You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/hybrid/how-to-connect-pta-quick-start.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -65,7 +65,7 @@ Ensure that the following prerequisites are in place.
65
65
- Your Authentication Agents need access to **login.windows.net** and **login.microsoftonline.com** for initial registration. Open your firewall for those URLs as well.
66
66
- For certificate validation, unblock the following URLs: **mscrl.microsoft.com:80**, **crl.microsoft.com:80**, **ocsp.msocsp.com:80**, and **www\.microsoft.com:80**. Since these URLs are used for certificate validation with other Microsoft products you may already have these URLs unblocked.
67
67
68
-
### Azure Government Cloud Prerequisite
68
+
### Azure Government cloud prerequisite
69
69
Prior to enabling Pass-through Authentication through Azure AD Connect with Step 2, download the latest release of the PTA agent from the Azure Portal. You need to ensure that your agent is versions **x.x.xxx.x** or later. To verify your agent see [Upgrade authentication agents](how-to-connect-pta-upgrade-preview-authentication-agents.md)
70
70
71
71
After downloading the latest release of the agent, proceed with the below instructions to configure Pass-Through Authentication through Azure AD Connect.
Copy file name to clipboardExpand all lines: articles/active-directory/hybrid/reference-connect-government-cloud.md
+7-6Lines changed: 7 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,21 +7,22 @@ manager: daveba
7
7
ms.service: active-directory
8
8
ms.workload: identity
9
9
ms.topic: article
10
-
ms.date: 04/13/2020
10
+
ms.date: 04/14/2020
11
11
ms.subservice: hybrid
12
12
ms.author: billmath
13
13
ms.collection: M365-identity-device-management
14
14
---
15
15
16
-
# Hybrid Identity Considerations for Azure Government
17
-
16
+
# Hybrid identity considerations for Azure Government
17
+
The following document describes the considerations for implementing a hybrid environment with the Azure Government cloud. This information is provide as reference for administrators and architects who are working with the Azure Government cloud.
18
18
> [!NOTE]
19
19
> Upgrade to the latest release of [Azure AD Connect](https://www.microsoft.com/download/details.aspx?id=47594).
20
20
21
21
> [!NOTE]
22
22
> For a full list of U.S. Government DoD Endpoints, refer to the [documentation](https://docs.microsoft.com/office365/enterprise/office-365-u-s-government-dod-endpoints)
23
23
24
-
## Pass Through Authentication
24
+
## Pass-Through Authentication
25
+
The following information is provided for implementation of pass-through authentication (PTA) and the Azure Government cloud.
25
26
26
27
### Allow access to URLs
27
28
Before deploying the pass-through authentication agent, verify if there is a firewall between your servers and Azure AD. If your firewall or proxy allows DNS whitelisting, whitelist the following connections:
Set up your Azure AD Connect server: If you use Pass-through Authentication as your sign-in method, no additional prerequisite check is required. If you use password hash synchronization as your sign-in method, and if there is a firewall between Azure AD Connect and Azure AD, ensure that:
54
55
- You use version 1.1.644.0 or later of Azure AD Connect.
55
56
- If your firewall or proxy allows DNS whitelisting, whitelist the connections to the *.msapproxy.us URLs over port 443. If not, allow access to the Azure datacenter IP ranges, which are updated weekly. This prerequisite is applicable only when you enable the feature. It is not required for actual user sign-ins.
56
57
57
-
### Rolling Out Seamless SSO
58
+
### Rolling out seamless SSO
58
59
You can gradually roll out Seamless SSO to your users using the instructions provided below. You start by adding the following Azure AD URL to all or selected users' Intranet zone settings by using Group Policy in Active Directory:
0 commit comments