Skip to content

Commit 3ea5910

Browse files
authored
public repo/indent list items
1 parent 2ba9be7 commit 3ea5910

File tree

1 file changed

+12
-12
lines changed

1 file changed

+12
-12
lines changed

articles/active-directory/manage-apps/application-proxy-configure-single-sign-on-with-kcd.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -65,25 +65,25 @@ The Active Directory configuration varies, depending on whether your Application
6565
1. For a list of prerequisites for working with KCD across domains, see [Kerberos Constrained Delegation across domains](https://technet.microsoft.com/library/hh831477.aspx).
6666
2. Use the `principalsallowedtodelegateto` property of the service account (computer or dedicated domain user account) of the web application to enable Kerberos authentication delegation from the Application Proxy (connector). The application server is running in the context of `webserviceaccount` and the delegating server is `connectorcomputeraccount`. Run the commands below on a Domain Controller (running Windows Server 2012 R2 or later) in the domain of `webserviceaccount`. Use flat names (non UPN) for both accounts.
6767

68-
If the `webserviceaccount` is a computer account, use these commands:
68+
If the `webserviceaccount` is a computer account, use these commands:
6969

70-
```powershell
71-
$connector= Get-ADComputer -Identity connectorcomputeraccount -server dc.connectordomain.com
70+
```powershell
71+
$connector= Get-ADComputer -Identity connectorcomputeraccount -server dc.connectordomain.com
7272
73-
Set-ADComputer -Identity webserviceaccount -PrincipalsAllowedToDelegateToAccount $connector
73+
Set-ADComputer -Identity webserviceaccount -PrincipalsAllowedToDelegateToAccount $connector
7474
75-
Get-ADComputer webserviceaccount -Properties PrincipalsAllowedToDelegateToAccount
76-
```
75+
Get-ADComputer webserviceaccount -Properties PrincipalsAllowedToDelegateToAccount
76+
```
7777

78-
If the `webserviceaccount` is a user account, use these commands:
78+
If the `webserviceaccount` is a user account, use these commands:
7979

80-
```powershell
81-
$connector= Get-ADComputer -Identity connectorcomputeraccount -server dc.connectordomain.com
80+
```powershell
81+
$connector= Get-ADComputer -Identity connectorcomputeraccount -server dc.connectordomain.com
8282
83-
Set-ADUser -Identity webserviceaccount -PrincipalsAllowedToDelegateToAccount $connector
83+
Set-ADUser -Identity webserviceaccount -PrincipalsAllowedToDelegateToAccount $connector
8484
85-
Get-ADUser webserviceaccount -Properties PrincipalsAllowedToDelegateToAccount
86-
```
85+
Get-ADUser webserviceaccount -Properties PrincipalsAllowedToDelegateToAccount
86+
```
8787

8888
## Configure single sign-on
8989
1. Publish your application according to the instructions described in [Publish applications with Application Proxy](application-proxy-add-on-premises-application.md). Make sure to select **Azure Active Directory** as the **Preauthentication Method**.

0 commit comments

Comments
 (0)