Skip to content

Commit 16d371a

Browse files
authored
Merge pull request #97828 from cmmdesai/cp-pilot-patch-12-4
Incorporate pilot OU feedback
2 parents daae6db + 6bae9bf commit 16d371a

File tree

1 file changed

+59
-36
lines changed

1 file changed

+59
-36
lines changed

articles/active-directory/cloud-provisioning/tutorial-pilot-aadc-aadccp.md

Lines changed: 59 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -24,18 +24,23 @@ This tutorial walks you through piloting cloud provisioning for a test Active Di
2424
Before you try this tutorial, consider the following items:
2525
1. Ensure that you're familiar with basics of cloud provisioning.
2626
2. Ensure that you're running Azure AD Connect sync version 1.4.32.0 or later and have configured the sync rules as documented. When piloting, you will be removing a test OU or group from Azure AD Connect sync scope. Moving objects out of scope leads to deletion of those objects in Azure AD. In case of user objects, the objects in Azure AD are soft-deleted and can be restored. In case of group objects, the objects in Azure AD are hard-deleted and cannot be restored. A new link type has been introduced in Azure AD Connect sync which will prevent the deletion in case of a piloting scenario.
27-
3. Ensure that the objects in the pilot scope have ms-ds-consistencyGUID populated so cloud provisioning hard matches the objects. Do note that Azure AD Connect sync does not populate ms-ds-consistencyGUID by default for group objects.
27+
3. Ensure that the objects in the pilot scope have ms-ds-consistencyGUID populated so cloud provisioning hard matches the objects.
28+
29+
> [!NOTE]
30+
> Azure AD Connect sync does not populate *ms-ds-consistencyGUID* by default for group objects. Follow the steps documented in [this blog post](https://blogs.technet.microsoft.com/markrenoden/2017/10/13/choosing-a-sourceanchor-for-groups-in-multi-forest-sync-with-aad-connect/) to populate *ms-ds-consistencyGUID* for group objects.
31+
2832
4. This is an advanced scenario. Ensure that you follow the steps documented in this tutorial precisely.
2933

3034
## Prerequisites
3135
The following are prerequisites required for completing this tutorial
3236
- A test environment with Azure AD Connect sync version 1.4.32.0 or later
3337
- An OU or group that is in scope of sync and can be used the pilot. We recommend starting with a small set of objects.
3438
- A server running Windows Server 2012 R2 or later that will host the provisioning agent. This cannot be the same server as the Azure AD Connect server.
39+
- Source anchor for AAD Connect sync should be either *objectGuid* or *ms-ds-consistencyGUID*
3540

3641
## Update Azure AD Connect
3742

38-
As a minimum, you should have [Azure AD connect](https://www.microsoft.com/download/details.aspx?id=47594) 1.4.32.0. To update Azure AD Connect sync, complete the steps in [Azure AD Connect: Upgrade to the latest version](../hybrid/how-to-upgrade-previous-version.md). This step is provided in case your test environment does not have the latest version of Azure AD Connect.
43+
As a minimum, you should have [Azure AD connect](https://www.microsoft.com/download/details.aspx?id=47594) 1.4.32.0. To update Azure AD Connect sync, complete the steps in [Azure AD Connect: Upgrade to the latest version](../hybrid/how-to-upgrade-previous-version.md).
3944

4045
## Stop the scheduler
4146
Azure AD Connect sync synchronizes changes occurring in your on-premises directory using a scheduler. In order to modify and add custom rules, you want to disable the scheduler so that synchronizations will not run while you are working on this. Use the following steps:
@@ -44,6 +49,9 @@ Azure AD Connect sync synchronizes changes occurring in your on-premises directo
4449
2. Run `Stop-ADSyncSyncCycle`. Hit Enter.
4550
3. Run `Set-ADSyncScheduler -SyncCycleEnabled $false`.
4651

52+
>[!NOTE]
53+
>If you are running your own custom scheduler for AAD Connect sync, then please disable the scheduler.
54+
4755
## Create custom user inbound rule
4856

4957
1. Launch the synchronization editor from the application menu in desktop as shown below:</br>
@@ -77,7 +85,7 @@ Azure AD Connect sync synchronizes changes occurring in your on-premises directo
7785
6. On the **Transformations** page, add a Constant transformation: flow True to cloudNoFlow attribute. Click **Add**.
7886
![Custom rule](media/how-to-cloud-custom-user-rule/user4.png)</br>
7987

80-
Same steps need to be followed for all object types (user, group and contact).
88+
Same steps need to be followed for all object types (user, group and contact). Repeat steps per configured AD Connector / per AD forest.
8189

8290
## Create custom user outbound rule
8391

@@ -88,7 +96,7 @@ Same steps need to be followed for all object types (user, group and contact).
8896

8997
**Name:** Give the rule a meaningful name<br>
9098
**Description:** Add a meaningful description<br>
91-
**Connected System:** Choose the AD connector that you are writing the custom sync rule for<br>
99+
**Connected System:** Choose the AAD connector that you are writing the custom sync rule for<br>
92100
**Connected System Object Type:** User<br>
93101
**Metaverse Object Type:** Person<br>
94102
**Link Type:** JoinNoFlow<br>
@@ -105,48 +113,38 @@ Same steps need to be followed for all object types (user, group and contact).
105113

106114
Same steps need to be followed for all object types (user, group and contact).
107115

108-
## Scope Azure AD Connect sync to exclude the pilot OU
109-
Now, you will configure Azure AD Connect to exclude the pilot OU that was created above. The cloud provisioning agent will handle synchronizing these users. Use the following steps to scope Azure AD Connect.
110-
111-
1. On the server that is running Azure AD Connect, double-click on the Azure AD Connect icon.
112-
2. Click **Configure**
113-
3. Select **Customize synchronization options** and click next.
114-
4. Sign-in to Azure AD and click **Next**.
115-
5. On the **Connect your directories** screen click **Next**.
116-
6. On the **Domain and OU filtering** screen, select **Sync selected domains and OUs**.
117-
7. Expand your domain and **de-select** the **CPUsers** OU. Click **Next**.
118-
![scope](media/tutorial-existing-forest/scope1.png)</br>
119-
9. On the **Optional features** screen, click **Next**.
120-
10. On the **Ready to configure** screen click **Configure**.
121-
11. Once that has completed, click **Exit**.
116+
## Install the Azure AD Connect provisioning agent
117+
1. Sign in to the server you will use with enterprise admin permissions. If you are using the [Basic AD and Azure environment](tutorial-basic-ad-azure.md) tutorial it would be CP1.
118+
2. Download the Azure AD Connect cloud provisioning agent [here](https://go.microsoft.com/fwlink/?linkid=2109037).
119+
3. Run the Azure AD Connect cloud provisioning (AADConnectProvisioningAgent.Installer)
120+
3. On the splash screen, **Accept** the licensing terms and click **Install**.</br>
121+
![Welcome screen](media/how-to-install/install1.png)</br>
122122

123-
## Start the scheduler
124-
Azure AD Connect sync synchronizes changes occurring in your on-premises directory using a scheduler. Now that you have modified the rules, you can re-start the scheduler. Use the following steps:
123+
4. Once this operation completes, the configuration wizard will launch. Sign in with your Azure AD global administrator account.
124+
5. On the **Connect Active Directory** screen, click **Add directory** and then sign in with your Active Directory administrator account. This operation will add your on-premises directory. Click **Next**.</br>
125+
![Welcome screen](media/how-to-install/install3.png)</br>
125126

126-
1. On the server that is running Azure AD Connect sync open PowerShell with Administrative Privileges
127-
2. Run `Set-ADSyncScheduler -SyncCycleEnabled $true`.
128-
3. Run `Start-ADSyncSyncCycle`. Hit Enter.
127+
6. On the **Configuration complete** screen, click **Confirm**. This operation will register and restart the agent.</br>
128+
![Welcome screen](media/how-to-install/install4.png)</br>
129129

130-
## Install the Azure AD Connect provisioning agent
131-
1. Sign in to the domain joined server. If you are using the [Basic AD and Azure environment](tutorial-basic-ad-azure.md) tutorial, it would be DC1.
132-
2. Sign in to the Azure portal using cloud-only global admin credentials.
133-
3. On the left, select **Azure Active Directory**, click **Azure AD Connect** and in the center select **Manage provisioning (preview)**.</br>
134-
![Azure portal](media/how-to-install/install6.png)</br>
135-
4. Click on "Download agent"
136-
5. Run the Azure AD Connect provisioning agent
137-
6. On the splash screen, **Accept** the licensing terms and click **Install**.</br>
130+
7. Once this operation completes you should see a notice **Your was successfully verified.** You can click **Exit**.</br>
131+
![Welcome screen](media/how-to-install/install5.png)</br>
132+
8. If you still see the initial splash screen, click **Close**.1. Sign in to the server you will use with enterprise admin permissions.
133+
2. Download the Azure AD Connect cloud provisioning agent [here](https://go.microsoft.com/fwlink/?linkid=2109037).
134+
3. Run the Azure AD Connect cloud provisioning (AADConnectProvisioningAgent.Installer)
135+
3. On the splash screen, **Accept** the licensing terms and click **Install**.</br>
138136
![Welcome screen](media/how-to-install/install1.png)</br>
139137

140-
7. Once this operation completes, the configuration wizard will launch. Sign in with your Azure AD global administrator account. Note that if you have IE enhanced security enabled this will block the sign-in. If this is the case, close the installation, disable IE enhanced security in Server Manager, and click the **AAD Connect Provisioning Agent Wizard** to restart the installation.
141-
8. On the **Connect Active Directory** screen, click **Add directory** and then sign in with your Active Directory domain administrator account. NOTE: The domain administrator account should not have password change requirements. In case the password expires or changes, you will need to re-configure the agent with the new credentials. This operation will add your on-premises directory. Click **Next**.</br>
138+
4. Once this operation completes, the configuration wizard will launch. Sign in with your Azure AD global administrator account.
139+
5. On the **Connect Active Directory** screen, click **Add directory** and then sign in with your Active Directory administrator account. This operation will add your on-premises directory. Click **Next**.</br>
142140
![Welcome screen](media/how-to-install/install3.png)</br>
143141

144-
9. On the **Configuration complete** screen, click **Confirm**. This operation will register and restart the agent.</br>
142+
6. On the **Configuration complete** screen, click **Confirm**. This operation will register and restart the agent.</br>
145143
![Welcome screen](media/how-to-install/install4.png)</br>
146144

147-
10. Once this operation completes you should see a notice: **Your agent configuration was successfully verified.** You can click **Exit**.</br>
145+
7. Once this operation completes you should see a notice **Your was successfully verified.** You can click **Exit**.</br>
148146
![Welcome screen](media/how-to-install/install5.png)</br>
149-
11. If you still see the initial splash screen, click **Close**.
147+
8. If you still see the initial splash screen, click **Close**.
150148

151149
## Verify agent installation
152150
Agent verification occurs in the Azure portal and on the local server that is running the agent.
@@ -205,11 +203,36 @@ You will now verify that the users that you had in our on-premises directory hav
205203

206204
Additionally, you can verify that the user and group exist in Azure AD.
207205

206+
## Start the scheduler
207+
Azure AD Connect sync synchronizes changes occurring in your on-premises directory using a scheduler. Now that you have modified the rules, you can re-start the scheduler. Use the following steps:
208+
209+
1. On the server that is running Azure AD Connect sync open PowerShell with Administrative Privileges
210+
2. Run `Set-ADSyncScheduler -SyncCycleEnabled $true`.
211+
3. Run `Start-ADSyncSyncCycle`. Hit Enter.
212+
213+
>[!NOTE]
214+
>If you are running your own custom scheduler for AAD Connect sync, then please enable the scheduler.
215+
208216
## Something went wrong
209217
In case the pilot does not work as expected, you can go back to the Azure AD Connect sync setup by following the steps below:
210218
1. Disable provisioning configuration in the Azure portal.
211219
2. Disable all the custom sync rules created for Cloud Provisioning using the Sync Rule Editor tool. Disabling should cause full sync on all the connectors.
212220

221+
## Configure Azure AD Connect sync to exclude the pilot OU
222+
Once you have verified that users from the pilot OU are successfully managed by cloud provisioning, you can re-configure Azure AD Connect to exclude the pilot OU that was created above. The cloud provisioning agent will handle synchronization for these users going forward. Use the following steps to scope Azure AD Connect.
223+
224+
1. On the server that is running Azure AD Connect, double-click on the Azure AD Connect icon.
225+
2. Click **Configure**
226+
3. Select **Customize synchronization options** and click next.
227+
4. Sign-in to Azure AD and click **Next**.
228+
5. On the **Connect your directories** screen click **Next**.
229+
6. On the **Domain and OU filtering** screen, select **Sync selected domains and OUs**.
230+
7. Expand your domain and **de-select** the **CPUsers** OU. Click **Next**.
231+
![scope](media/tutorial-existing-forest/scope1.png)</br>
232+
9. On the **Optional features** screen, click **Next**.
233+
10. On the **Ready to configure** screen click **Configure**.
234+
11. Once that has completed, click **Exit**.
235+
213236
## Next steps
214237

215238
- [What is provisioning?](what-is-provisioning.md)

0 commit comments

Comments
 (0)