check the authentication type of your domains to confirm if they're managed or federated. This helps prevent login issues tied to outdated federation settings.
  • Verify key federation properties such as issuer URI, passive and active endpoints, and signing certificates to ensure smooth single sign-on.
  • Stay ahead of disruptions by monitoring certificate expiry and renewing them well in advance. Expired federation certificates are a common cause of access failures.

Manage Microsoft 365 efficiently with ADManager Plus

The one-stop solution to Active Directory Management and Reporting
Email Download Link