You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/hybrid/how-to-connect-sso.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
-
title: 'Azure AD Connect: Seamless Single Sign-On | Microsoft Docs'
3
-
description: This topic describes Azure Active Directory (Azure AD) Seamless Single Sign-On and how it allows you to provide true single sign-on for corporate desktop users inside your corporate network.
2
+
title: 'Azure AD Connect: Seamless single sign-on | Microsoft Docs'
3
+
description: This topic describes Azure Active Directory (Azure AD) Seamless single sign-on and how it allows you to provide true single sign-on for corporate desktop users inside your corporate network.
4
4
services: active-directory
5
5
keywords: what is Azure AD Connect, install Active Directory, required components for Azure AD, SSO, Single Sign-on
6
6
documentationcenter: ''
@@ -16,17 +16,17 @@ ms.subservice: hybrid
16
16
ms.author: billmath
17
17
ms.collection: M365-identity-device-management
18
18
---
19
-
# Azure Active Directory Seamless Single Sign-On
19
+
# Azure Active Directory Seamless single sign-on
20
20
21
-
## What is Azure Active Directory Seamless Single Sign-On?
21
+
## What is Azure Active Directory Seamless single sign-on?
22
22
23
-
Azure Active Directory Seamless Single Sign-On (Azure AD Seamless SSO) automatically signs users in when they are on their corporate devices connected to your corporate network. When enabled, users don't need to type in their passwords to sign in to Azure AD, and usually, even type in their usernames. This feature provides your users easy access to your cloud-based applications without needing any additional on-premises components.
23
+
Azure Active Directory Seamless single sign-on (Azure AD Seamless SSO) automatically signs users in when they are on their corporate devices connected to your corporate network. When enabled, users don't need to type in their passwords to sign in to Azure AD, and usually, even type in their usernames. This feature provides your users easy access to your cloud-based applications without needing any additional on-premises components.
Seamless SSO can be combined with either the [Password Hash Synchronization](how-to-connect-password-hash-synchronization.md) or [Pass-through Authentication](how-to-connect-pta.md) sign-in methods. Seamless SSO is _not_ applicable to Active Directory Federation Services (ADFS).
28
28
29
-

29
+

Copy file name to clipboardExpand all lines: articles/active-directory/hybrid/how-to-connect-sync-technical-concepts.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -55,7 +55,7 @@ Attribute flow occurs between the connector space and the metaverse bi-direction
55
55
Attribute flow only occurs when these synchronizations are run. Attribute flows are defined in Synchronization Rules. These can be inbound (ISR in the picture above) or outbound (OSR in the picture above).
56
56
57
57
## Connected system
58
-
Connected system (aka connected directory) is referring to the remote system Azure AD Connect sync has connected to and reading and writing identity data to and from.
58
+
Connected system is referring to the remote system Azure AD Connect sync has connected to and reading and writing identity data to and from.
59
59
60
60
## Connector space
61
61
Each connected data source is represented as a filtered subset of the objects and attributes in the connector space.
Copy file name to clipboardExpand all lines: articles/active-directory/hybrid/plan-connect-design-concepts.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -175,7 +175,7 @@ While integrating your on-premises directory with Azure AD, it's important to un
175
175
### Choosing the attribute for userPrincipalName
176
176
When you're selecting the attribute for providing the value of UPN to be used in Azure one should ensure
177
177
178
-
* The attribute values conform to the UPN syntax (RFC 822), that is it should be of the format username\@domain
178
+
* The attribute values conform to the UPN syntax (RFC 822), it should be in the format of username\@domain
179
179
* The suffix in the values matches to one of the verified custom domains in Azure AD
180
180
181
181
In express settings, the assumed choice for the attribute is userPrincipalName. If the userPrincipalName attribute doesn't contain the value you want your users to sign in to Azure, then you must choose **Custom Installation**.
Copy file name to clipboardExpand all lines: articles/active-directory/hybrid/plan-hybrid-identity-design-considerations-identity-adoption-strategy.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -103,7 +103,7 @@ Over the years, several synchronization tools have existed and used for various
103
103
104
104
### Supported topologies
105
105
When defining a synchronization strategy, the topology that is used must be determined. Depending on the information that was determined in step 2 you can determine which topology is the proper one to use.
106
-
The single forest, single Azure AD topology is the most common and consists of a single Active Directory forest and a single instance of Azure AD. This topology is going to be used in a most scenarios and is the expected topology when using Azure AD Connect Express installation as shown in the figure below.
106
+
The single forest, single Azure AD topology is the most common and consists of a single Active Directory forest and a single instance of Azure AD. This topology is going to be used in most scenarios and is the expected topology when using Azure AD Connect Express installation as shown in the figure below.
Copy file name to clipboardExpand all lines: articles/active-directory/hybrid/plan-hybrid-identity-design-considerations-incident-response-requirements.md
description: Determine monitoring and reporting capabilities for the hybrid identity solution that can be leveraged by IT to take actions to identify and mitigate a potential threats
3
+
description: Determine monitoring and reporting capabilities for the hybrid identity solution that can be leveraged by IT to take actions to identify and mitigate a potential threat.
4
4
documentationcenter: ''
5
5
services: active-directory
6
6
author: billmath
@@ -39,7 +39,7 @@ Many times the identity system can also help in initial assessment phase mainly
39
39
40
40
The identity management system should assist IT admins to identify and report those suspicious activities. Usually these technical requirements can be fulfilled by monitoring all systems and having a reporting capability that can highlight potential threats. Use the questions below to help you design your hybrid identity solution while taking into consideration incident response requirements:
41
41
42
-
* Does your company has a security incident response in place?
42
+
* Does your company have a security incident response in place?
43
43
* If yes, is the current identity management system used as part of the process?
44
44
* Does your company need to identify suspicious sign-on attempts from users across different devices?
45
45
* Does your company need to detect potential compromised user’s credentials?
Copy file name to clipboardExpand all lines: articles/active-directory/hybrid/tshoot-connect-attribute-not-syncing.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,19 +29,19 @@ Before investigating attribute syncing issues, let’s understand the **Azure AD
29
29
***CS:** Connector Space, a table in database.
30
30
***MV:** Metaverse, a table in database.
31
31
***AD:** Active Directory
32
-
***AAD:** Azure Active Directory
32
+
***Azure AD:** Azure Active Directory
33
33
34
34
### **Synchronization Steps**
35
35
36
36
* Import from AD: Active Directory objects are brought into AD CS.
37
37
38
-
* Import from AAD: Azure Active Directory objects are brought into AAD CS.
38
+
* Import from Azure AD: Azure Active Directory objects are brought into Azure AD CS.
39
39
40
40
* Synchronization: **Inbound Synchronization Rules** and **Outbound Synchronization Rules** are run in the order of precedence number from lower to higher. To view the Synchronization Rules, you can go to **Synchronization Rules Editor** from the desktop applications. The **Inbound Synchronization Rules** brings in data from CS to MV. The **Outbound Synchronization Rules** moves data from MV to CS.
41
41
42
42
* Export to AD: After running Synchronization, objects are exported from AD CS to **Active Directory**.
43
43
44
-
* Export to AAD: After running Synchronization, objects are exported from AAD CS to **Azure Active Directory**.
44
+
* Export to Azure AD: After running Synchronization, objects are exported from Azure AD CS to **Azure Active Directory**.
0 commit comments