You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/devices/azureadjoin-plan.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -190,7 +190,7 @@ Starting Windows 10 2004 update, users can also use remote desktop from an Azure
190
190
Currently, Azure AD joined devices don't support RADIUS authentication for connecting to Wi-Fi access points, since RADIUS relies on presence of an on-premises computer object. As an alternative, you can use certificates pushed via Intune or user credentials to authenticate to Wi-Fi.
191
191
192
192
## Understand your provisioning options
193
-
**Note**: Azure AD joined devices cannot be deployed using System Preparation Tool (Sysprep) or similar imaging tools
193
+
**Note**: Azure AD joined devices can’t be deployed using System Preparation Tool (Sysprep) or similar imaging tools
194
194
195
195
You can provision Azure AD joined devices using the following approaches:
196
196
@@ -209,7 +209,7 @@ Here’s a comparison of these three approaches
209
209
| Require device OEM support | No | Yes | No |
210
210
| Supported versions | 1511+ | 1709+ | 1703+ |
211
211
212
-
Choose your deployment approach or approaches by reviewing the table above and reviewing the following considerations for adopting either approach:
212
+
Choose your deployment approach or approaches by reviewing the previous table and reviewing the following considerations for adopting either approach:
213
213
214
214
- Are your users tech savvy to go through the setup themselves?
215
215
- Self-service can work best for these users. Consider Windows Autopilot to enhance the user experience.
Copy file name to clipboardExpand all lines: articles/active-directory/devices/howto-hybrid-azure-ad-join.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -44,7 +44,7 @@ Hybrid Azure AD join requires devices to have access to the following Microsoft
44
44
45
45
If your organization requires access to the internet via an outbound proxy, you can use [Web Proxy Auto-Discovery (WPAD)](/previous-versions/tn-archive/cc995261(v=technet.10)) to enable Windows 10 computers for device registration with Azure AD. To address issues configuring and managing WPAD, see [Troubleshooting Automatic Detection](/previous-versions/tn-archive/cc302643(v=technet.10)).
46
46
47
-
If you don't use WPAD, you can configure WinHTTP proxy settings on your computer beginning with Windows 10 1709. For more information, see [WinHTTP Proxy Settings deployed by GPO](/archive/blogs/netgeeks/winhttp-proxy-settings-deployed-by-gpo).
47
+
If you don't use WPAD, you can configure WinHTTP proxy settings on your computer with a Group Policy Object (GPO) beginning with Windows 10 1709. For more information, see [WinHTTP Proxy Settings deployed by GPO](/archive/blogs/netgeeks/winhttp-proxy-settings-deployed-by-gpo).
48
48
49
49
> [!NOTE]
50
50
> If you configure proxy settings on your computer by using WinHTTP settings, any computers that can't connect to the configured proxy will fail to connect to the internet.
@@ -119,7 +119,7 @@ With Windows 10 1803 or newer, if instantaneous hybrid Azure AD join for a feder
119
119
120
120
## Other scenarios
121
121
122
-
Organizations who may wish to test hybrid Azure AD join on a subset of their environment before a full rollout, the steps to complete a targeted deployment can be found in the article [Hybrid Azure AD join targeted deployment](hybrid-azuread-join-control.md).
122
+
Organizations can test hybrid Azure AD join on a subset of their environment before a full rollout. The steps to complete a targeted deployment can be found in the article [Hybrid Azure AD join targeted deployment](hybrid-azuread-join-control.md). Organizations should include a sample of users from varying roles and profiles in this pilot group. A targeted rollout will help identify any issues your plan may not have addressed before you enable for the entire organization.
123
123
124
124
Some organizations may not be able to use Azure AD Connect to configure AD FS, the steps to configure the claims manually can be found in the article [Configure hybrid Azure Active Directory join manually](hybrid-azuread-join-manual.md).
Copy file name to clipboardExpand all lines: articles/active-directory/devices/hybrid-azuread-join-control.md
+30-30Lines changed: 30 additions & 30 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,9 +25,9 @@ For devices running Windows 10, the minimum supported version is Windows 10 (ver
25
25
26
26
To do a targeted deployment of hybrid Azure AD join on Windows current devices, you need to:
27
27
28
-
1. Clear the Service Connection Point (SCP) entry from Active Directory (AD) if it exists
29
-
1. Configure client-side registry setting for SCP on your domain-joined computers using a Group Policy Object (GPO)
30
-
1. If you're using Active Directory Federation Services (AD FS), you must also configure the client-side registry setting for SCP on your AD FS server using a GPO
28
+
1. Clear the Service Connection Point (SCP) entry from Active Directory (AD) if it exists.
29
+
1. Configure client-side registry setting for SCP on your domain-joined computers using a Group Policy Object (GPO).
30
+
1. If you're using Active Directory Federation Services (AD FS), you must also configure the client-side registry setting for SCP on your AD FS server using a GPO.
31
31
1. You may also need to [customize synchronization options](../hybrid/how-to-connect-post-installation.md#additional-tasks-available-in-azure-ad-connect) in Azure AD Connect to enable device synchronization.
32
32
33
33
### Clear the SCP from AD
@@ -36,43 +36,43 @@ Use the Active Directory Services Interfaces Editor (ADSI Edit) to modify the SC
36
36
37
37
1. Launch the **ADSI Edit** desktop application from and administrative workstation or a domain controller as an Enterprise Administrator.
38
38
1. Connect to the **Configuration Naming Context** of your domain.
39
-
1. Browse to **CN=Configuration,DC=contoso,DC=com** > **CN=Services** > **CN=Device Registration Configuration**
40
-
1. Right-click on the leaf object **CN=62a0ff2e-97b9-4513-943f-0d221bd30080** and select **Properties**
41
-
1. Select **keywords** from the **Attribute Editor** window and select **Edit**
42
-
1. Select the values of **azureADId** and **azureADName** (one at a time) and select **Remove**
43
-
1. Close **ADSI Edit**
39
+
1. Browse to **CN=Configuration,DC=contoso,DC=com** > **CN=Services** > **CN=Device Registration Configuration**.
40
+
1. Right-click on the leaf object **CN=62a0ff2e-97b9-4513-943f-0d221bd30080** and select **Properties**.
41
+
1. Select **keywords** from the **Attribute Editor** window and select **Edit**.
42
+
1. Select the values of **azureADId** and **azureADName** (one at a time) and select **Remove**.
43
+
1. Close **ADSI Edit**.
44
44
45
45
### Configure client-side registry setting for SCP
46
46
47
47
Use the following example to create a Group Policy Object (GPO) to deploy a registry setting configuring an SCP entry in the registry of your devices.
48
48
49
49
1. Open a Group Policy Management console and create a new Group Policy Object in your domain.
50
50
1. Provide your newly created GPO a name (for example, ClientSideSCP).
51
-
1. Edit the GPO and locate the following path: **Computer Configuration** > **Preferences** > **Windows Settings** > **Registry**
52
-
1. Right-click on the Registry and select **New** > **Registry Item**
53
-
1. On the **General** tab, configure the following
1. Value data: The GUID or **Tenant ID** of your Azure AD instance (This value can be found in the **Azure portal** > **Azure Active Directory** > **Properties** > **Tenant ID**)
60
-
1. Select **OK**
61
-
1. Right-click on the Registry and select **New** > **Registry Item**
62
-
1. On the **General** tab, configure the following
1. Value data: Your verified **domain name** if you're using federated environment such as AD FS. Your verified **domain name** or your onmicrosoft.com domain name for example,`contoso.onmicrosoft.com` if you're using managed environment
69
-
1. Select **OK**
70
-
1. Close the editor for the newly created GPO
71
-
1. Link the newly created GPO to the correct OU containing domain-joined computers that belong to your controlled rollout population
51
+
1. Edit the GPO and locate the following path: **Computer Configuration** > **Preferences** > **Windows Settings** > **Registry**.
52
+
1. Right-click on the Registry and select **New** > **Registry Item**.
53
+
1. On the **General** tab, configure the following.
1. Value data: The GUID or **Tenant ID** of your Azure AD instance (This value can be found in the **Azure portal** > **Azure Active Directory** > **Properties** > **Tenant ID**).
60
+
1. Select **OK**.
61
+
1. Right-click on the Registry and select **New** > **Registry Item**.
62
+
1. On the **General** tab, configure the following.
1. Value data: Your verified **domain name** if you're using federated environment such as AD FS. Your verified **domain name** or your onmicrosoft.com domain name, for example `contoso.onmicrosoft.com` if you're using managed environment.
69
+
1. Select **OK**.
70
+
1. Close the editor for the newly created GPO.
71
+
1. Link the newly created GPO to the correct OU containing domain-joined computers that belong to your controlled rollout population.
72
72
73
73
### Configure AD FS settings
74
74
75
-
If you're using AD FS, you first need to configure client-side SCP using the instructions mentioned above by linking the GPO to your AD FS servers. The SCP object defines the source of authority for device objects. It can be on-premises or Azure AD. When client-side SCP is configured for AD FS, the source for device objects is established as Azure AD.
75
+
If you're using AD FS, you first need to configure client-side SCP using the instructions mentioned earlier by linking the GPO to your AD FS servers. The SCP object defines the source of authority for device objects. It can be on-premises or Azure AD. When client-side SCP is configured for AD FS, the source for device objects is established as Azure AD.
76
76
77
77
> [!NOTE]
78
78
> If you failed to configure client-side SCP on your AD FS servers, the source for device identities would be considered as on-premises. ADFS will then start deleting device objects from on-premises directory after the stipulated period defined in the ADFS Device Registration's attribute "MaximumInactiveDays". ADFS Device Registration objects can be found using the [Get-AdfsDeviceRegistration cmdlet](/powershell/module/adfs/get-adfsdeviceregistration).
Copy file name to clipboardExpand all lines: articles/active-directory/devices/hybrid-azuread-join-plan.md
+10-11Lines changed: 10 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -65,10 +65,10 @@ For devices running the Windows desktop operating system, supported versions are
65
65
### Windows down-level devices
66
66
67
67
- Windows 8.1
68
-
- Windows 7 support ended on January 14, 2020. For more information, see [Support for Windows 7 has ended](https://support.microsoft.com/en-us/help/4057281/windows-7-support-ended-on-january-14-2020).
68
+
- Windows 7 support ended on January 14, 2020. For more information, see [Support for Windows 7 has ended](https://support.microsoft.com/en-us/help/4057281/windows-7-support-ended-on-january-14-2020)
69
69
- Windows Server 2012 R2
70
70
- Windows Server 2012
71
-
- Windows Server 2008 R2. For support information on Windows Server 2008 and 2008 R2, see [Prepare for Windows Server 2008 end of support](https://www.microsoft.com/cloud-platform/windows-server-2008).
71
+
- Windows Server 2008 R2 for support information on Windows Server 2008 and 2008 R2, see [Prepare for Windows Server 2008 end of support](https://www.microsoft.com/cloud-platform/windows-server-2008)
72
72
73
73
As a first planning step, you should review your environment and determine whether you need to support Windows down-level devices.
74
74
@@ -87,16 +87,16 @@ As a first planning step, you should review your environment and determine wheth
87
87
88
88
- If you're relying on a Virtual Machine (VM) snapshot to create more VMs, make sure that snapshot isn't from a VM that is already registered with Azure AD as hybrid Azure AD joined.
89
89
90
-
- If you're using [Unified Write Filter](/windows-hardware/customize/enterprise/unified-write-filter) and similar technologies that clear changes to the disk at reboot, they must be applied after the device is hybrid Azure AD joined. Enabling such technologies before completion of hybrid Azure AD join will result in the device getting unjoined on every reboot
90
+
- If you're using [Unified Write Filter](/windows-hardware/customize/enterprise/unified-write-filter) and similar technologies that clear changes to the disk at reboot, they must be applied after the device is hybrid Azure AD joined. Enabling such technologies before completion of hybrid Azure AD join will result in the device getting unjoined on every reboot.
91
91
92
92
### Handling devices with Azure AD registered state
93
93
94
-
If your Windows 10 domain joined devices are [Azure AD registered](concept-azure-ad-register.md) to your tenant, it could lead to a dual state of hybrid Azure AD joined and Azure AD registered device. We recommend upgrading to Windows 10 1803 (with KB4489894 applied) or above to automatically address this scenario. In pre-1803 releases, you'll need to remove the Azure AD registered state manually before enabling hybrid Azure AD join. In 1803 and above releases, the following changes have been made to avoid this dual state:
94
+
If your Windows 10 domain joined devices are [Azure AD registered](concept-azure-ad-register.md) to your tenant, it could lead to a dual state of hybrid Azure AD joined and Azure AD registered device. We recommend upgrading to Windows 10 1803 (with KB4489894 applied) or newer to automatically address this scenario. In pre-1803 releases, you'll need to remove the Azure AD registered state manually before enabling hybrid Azure AD join. In 1803 and above releases, the following changes have been made to avoid this dual state:
95
95
96
96
- Any existing Azure AD registered state for a user would be automatically removed <i>after the device is hybrid Azure AD joined and the same user logs in</i>. For example, if User A had an Azure AD registered state on the device, the dual state for User A is cleaned up only when User A logs in to the device. If there are multiple users on the same device, the dual state is cleaned up individually when those users log in. After removing the Azure AD registered state, Windows 10 will unenroll the device from Intune or other MDM, if the enrollment happened as part of the Azure AD registration via auto-enrollment.
97
-
- Azure AD registered state on any local accounts on the device is not impacted by this change. Only applicable to domain accounts. Azure AD registered state on local accounts isn't removed automatically even after user logon, since the user isn't a domain user.
97
+
- Azure AD registered state on any local accounts on the device isn’t impacted by this change. Only applicable to domain accounts. Azure AD registered state on local accounts isn't removed automatically even after user logon, since the user isn't a domain user.
98
98
- You can prevent your domain joined device from being Azure AD registered by adding the following registry value to HKLM\SOFTWARE\Policies\Microsoft\Windows\WorkplaceJoin: "BlockAADWorkplaceJoin"=dword:00000001.
99
-
- In Windows 10 1803, if you have Windows Hello for Business configured, the user needs to reconfigure Windows Hello for Business after the dual state cleanup. This issue has been addressed with KB4512509
99
+
- In Windows 10 1803, if you have Windows Hello for Business configured, the user needs to reconfigure Windows Hello for Business after the dual state cleanup. This issue has been addressed with KB4512509.
100
100
101
101
> [!NOTE]
102
102
> Even though Windows 10 automatically removes the Azure AD registered state locally, the device object in Azure AD is not immediately deleted if it is managed by Intune. You can validate the removal of Azure AD registered state by running dsregcmd /status and consider the device not to be Azure AD registered based on that.
@@ -139,9 +139,8 @@ A managed environment can be deployed either through [Password Hash Sync (PHS)](
139
139
These scenarios don't require you to configure a federation server for authentication.
140
140
141
141
> [!NOTE]
142
-
> [Cloud authentication using Staged rollout](../hybrid/how-to-connect-staged-rollout.md) is only supported starting Windows 10 1903 update
143
-
144
-
> [!NOTE]
142
+
> [Cloud authentication using Staged rollout](../hybrid/how-to-connect-staged-rollout.md) is only supported starting at the Windows 10 1903 update.
143
+
>
145
144
> Azure AD doesn't support smartcards or certificates in managed domains.
146
145
147
146
### Federated environment
@@ -167,13 +166,13 @@ Beginning with version 1.1.819.0, Azure AD Connect provides you with a wizard to
167
166
168
167
Sometimes, on-premises AD users UPNs are different from your Azure AD UPNs. In these cases, Windows 10 hybrid Azure AD join provides limited support for on-premises AD UPNs based on the [authentication method](../hybrid/choose-ad-authn.md), domain type, and Windows 10 version. There are two types of on-premises AD UPNs that can exist in your environment:
169
168
170
-
- Routable users UPN: A routable UPN has a valid verified domain, that is registered with a domain registrar. For example, if contoso.com is the primary domain in Azure AD, contoso.org is the primary domain in on-premises AD owned by Contoso and [verified in Azure AD](../fundamentals/add-custom-domain.md)
169
+
- Routable users UPN: A routable UPN has a valid verified domain, that is registered with a domain registrar. For example, if contoso.com is the primary domain in Azure AD, contoso.org is the primary domain in on-premises AD owned by Contoso and [verified in Azure AD](../fundamentals/add-custom-domain.md).
171
170
- Non-routable users UPN: A non-routable UPN doesn't have a verified domain and is applicable only within your organization's private network. For example, if contoso.com is the primary domain in Azure AD and contoso.local is the primary domain in on-premises AD but isn't a verifiable domain in the internet and only used within Contoso's network.
172
171
173
172
> [!NOTE]
174
173
> The information in this section applies only to an on-premises users UPN. It isn't applicable to an on-premises computer domain suffix (example: computer1.contoso.local).
175
174
176
-
The table below provides details on support for these on-premises AD UPNs in Windows 10 hybrid Azure AD join
175
+
The following table provides details on support for these on-premises AD UPNs in Windows 10 hybrid Azure AD join
177
176
178
177
| Type of on-premises AD UPN | Domain type | Windows 10 version | Description |
0 commit comments