You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/connect/active-directory-aadconnect-sso-faq.md
+17-20Lines changed: 17 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.workload: identity
12
12
ms.tgt_pltfrm: na
13
13
ms.devlang: na
14
14
ms.topic: article
15
-
ms.date: 08/07/2018
15
+
ms.date: 09/04/2018
16
16
ms.component: hybrid
17
17
ms.author: billmath
18
18
---
@@ -79,12 +79,11 @@ Follow these steps on the on-premises server where you are running Azure AD Conn
79
79
80
80
### Step 1. Get list of AD forests where Seamless SSO has been enabled
81
81
82
-
1. First, download, and install the [Microsoft Online Services Sign-In Assistant](http://go.microsoft.com/fwlink/?LinkID=286152).
83
-
2. Then download and install the [64-bit Azure Active Directory module for Windows PowerShell](https://docs.microsoft.com/powershell/azure/active-directory/install-msonlinev1?view=azureadps-1.0).
84
-
3. Navigate to the `%programfiles%\Microsoft Azure Active Directory Connect` folder.
85
-
4. Import the Seamless SSO PowerShell module using this command: `Import-Module .\AzureADSSO.psd1`.
86
-
5. Run PowerShell as an Administrator. In PowerShell, call `New-AzureADSSOAuthenticationContext`. This command should give you a popup to enter your tenant's Global Administrator credentials.
87
-
6. Call `Get-AzureADSSOStatus`. This command provides you the list of AD forests (look at the "Domains" list) on which this feature has been enabled.
82
+
1. First, download, and install [Azure AD PowerShell](https://docs.microsoft.com/powershell/azure/active-directory/overview).
83
+
2. Navigate to the `%programfiles%\Microsoft Azure Active Directory Connect` folder.
84
+
3. Import the Seamless SSO PowerShell module using this command: `Import-Module .\AzureADSSO.psd1`.
85
+
4. Run PowerShell as an Administrator. In PowerShell, call `New-AzureADSSOAuthenticationContext`. This command should give you a popup to enter your tenant's Global Administrator credentials.
86
+
5. Call `Get-AzureADSSOStatus`. This command provides you the list of AD forests (look at the "Domains" list) on which this feature has been enabled.
88
87
89
88
### Step 2. Update the Kerberos decryption key on each AD forest that it was set it up on
90
89
@@ -118,26 +117,24 @@ To complete the clean-up process, follow steps 2 and 3 on the on-premises server
118
117
119
118
Run the following steps on the on-premises server where you are running Azure AD Connect:
120
119
121
-
1. First, download, and install the [Microsoft Online Services Sign-In Assistant](http://go.microsoft.com/fwlink/?LinkID=286152).
122
-
2. Then download and install the [64-bit Azure Active Directory module for Windows PowerShell](http://go.microsoft.com/fwlink/p/?linkid=236297).
123
-
3. Navigate to the `%programfiles%\Microsoft Azure Active Directory Connect` folder.
124
-
4. Import the Seamless SSO PowerShell module using this command: `Import-Module .\AzureADSSO.psd1`.
125
-
5. Run PowerShell as an Administrator. In PowerShell, call `New-AzureADSSOAuthenticationContext`. This command should give you a popup to enter your tenant's Global Administrator credentials.
126
-
6. Call `Enable-AzureADSSO -Enable $false`.
120
+
1. First, download, and install [Azure AD PowerShell](https://docs.microsoft.com/powershell/azure/active-directory/overview).
121
+
2. Navigate to the `%programfiles%\Microsoft Azure Active Directory Connect` folder.
122
+
3. Import the Seamless SSO PowerShell module using this command: `Import-Module .\AzureADSSO.psd1`.
123
+
4. Run PowerShell as an Administrator. In PowerShell, call `New-AzureADSSOAuthenticationContext`. This command should give you a popup to enter your tenant's Global Administrator credentials.
124
+
5. Call `Enable-AzureADSSO -Enable $false`.
127
125
128
126
>[!IMPORTANT]
129
127
>Disabling Seamless SSO using PowerShell will not change the state in Azure AD Connect. Seamless SSO will show as enabled in the **Change user sign-in** page.
130
128
131
129
### Step 2. Get list of AD forests where Seamless SSO has been enabled
132
130
133
-
Follow steps 1 through 5 below if you have disabled Seamless SSO using Azure AD Connect. If you have disabled Seamless SSO using PowerShell instead, jump ahead to step 6 below.
131
+
Follow tasks 1 through 4 below if you have disabled Seamless SSO using Azure AD Connect. If you have disabled Seamless SSO using PowerShell instead, jump ahead to task 5 below.
134
132
135
-
1. First, download, and install the [Microsoft Online Services Sign-In Assistant](http://go.microsoft.com/fwlink/?LinkID=286152).
136
-
2. Then download and install the [64-bit Azure Active Directory module for Windows PowerShell](http://go.microsoft.com/fwlink/p/?linkid=236297).
137
-
3. Navigate to the `%programfiles%\Microsoft Azure Active Directory Connect` folder.
138
-
4. Import the Seamless SSO PowerShell module using this command: `Import-Module .\AzureADSSO.psd1`.
139
-
5. Run PowerShell as an Administrator. In PowerShell, call `New-AzureADSSOAuthenticationContext`. This command should give you a popup to enter your tenant's Global Administrator credentials.
140
-
6. Call `Get-AzureADSSOStatus`. This command provides you the list of AD forests (look at the "Domains" list) on which this feature has been enabled.
133
+
1. First, download, and install [Azure AD PowerShell](https://docs.microsoft.com/powershell/azure/active-directory/overview).
134
+
2. Navigate to the `%programfiles%\Microsoft Azure Active Directory Connect` folder.
135
+
3. Import the Seamless SSO PowerShell module using this command: `Import-Module .\AzureADSSO.psd1`.
136
+
4. Run PowerShell as an Administrator. In PowerShell, call `New-AzureADSSOAuthenticationContext`. This command should give you a popup to enter your tenant's Global Administrator credentials.
137
+
5. Call `Get-AzureADSSOStatus`. This command provides you the list of AD forests (look at the "Domains" list) on which this feature has been enabled.
141
138
142
139
### Step 3. Manually delete the `AZUREADSSOACCT` computer account from each AD forest that you see listed.
0 commit comments