You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-password-ban-bad-on-premises-deploy.md
+8-6Lines changed: 8 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -102,8 +102,8 @@ There are two required installers for Azure AD password protection. They're avai
102
102
1. Choose one or more servers to host the proxy service for password protection.
103
103
* Each such service can only provide password policies for a single forest. The host machine must be joined to a domain in that forest. Root and child domains are both supported. You need network connectivity between at least one DC in each domain of the forest and the password protection machine.
104
104
* You can run the proxy service on a domain controller for testing. But that domain controller then requires internet connectivity, which can be a security concern. We recommend this configuration for testing only.
105
-
* It is not supported to run the proxy service on a read-only domain controller.
106
105
* We recommend at least two proxy servers for redundancy. See [High availability](howto-password-ban-bad-on-premises-deploy.md#high-availability).
106
+
* It is not supported to run the proxy service on a read-only domain controller.
107
107
108
108
1. Install the Azure AD Password Protection Proxy service using the `AzureADPasswordProtectionProxySetup.exe` software installer.
109
109
* The software installation does not require a reboot. The software installation may be automated using standard MSI procedures, for example:
@@ -131,11 +131,11 @@ There are two required installers for Azure AD password protection. They're avai
131
131
132
132
`Register-AzureADPasswordProtectionProxy`
133
133
134
-
This cmdlet requires global administrator credentials for your Azure tenant. You also need on-premises Active Directory domain administrator privileges in the forest root domain. You must also run this cmdlet using an account with local administrator privileges.
134
+
This cmdlet requires global administrator credentials for your Azure tenant. You also need on-premises Active Directory domain administrator privileges in the forest root domain. This cmdlet must also be run using an account with local administrator privileges.
135
135
136
136
After this command succeeds once for a proxy service, additional invocations of it will succeed but are unnecessary.
137
137
138
-
The `Register-AzureADPasswordProtectionProxy` cmdlet supports the following three authentication modes. The first two modes support Azure Multi-Factor Authentication but the third mode does not. Please see comments below for more details.
138
+
The `Register-AzureADPasswordProtectionProxy` cmdlet supports the following three authentication modes. The first two modes support Azure Multi-Factor Authentication but the third mode does not. See comments below for more details.
139
139
140
140
* Interactive authentication mode:
141
141
@@ -177,11 +177,11 @@ There are two required installers for Azure AD password protection. They're avai
177
177
> There might be a noticeable delay before completion the first time that this cmdlet is run for a specific Azure tenant. Unless a failure is reported, don't worry about this delay.
178
178
179
179
1. Register the forest.
180
-
* You must initialize the on-premises Active Directory forest with the necessary credentials to communicate with Azure by using the `Register-AzureADPasswordProtectionForest` PowerShell cmdlet.
180
+
* Initialize the on-premises Active Directory forest with the necessary credentials to communicate with Azure by using the `Register-AzureADPasswordProtectionForest` PowerShell cmdlet.
181
181
182
182
The cmdlet requires global administrator credentials for your Azure tenant. You must also run this cmdlet using an account with local administrator privileges. It also requires on-premises Active Directory Enterprise Administrator privileges. This step is run once per forest.
183
183
184
-
The `Register-AzureADPasswordProtectionForest` cmdlet supports the following three authentication modes. The first two modes support Azure Multi-Factor Authentication but the third mode does not. Please see comments below for more details.
184
+
The `Register-AzureADPasswordProtectionForest` cmdlet supports the following three authentication modes. The first two modes support Azure Multi-Factor Authentication but the third mode does not. See comments below for more details.
185
185
186
186
* Interactive authentication mode:
187
187
@@ -264,7 +264,7 @@ There are two required installers for Azure AD password protection. They're avai
264
264
The proxy service doesn't support the use of specific credentials for connecting to an HTTP proxy.
265
265
266
266
1. Optional: Configure the proxy service for password protection to listen on a specific port.
267
-
* The DC Agent software for password protection on the domain controllers uses RPC over TCP to communicate with the proxy service. By default, the proxy service listens on any available dynamic RPC endpoint. But you can configure the service to listen on a specific TCP port, if this is necessary because of networking topology or firewall requirements in your environment.
267
+
* The DC Agent software for password protection on the domain controllers uses RPC over TCP to communicate with the proxy service. By default, the proxy service listens on any available dynamic RPC endpoint. You can configure the service to listen on a specific TCP port, if necessary due to networking topology or firewall requirements in your environment.
268
268
* <a id="static" /></a>To configure the service to run under a static port, use the `Set-AzureADPasswordProtectionProxyConfiguration` cmdlet.
269
269
270
270
```powershell
@@ -342,6 +342,8 @@ There are no additional requirements to deploy Azure AD password protection acro
342
342
343
343
Password changes/sets are not processed and persisted on read-only domain controllers (RODCs). They are forwarded to writable domain controllers. So, you don't have to install the DC Agent software on RODCs.
344
344
345
+
It is not supported to run the proxy service on a read-only domain controller.
346
+
345
347
## High availability
346
348
347
349
The main availability concern for password protection is the availability of proxy servers when the domain controllers in a forest try to download new policies or other data from Azure. Each DC Agent uses a simple round-robin-style algorithm when deciding which proxy server to call. The Agent skips proxy servers that aren't responding. For most fully connected Active Directory deployments that have healthy replication of both directory and sysvol folder state, two proxy servers is enough to ensure availability. This results in timely download of new policies and other data. But you can deploy additional proxy servers.
0 commit comments