Skip to content

Commit 0c32a4e

Browse files
Update active-directory-ds-synchronization.md
1 parent 31c1d25 commit 0c32a4e

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/active-directory-domain-services/active-directory-ds-synchronization.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ ms.author: maheshu
2121
# Synchronization in an Azure AD Domain Services managed domain
2222
The following diagram illustrates how synchronization works in Azure AD Domain Services managed domains.
2323

24-
![Synchronization topology in Azure AD Domain Services](./media/active-directory-domain-services-design-guide/sync-topology.png)
24+
![Synchronization in Azure AD Domain Services](./media/active-directory-domain-services-design-guide/sync-topology.png)
2525

2626
## Synchronization from your on-premises directory to your Azure AD tenant
2727
Azure AD Connect sync is used to synchronize user accounts, group memberships, and credential hashes to your Azure AD tenant. Attributes of user accounts such as the UPN and on-premises SID (security identifier) are synchronized. If you use Azure AD Domain Services, legacy credential hashes required for NTLM and Kerberos authentication are also synchronized to your Azure AD tenant.
@@ -41,7 +41,7 @@ The synchronization process is also one-way/unidirectional in nature. Your manag
4141
## Synchronization from a multi-forest on-premises environment
4242
Many organizations have a fairly complex on-premises identity infrastructure consisting of multiple account forests. Azure AD Connect supports synchronizing users, groups, and credential hashes from multi-forest environments to your Azure AD tenant.
4343

44-
In contrast, your Azure AD tenant is a much simpler and flat namespace. To enable users to reliably access applications secured by Azure AD, resolve UPN conflicts across user accounts in different forests. Your Azure AD Domain Services managed domain bears close resemblance to your Azure AD tenant. Therefore, you see a flat OU structure in your managed domain. All users and groups are stored within the 'AADDC Users' container, regardless of the on-premises domain or forest from which they were synced in. You may have configured a hierarchical OU structure on-premises. However, your managed domain still has a simple flat OU structure.
44+
In contrast, your Azure AD tenant is a much simpler and flat namespace. To enable users to reliably access applications secured by Azure AD, resolve UPN conflicts across user accounts in different forests. Your Azure AD Domain Services managed domain bears close resemblance to your Azure AD tenant. Therefore, you see a flat OU structure in your managed domain. All user accounts and groups are stored within the 'AADDC Users' container, regardless of the on-premises domain or forest from which they were synced in. You may have configured a hierarchical OU structure on-premises. However, your managed domain still has a simple flat OU structure.
4545

4646
## Exclusions - what isn't synchronized to your managed domain
4747
The following objects or attributes are not synchronized to your Azure AD tenant or to your managed domain:
@@ -112,7 +112,7 @@ The following table illustrates how specific attributes for group objects in you
112112
| securityEnabled |groupType |
113113

114114
## Password hash synchronization and security considerations
115-
When you enable Azure AD Domain Services for your Azure AD directory, your directory is configured to start generating and storing password hashes in NTLM & Kerberos compatible formats.
115+
When you enable Azure AD Domain Services, your Azure AD directory generates and stores password hashes in NTLM & Kerberos compatible formats.
116116

117117
For existing cloud user accounts, since Azure AD never stores their clear-text passwords, these hashes cannot be automatically generated. Therefore, Microsoft requires [cloud-users to reset/change their passwords](active-directory-ds-getting-started-password-sync.md) in order for their password hashes to be generated and stored in Azure AD. For any cloud user account created in Azure AD after enabling Azure AD Domain Services, the password hashes are generated and stored in the NTLM and Kerberos compatible formats.
118118

0 commit comments

Comments
 (0)