Skip to content

Commit 0ba03ea

Browse files
authored
Merge pull request #224132 from billmath/fresh1
updating
2 parents 679cf4b + 9e4f913 commit 0ba03ea

10 files changed

+183
-226
lines changed

articles/active-directory/cloud-sync/how-to-troubleshoot.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This article describes how to troubleshoot problems that might aris
44
author: billmath
55
ms.author: billmath
66
manager: amycolannino
7-
ms.date: 10/13/2021
7+
ms.date: 01/18/2023
88
ms.topic: how-to
99
ms.prod: windows-server-threshold
1010
ms.technology: identity-adfs

articles/active-directory/cloud-sync/plan-cloud-sync-topologies.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: amycolannino
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: conceptual
10-
ms.date: 09/10/2021
10+
ms.date: 01/17/2023
1111
ms.subservice: hybrid
1212
ms.author: billmath
1313
ms.collection: M365-identity-device-management

articles/active-directory/cloud-sync/reference-expressions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: amycolannino
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: reference
10-
ms.date: 12/02/2019
10+
ms.date: 01/18/2023
1111
ms.subservice: hybrid
1212
ms.author: billmath
1313
ms.collection: M365-identity-device-management

articles/active-directory/cloud-sync/reference-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: amycolannino
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: how-to
10-
ms.date: 11/03/2021
10+
ms.date: 01/17/2023
1111
ms.subservice: hybrid
1212
ms.author: billmath
1313
ms.collection: M365-identity-device-management

articles/active-directory/cloud-sync/reference-version-history.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: amycolannino
77
ms.service: active-directory
88
ms.topic: reference
99
ms.workload: identity
10-
ms.date: 11/19/2020
10+
ms.date: 01/17/2023
1111
ms.subservice: app-provisioning
1212
ms.author: billmath
1313
ms.reviewer: daveba

articles/active-directory/cloud-sync/tutorial-existing-forest.md

Lines changed: 36 additions & 46 deletions
Original file line numberDiff line numberDiff line change
@@ -1,65 +1,55 @@
11
---
2-
title: Tutorial - Integrate an existing forest and a new forest with a single Azure AD tenant by using Azure AD Connect cloud sync
2+
title: Tutorial - Integrate an existing forest and a new forest with a single Azure AD tenant using Azure AD Connect cloud sync.
33
description: Learn how to add cloud sync to an existing hybrid identity environment.
44
services: active-directory
55
author: billmath
66
manager: amycolannino
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: tutorial
10-
ms.date: 11/11/2022
10+
ms.date: 01/17/2023
1111
ms.subservice: hybrid
1212
ms.author: billmath
1313
ms.collection: M365-identity-device-management
1414
---
1515

16-
# Tutorial: Integrate an existing forest and a new forest with a single Azure AD tenant
16+
# Integrate an existing forest and a new forest with a single Azure AD tenant
1717

1818
This tutorial walks you through adding cloud sync to an existing hybrid identity environment.
1919

2020
![Diagram that shows the Azure AD Connect cloud sync flow.](media/tutorial-existing-forest/existing-forest-new-forest-2.png)
2121

2222
You can use the environment you create in this tutorial for testing or for getting more familiar with how a hybrid identity works.
2323

24-
In this scenario, you sync an existing forest with an Azure AD tenant by using Azure Active Directory (Azure AD) Connect. You want to sync a new forest with the same Azure AD tenant. You'll set up cloud sync for the new forest.
24+
In this scenario, there's an existing forest synced using Azure AD Connect sync to an Azure AD tenant. And you have a new forest that you want to sync to the same Azure AD tenant. You'll set up cloud sync for the new forest.
2525

2626
## Prerequisites
27+
### In the Azure Active Directory admin center
2728

28-
Before you begin, set up your environments.
29-
30-
### In the Azure AD admin center
31-
32-
1. Create a cloud-only global administrator account on your Azure AD tenant.
33-
34-
This way, you can manage the configuration of your tenant if your on-premises services fail or become unavailable. [Learn how to add a cloud-only global administrator account](../fundamentals/add-users-azure-active-directory.md). Complete this step to ensure that you don't get locked out of your tenant.
35-
36-
1. Add one or more [custom domain names](../fundamentals/add-custom-domain.md) to your Azure AD tenant. Your users can sign in with one of these domain names.
29+
1. Create a cloud-only global administrator account on your Azure AD tenant. This way, you can manage the configuration of your tenant should your on-premises services fail or become unavailable. Learn about [adding a cloud-only global administrator account](../fundamentals/add-users-azure-active-directory.md). Completing this step is critical to ensure that you don't get locked out of your tenant.
30+
2. Add one or more [custom domain names](../fundamentals/add-custom-domain.md) to your Azure AD tenant. Your users can sign in with one of these domain names.
3731

3832
### In your on-premises environment
3933

40-
1. Identify a domain-joined host server that's running Windows Server 2012 R2 or later, with at least 4 GB of RAM and .NET 4.7.1+ runtime.
41-
42-
1. If there's a firewall between your servers and Azure AD, configure the following items:
34+
1. Identify a domain-joined host server running Windows Server 2012 R2 or greater with minimum of 4-GB RAM and .NET 4.7.1+ runtime
4335

36+
2. If there's a firewall between your servers and Azure AD, configure the following items:
4437
- Ensure that agents can make *outbound* requests to Azure AD over the following ports:
4538

4639
| Port number | How it's used |
4740
| --- | --- |
48-
| **80** | Downloads the certificate revocation lists (CRLs) while it validates the TLS/SSL certificate. |
49-
| **443** | Handles all outbound communication with the service. |
50-
| **8080** (optional) | Agents report their status every 10 minutes over port 8080, if port 443 is unavailable. This status is displayed in the Azure AD portal. |
41+
| **80** | Downloads the certificate revocation lists (CRLs) while validating the TLS/SSL certificate |
42+
| **443** | Handles all outbound communication with the service |
43+
| **8080** (optional) | Agents report their status every 10 minutes over port 8080, if port 443 is unavailable. This status is displayed on the Azure AD portal. |
5144
5245
If your firewall enforces rules according to the originating users, open these ports for traffic from Windows services that run as a network service.
53-
54-
- If your firewall or proxy allows you to specify safe suffixes, add connections to **\*.msappproxy.net** and **\*.servicebus.windows.net**. If it doesn't, allow access to the [Azure datacenter IP ranges](https://www.microsoft.com/download/details.aspx?id=41653), which are updated weekly.
55-
46+
- If your firewall or proxy allows you to specify safe suffixes, then add connections to **\*.msappproxy.net** and **\*.servicebus.windows.net**. If not, allow access to the [Azure datacenter IP ranges](https://www.microsoft.com/download/details.aspx?id=41653), which are updated weekly.
5647
- Your agents need access to **login.windows.net** and **login.microsoftonline.com** for initial registration. Open your firewall for those URLs as well.
57-
58-
- For certificate validation, unblock the following URLs: **mscrl.microsoft.com:80**, **crl.microsoft.com:80**, **ocsp.msocsp.com:80**, and **www\.microsoft.com:80**. Because these URLs are used to validate certificates for other Microsoft products, you might already have these URLs unblocked.
48+
- For certificate validation, unblock the following URLs: **mscrl.microsoft.com:80**, **crl.microsoft.com:80**, **ocsp.msocsp.com:80**, and **www\.microsoft.com:80**. Since these URLs are used for certificate validation with other Microsoft products, you may already have these URLs unblocked.
5949

6050
## Install the Azure AD Connect provisioning agent
6151

62-
If you're using the [Basic Active Directory and Azure environment](tutorial-basic-ad-azure.md) tutorial, the agent is DC1. To install the agent, do the following:
52+
If you're using the [Basic AD and Azure environment](tutorial-basic-ad-azure.md) tutorial, it would be DC1. To install the agent, follow these steps:
6353

6454
[!INCLUDE [active-directory-cloud-sync-how-to-install](../../../includes/active-directory-cloud-sync-how-to-install.md)]
6555

@@ -69,43 +59,43 @@ If you're using the [Basic Active Directory and Azure environment](tutorial-basi
6959
[!INCLUDE [active-directory-cloud-sync-how-to-verify-installation](../../../includes/active-directory-cloud-sync-how-to-verify-installation.md)]
7060

7161
## Configure Azure AD Connect cloud sync
72-
73-
To configure the cloud sync setup, do the following:
62+
Use the following steps to configure provisioning
7463

7564
1. Sign in to the Azure AD portal.
76-
1. Select **Azure Active Directory**.
77-
1. Select **Azure AD Connect**.
78-
1. Select **Manage cloud sync**.
65+
2. Select **Azure Active Directory**
66+
3. Select **Azure AD Connect**
67+
4. Select **Manage cloud sync**
7968

80-
![Screenshot that highlights the "Manage cloud sync" link.](media/how-to-configure/manage-1.png)
69+
![Screenshot showing "Manage cloud sync" link.](media/how-to-configure/manage-1.png)
8170

82-
1. Select **New Configuration**.
71+
5. Select **New Configuration**
8372

84-
![Screenshot of the Azure AD Connect cloud sync page, with the "New configuration" link highlighted.](media/tutorial-single-forest/configure-1.png)
73+
![Screenshot of Azure AD Connect cloud sync screen with "New configuration" link highlighted.](media/tutorial-single-forest/configure-1.png)
8574

86-
1. On the **Configuration** page, enter a **Notification email**, move the selector to **Enable**, and then select **Save**.
75+
7. On the configuration screen, enter a **Notification email**, move the selector to **Enable** and select **Save**.
8776

88-
![Screenshot of the "Edit provisioning configuration" page.](media/how-to-configure/configure-2.png)
77+
![Screenshot of Configure screen with Notification email filled in and Enable selected.](media/how-to-configure/configure-2.png)
8978

9079
1. The configuration status should now be **Healthy**.
9180

92-
![Screenshot of Azure AD Connect cloud sync page, showing a "Healthy" status.](media/how-to-configure/manage-4.png)
81+
![Screenshot of Azure AD Connect cloud sync screen showing Healthy status.](media/how-to-configure/manage-4.png)
82+
83+
## Verify users are created and synchronization is occurring
9384

94-
## Verify that users are created and synchronization is occurring
85+
You'll now verify that the users that you had in our on-premises directory have been synchronized and now exist in our Azure AD tenant. This process may take a few hours to complete. To verify users are synchronized, do the following:
9586

96-
You'll now verify that the users in your on-premises Active Directory have been synchronized and exist in your Azure AD tenant. This process might take a few hours to complete. To verify that the users are synchronized, do the following:
9787

98-
1. Sign in to the [Azure portal](https://portal.azure.com) with an account that has an Azure subscription.
99-
1. On the left pane, select **Azure Active Directory**.
100-
1. Under **Manage**, select **Users**.
101-
1. Verify that the new users are displayed in your tenant.
88+
1. Browse to the [Azure portal](https://portal.azure.com) and sign in with an account that has an Azure subscription.
89+
2. On the left, select **Azure Active Directory**
90+
3. Under **Manage**, select **Users**.
91+
4. Verify that you see the new users in our tenant
10292

103-
## Test signing in with one of your users
93+
## Test signing in with one of our users
10494

105-
1. Go to the [Microsoft My Apps](https://myapps.microsoft.com) page.
106-
1. Sign in with a user account that was created in your new tenant. You'll need to sign in by using the following format: *[email protected]*. Use the same password that the user uses to sign in on-premises.
95+
1. Browse to [https://myapps.microsoft.com](https://myapps.microsoft.com)
96+
2. Sign in with a user account that was created in our new tenant. You'll need to sign in using the following format: ([email protected]). Use the same password that the user uses to sign in on-premises.
10797

108-
![Screenshot that shows the My Apps portal with signed-in users.](media/tutorial-single-forest/verify-1.png)
98+
![Screenshot that shows the my apps portal with a signed in users.](media/tutorial-single-forest/verify-1.png)
10999

110100
You have now successfully set up a hybrid identity environment that you can use to test and familiarize yourself with what Azure has to offer.
111101

0 commit comments

Comments
 (0)