Skip to content

Commit 342167a

Browse files
Learn Build Service GitHub AppLearn Build Service GitHub App
authored andcommitted
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 25b4b23 + adc01a5 commit 342167a

File tree

350 files changed

+918
-822
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

350 files changed

+918
-822
lines changed

articles/active-directory/authentication/how-to-mfa-number-match.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to use number matching in MFA notifications
44
ms.service: active-directory
55
ms.subservice: authentication
66
ms.topic: conceptual
7-
ms.date: 01/06/2023
7+
ms.date: 01/13/2023
88
ms.author: justinha
99
author: mjsantani
1010
ms.collection: M365-identity-device-management
@@ -64,6 +64,7 @@ AD FS adapter will require number matching on supported versions of Windows Serv
6464
|---------|--------|
6565
| Windows Server 2022 | [November 9, 2021—KB5007205 (OS Build 20348.350)](https://support.microsoft.com/topic/november-9-2021-kb5007205-os-build-20348-350-af102e6f-cc7c-4cd4-8dc2-8b08d73d2b31) |
6666
| Windows Server 2019 | [November 9, 2021—KB5007206 (OS Build 17763.2300)](https://support.microsoft.com/topic/november-9-2021-kb5007206-os-build-17763-2300-c63b76fa-a9b4-4685-b17c-7d866bb50e48) |
67+
| Windows Server 2016 | [October 12, 2021—KB5006669 (OS Build 14393.4704)](https://support.microsoft.com/topic/october-12-2021-kb5006669-os-build-14393-4704-bcc95546-0768-49ae-bec9-240cc59df384) |
6768

6869
### NPS extension
6970

articles/active-directory/cloud-sync/how-to-install.md

Lines changed: 23 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -17,67 +17,66 @@ ms.collection: M365-identity-device-management
1717

1818
This article walks you through the installation process for the Azure Active Directory (Azure AD) Connect provisioning agent and how to initially configure it in the Azure portal.
1919

20-
>[!IMPORTANT]
21-
>The following installation instructions assume that all the [prerequisites](how-to-prerequisites.md) were met.
20+
> [!IMPORTANT]
21+
> The following installation instructions assume that you've met all the [prerequisites](how-to-prerequisites.md).
2222
2323
>[!NOTE]
24-
>This article deals with installing the provisioning agent by using the wizard. For information on installing the Azure AD Connect provisioning agent by using a command-line interface (CLI), see [Install the Azure AD Connect provisioning agent by using a CLI and PowerShell](how-to-install-pshell.md).
24+
>This article deals with installing the provisioning agent by using the wizard. For information about installing the Azure AD Connect provisioning agent by using a CLI, see [Install the Azure AD Connect provisioning agent by using a CLI and PowerShell](how-to-install-pshell.md).
2525
26-
For more information and an example, see the following video.
26+
For more information and an example, view the following video:
2727

2828
> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RWK5mR]
2929
3030
## Group Managed Service Accounts
31-
A Group Managed Service Account (gMSA) is a managed domain account that provides automatic password management, simplified service principal name (SPN) management, and the ability to delegate the management to other administrators. It also extends this functionality over multiple servers. Azure AD Connect cloud sync supports and recommends the use of a Group Managed Service Account for running the agent. For more information on a Group Managed Service Account, see [Group Managed Service Accounts](how-to-prerequisites.md#group-managed-service-accounts).
31+
A group Managed Service Account (gMSA) is a managed domain account that provides automatic password management, simplified service principal name (SPN) management, and the ability to delegate the management to other administrators. A gMSA also extends this functionality over multiple servers. Azure AD Connect cloud sync supports and recommends the use of a gMSA for running the agent. For more information, see [Group Managed Service Accounts](how-to-prerequisites.md#group-managed-service-accounts).
3232

3333

34-
### Upgrade an existing agent to use the gMSA
35-
To upgrade an existing agent to use the Group Managed Service Account created during installation, update the agent service to the latest version by running AADConnectProvisioningAgent.msi. Now run through the installation wizard again and provide the credentials to create the account when prompted.
34+
### Update an existing agent to use the gMSA
35+
To update an existing agent to use the Group Managed Service Account created during installation, upgrade the agent service to the latest version by running *AADConnectProvisioningAgent.msi*. Now run through the installation wizard again and provide the credentials to create the account when you're prompted to do so.
3636

3737
## Install the agent
3838

3939
[!INCLUDE [active-directory-cloud-sync-how-to-install](../../../includes/active-directory-cloud-sync-how-to-install.md)]
4040

41-
## Verify agent installation
41+
## Verify the agent installation
4242

4343
[!INCLUDE [active-directory-cloud-sync-how-to-verify-installation](../../../includes/active-directory-cloud-sync-how-to-verify-installation.md)]
4444

4545
>[!IMPORTANT]
46-
>The agent has been installed, but it must be configured and enabled before it will start synchronizing users. To configure a new agent, see [Create a new configuration for Azure AD Connect cloud sync](how-to-configure.md).
46+
> After you've installed the agent, you must configure and enable it before it will start synchronizing users. To configure a new agent, see [Create a new configuration for Azure AD Connect cloud sync](how-to-configure.md).
4747
4848
## Enable password writeback in Azure AD Connect cloud sync
4949

50-
To use password writeback and enable the self-service password reset (SSPR) service to detect the cloud sync agent, you need to use the `Set-AADCloudSyncPasswordWritebackConfiguration` cmdlet and tenant’s global administrator credentials:
50+
To use *password writeback* and enable the self-service password reset (SSPR) service to detect the cloud sync agent, use the `Set-AADCloudSyncPasswordWritebackConfiguration` cmdlet and the tenant’s global administrator credentials:
5151

5252
```
5353
Import-Module "C:\\Program Files\\Microsoft Azure AD Connect Provisioning Agent\\Microsoft.CloudSync.Powershell.dll"
5454
Set-AADCloudSyncPasswordWritebackConfiguration -Enable $true -Credential $(Get-Credential)
5555
```
5656

57-
For more information on using password writeback with Azure AD Connect cloud sync, see [Tutorial: Enable cloud sync self-service password reset writeback to an on-premises environment (preview)](../../active-directory/authentication/tutorial-enable-cloud-sync-sspr-writeback.md).
57+
For more information about using password writeback with Azure AD Connect cloud sync, see [Tutorial: Enable cloud sync self-service password reset writeback to an on-premises environment (preview)](../../active-directory/authentication/tutorial-enable-cloud-sync-sspr-writeback.md).
5858

59-
## Installing against US government cloud
59+
## Install an agent in the US government cloud
6060

61-
By default, the Azure Active Directory (Azure AD) Connect provisioning agent installs against the default Azure cloud environment. If you're installing the agent for use in the US government, follow these steps:
61+
By default, the Azure AD Connect provisioning agent is installed in the default Azure environment. If you're installing the agent for US government use, make this change in step 7 of the preceding installation procedure:
6262

63-
- In step #7 above, instead of select **Open file**, go to start run and navigate to the **AADConnectProvisioningAgentSetup.exe** file. In the run box, after the executable, enter **ENVIRONMENTNAME=AzureUSGovernment** and select **Ok**.
63+
- Instead of selecting **Open file**, select **Start** > **Run**, and then go to the *AADConnectProvisioningAgentSetup.exe* file. In the **Run** box, after the executable, enter **ENVIRONMENTNAME=AzureUSGovernment**, and then select **OK**.
6464

65-
[![Screenshot showing US government cloud install.](media/how-to-install/new-install-12.png)](media/how-to-install/new-install-12.png#lightbox)
65+
[![Screenshot that shows how to install an agent in the US government cloud.](media/how-to-install/new-install-12.png)](media/how-to-install/new-install-12.png#lightbox)
6666

6767
## Password hash synchronization and FIPS with cloud sync
6868

69-
If your server has been locked down according to Federal Information Processing Standard (FIPS), then MD5 is disabled.
70-
69+
If your server has been locked down according to the Federal Information Processing Standard (FIPS), MD5 (message-digest algorithm 5) is disabled.
7170

72-
To enable MD5 for password hash synchronization, perform the following steps:
71+
To enable MD5 for password hash synchronization, do the following:
7372

7473
1. Go to %programfiles%\Microsoft Azure AD Connect Provisioning Agent.
75-
2. Open AADConnectProvisioningAgent.exe.config.
76-
3. Go to the configuration/runtime node at the top of the file.
77-
4. Add the following node: `<enforceFIPSPolicy enabled="false"/>`
78-
5. Save your changes.
74+
1. Open *AADConnectProvisioningAgent.exe.config*.
75+
1. Go to the configuration/runtime node at the top of the file.
76+
1. Add the `<enforceFIPSPolicy enabled="false"/>` node.
77+
1. Save your changes.
7978

80-
For reference, this snippet is what it should look like:
79+
For reference, your code should look like the following snippet:
8180

8281
```xml
8382
<configuration>
@@ -87,7 +86,7 @@ For reference, this snippet is what it should look like:
8786
</configuration>
8887
```
8988

90-
For information about security and FIPS, see [Azure AD password hash sync, encryption, and FIPS compliance](https://blogs.technet.microsoft.com/enterprisemobility/2014/06/28/aad-password-sync-encryption-and-fips-compliance/).
89+
For more information about security and FIPS, see [Azure AD password hash sync, encryption, and FIPS compliance](https://blogs.technet.microsoft.com/enterprisemobility/2014/06/28/aad-password-sync-encryption-and-fips-compliance/).
9190

9291

9392
## Next steps

articles/active-directory/cloud-sync/tutorial-existing-forest.md

Lines changed: 45 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Tutorial - Integrate an existing forest and a new forest with a single Azure AD tenant using Azure AD Connect cloud sync.
2+
title: Tutorial - Integrate an existing forest and a new forest with a single Azure AD tenant by using Azure AD Connect cloud sync
33
description: Learn how to add cloud sync to an existing hybrid identity environment.
44
services: active-directory
55
author: billmath
@@ -13,43 +13,53 @@ ms.author: billmath
1313
ms.collection: M365-identity-device-management
1414
---
1515

16-
# Integrate an existing forest and a new forest with a single Azure AD tenant
16+
# Tutorial: Integrate an existing forest and a new forest with a single Azure AD tenant
1717

1818
This tutorial walks you through adding cloud sync to an existing hybrid identity environment.
1919

2020
![Diagram that shows the Azure AD Connect cloud sync flow.](media/tutorial-existing-forest/existing-forest-new-forest-2.png)
2121

2222
You can use the environment you create in this tutorial for testing or for getting more familiar with how a hybrid identity works.
2323

24-
In this scenario, there's an existing forest synced using Azure AD Connect sync to an Azure AD tenant. And you have a new forest that you want to sync to the same Azure AD tenant. You'll set up cloud sync for the new forest.
24+
In this scenario, you sync an existing forest with an Azure AD tenant by using Azure Active Directory (Azure AD) Connect. You want to sync a new forest with the same Azure AD tenant. You'll set up cloud sync for the new forest.
2525

2626
## Prerequisites
27-
### In the Azure Active Directory admin center
2827

29-
1. Create a cloud-only global administrator account on your Azure AD tenant. This way, you can manage the configuration of your tenant should your on-premises services fail or become unavailable. Learn about [adding a cloud-only global administrator account](../fundamentals/add-users-azure-active-directory.md). Completing this step is critical to ensure that you don't get locked out of your tenant.
30-
2. Add one or more [custom domain names](../fundamentals/add-custom-domain.md) to your Azure AD tenant. Your users can sign in with one of these domain names.
28+
Before you begin, set up your environments.
29+
30+
### In the Azure AD admin center
31+
32+
1. Create a cloud-only global administrator account on your Azure AD tenant.
33+
34+
This way, you can manage the configuration of your tenant if your on-premises services fail or become unavailable. [Learn how to add a cloud-only global administrator account](../fundamentals/add-users-azure-active-directory.md). Complete this step to ensure that you don't get locked out of your tenant.
35+
36+
1. Add one or more [custom domain names](../fundamentals/add-custom-domain.md) to your Azure AD tenant. Your users can sign in with one of these domain names.
3137

3238
### In your on-premises environment
3339

34-
1. Identify a domain-joined host server running Windows Server 2012 R2 or greater with minimum of 4-GB RAM and .NET 4.7.1+ runtime
40+
1. Identify a domain-joined host server that's running Windows Server 2012 R2 or later, with at least 4 GB of RAM and .NET 4.7.1+ runtime.
41+
42+
1. If there's a firewall between your servers and Azure AD, configure the following items:
3543

36-
2. If there's a firewall between your servers and Azure AD, configure the following items:
3744
- Ensure that agents can make *outbound* requests to Azure AD over the following ports:
3845

3946
| Port number | How it's used |
4047
| --- | --- |
41-
| **80** | Downloads the certificate revocation lists (CRLs) while validating the TLS/SSL certificate |
42-
| **443** | Handles all outbound communication with the service |
43-
| **8080** (optional) | Agents report their status every 10 minutes over port 8080, if port 443 is unavailable. This status is displayed on the Azure AD portal. |
48+
| **80** | Downloads the certificate revocation lists (CRLs) while it validates the TLS/SSL certificate. |
49+
| **443** | Handles all outbound communication with the service. |
50+
| **8080** (optional) | Agents report their status every 10 minutes over port 8080, if port 443 is unavailable. This status is displayed in the Azure AD portal. |
4451
4552
If your firewall enforces rules according to the originating users, open these ports for traffic from Windows services that run as a network service.
46-
- If your firewall or proxy allows you to specify safe suffixes, then add connections to **\*.msappproxy.net** and **\*.servicebus.windows.net**. If not, allow access to the [Azure datacenter IP ranges](https://www.microsoft.com/download/details.aspx?id=41653), which are updated weekly.
53+
54+
- If your firewall or proxy allows you to specify safe suffixes, add connections to **\*.msappproxy.net** and **\*.servicebus.windows.net**. If it doesn't, allow access to the [Azure datacenter IP ranges](https://www.microsoft.com/download/details.aspx?id=41653), which are updated weekly.
55+
4756
- Your agents need access to **login.windows.net** and **login.microsoftonline.com** for initial registration. Open your firewall for those URLs as well.
48-
- For certificate validation, unblock the following URLs: **mscrl.microsoft.com:80**, **crl.microsoft.com:80**, **ocsp.msocsp.com:80**, and **www\.microsoft.com:80**. Since these URLs are used for certificate validation with other Microsoft products, you may already have these URLs unblocked.
57+
58+
- For certificate validation, unblock the following URLs: **mscrl.microsoft.com:80**, **crl.microsoft.com:80**, **ocsp.msocsp.com:80**, and **www\.microsoft.com:80**. Because these URLs are used to validate certificates for other Microsoft products, you might already have these URLs unblocked.
4959

5060
## Install the Azure AD Connect provisioning agent
5161

52-
If you're using the [Basic AD and Azure environment](tutorial-basic-ad-azure.md) tutorial, it would be DC1. To install the agent, follow these steps:
62+
If you're using the [Basic Active Directory and Azure environment](tutorial-basic-ad-azure.md) tutorial, the agent is DC1. To install the agent, do the following:
5363

5464
[!INCLUDE [active-directory-cloud-sync-how-to-install](../../../includes/active-directory-cloud-sync-how-to-install.md)]
5565

@@ -59,43 +69,43 @@ If you're using the [Basic AD and Azure environment](tutorial-basic-ad-azure.md
5969
[!INCLUDE [active-directory-cloud-sync-how-to-verify-installation](../../../includes/active-directory-cloud-sync-how-to-verify-installation.md)]
6070

6171
## Configure Azure AD Connect cloud sync
62-
Use the following steps to configure provisioning
72+
73+
To configure the cloud sync setup, do the following:
6374

6475
1. Sign in to the Azure AD portal.
65-
2. Select **Azure Active Directory**
66-
3. Select **Azure AD Connect**
67-
4. Select **Manage cloud sync**
76+
1. Select **Azure Active Directory**.
77+
1. Select **Azure AD Connect**.
78+
1. Select **Manage cloud sync**.
6879

69-
![Screenshot showing "Manage cloud sync" link.](media/how-to-configure/manage-1.png)
80+
![Screenshot that highlights the "Manage cloud sync" link.](media/how-to-configure/manage-1.png)
7081

71-
5. Select **New Configuration**
82+
1. Select **New Configuration**.
7283

73-
![Screenshot of Azure AD Connect cloud sync screen with "New configuration" link highlighted.](media/tutorial-single-forest/configure-1.png)
84+
![Screenshot of the Azure AD Connect cloud sync page, with the "New configuration" link highlighted.](media/tutorial-single-forest/configure-1.png)
7485

75-
7. On the configuration screen, enter a **Notification email**, move the selector to **Enable** and select **Save**.
86+
1. On the **Configuration** page, enter a **Notification email**, move the selector to **Enable**, and then select **Save**.
7687

77-
![Screenshot of Configure screen with Notification email filled in and Enable selected.](media/how-to-configure/configure-2.png)
88+
![Screenshot of the "Edit provisioning configuration" page.](media/how-to-configure/configure-2.png)
7889

7990
1. The configuration status should now be **Healthy**.
8091

81-
![Screenshot of Azure AD Connect cloud sync screen showing Healthy status.](media/how-to-configure/manage-4.png)
82-
83-
## Verify users are created and synchronization is occurring
92+
![Screenshot of Azure AD Connect cloud sync page, showing a "Healthy" status.](media/how-to-configure/manage-4.png)
8493

85-
You'll now verify that the users that you had in our on-premises directory have been synchronized and now exist in our Azure AD tenant. This process may take a few hours to complete. To verify users are synchronized, do the following:
94+
## Verify that users are created and synchronization is occurring
8695

96+
You'll now verify that the users in your on-premises Active Directory have been synchronized and exist in your Azure AD tenant. This process might take a few hours to complete. To verify that the users are synchronized, do the following:
8797

88-
1. Browse to the [Azure portal](https://portal.azure.com) and sign in with an account that has an Azure subscription.
89-
2. On the left, select **Azure Active Directory**
90-
3. Under **Manage**, select **Users**.
91-
4. Verify that you see the new users in our tenant
98+
1. Sign in to the [Azure portal](https://portal.azure.com) with an account that has an Azure subscription.
99+
1. On the left pane, select **Azure Active Directory**.
100+
1. Under **Manage**, select **Users**.
101+
1. Verify that the new users are displayed in your tenant.
92102

93-
## Test signing in with one of our users
103+
## Test signing in with one of your users
94104

95-
1. Browse to [https://myapps.microsoft.com](https://myapps.microsoft.com)
96-
2. Sign in with a user account that was created in our new tenant. You'll need to sign in using the following format: ([email protected]). Use the same password that the user uses to sign in on-premises.
105+
1. Go to the [Microsoft My Apps](https://myapps.microsoft.com) page.
106+
1. Sign in with a user account that was created in your new tenant. You'll need to sign in by using the following format: *[email protected]*. Use the same password that the user uses to sign in on-premises.
97107

98-
![Screenshot that shows the my apps portal with a signed in users.](media/tutorial-single-forest/verify-1.png)
108+
![Screenshot that shows the My Apps portal with signed-in users.](media/tutorial-single-forest/verify-1.png)
99109

100110
You have now successfully set up a hybrid identity environment that you can use to test and familiarize yourself with what Azure has to offer.
101111

0 commit comments

Comments
 (0)