Skip to content

Commit 7259b7d

Browse files
committed
updating
1 parent db43690 commit 7259b7d

File tree

1 file changed

+10
-10
lines changed

1 file changed

+10
-10
lines changed

articles/active-directory/hybrid/how-to-connect-sso-faq.yml

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ sections:
2626
- question: |
2727
What sign-in methods do Seamless SSO work with
2828
answer: |
29-
Seamless SSO can be combined with either the [Password Hash Synchronization](how-to-connect-password-hash-synchronization.md) or [Pass-through Authentication](how-to-connect-pta.md) sign-in methods. However this feature cannot be used with Active Directory Federation Services (ADFS).
29+
Seamless SSO can be combined with either the [Password Hash Synchronization](how-to-connect-password-hash-synchronization.md) or [Pass-through Authentication](how-to-connect-pta.md) sign-in methods. However this feature can't be used with Active Directory Federation Services (ADFS).
3030
3131
- question: |
3232
Is Seamless SSO a free feature?
@@ -80,16 +80,16 @@ sections:
8080
- question: |
8181
How can I roll-over the Kerberos decryption key of the `AZUREADSSO` computer account?
8282
answer: |
83-
It is important to frequently roll-over the Kerberos decryption key of the `AZUREADSSO` computer account (which represents Azure AD) created in your on-premises AD forest.
83+
It's important to frequently roll-over the Kerberos decryption key of the `AZUREADSSO` computer account (which represents Azure AD) created in your on-premises AD forest.
8484
8585
>[!IMPORTANT]
8686
>We highly recommend that you roll-over the Kerberos decryption key at least every 30 days.
8787
88-
Follow these steps on the on-premises server where you are running Azure AD Connect:
88+
Follow these steps on the on-premises server where you're running Azure AD Connect:
8989
9090
> [!NOTE]
91-
>You will need domain administrator and global administrator/hybrid identity administrator credentials for the steps.
92-
>If you are not a domain admin and you were assigned permissions by the domain admin, you should call `Update-AzureADSSOForest -OnPremCredentials $creds -PreserveCustomPermissionsOnDesktopSsoAccount`
91+
>You'll need domain administrator and global administrator/hybrid identity administrator credentials for the steps.
92+
>If you're not a domain admin and you were assigned permissions by the domain admin, you should call `Update-AzureADSSOForest -OnPremCredentials $creds -PreserveCustomPermissionsOnDesktopSsoAccount`
9393
9494
**Step 1. Get list of AD forests where Seamless SSO has been enabled**
9595
@@ -114,10 +114,10 @@ sections:
114114
3. Repeat the preceding steps for each AD forest that you’ve set up the feature on.
115115
116116
>[!NOTE]
117-
>If you are updating a forest, other than the Azure AD Connect one, make sure connectivity to the global catalog server (TCP 3268 and TCP 3269) is available.
117+
>If you're updating a forest, other than the Azure AD Connect one, make sure connectivity to the global catalog server (TCP 3268 and TCP 3269) is available.
118118
119119
>[!IMPORTANT]
120-
>This does not need to be done on servers running Azure AD Connect in staging mode.
120+
>This doesn't need to be done on servers running Azure AD Connect in staging mode.
121121
>Ensure that you _don't_ run the `Update-AzureADSSOForest` command more than once per forest. Otherwise, the feature stops working until the time your users' Kerberos tickets expire and are reissued by your on-premises Active Directory.
122122
123123
- question: |
@@ -134,11 +134,11 @@ sections:
134134
135135
"Single sign-on is now disabled, but there are other manual steps to perform in order to complete clean-up. [Learn more](tshoot-connect-sso.md#step-3-disable-seamless-sso-for-each-active-directory-forest-where-youve-set-up-the-feature)"
136136
137-
To complete the clean-up process, follow steps 2 and 3 on the on-premises server where you are running Azure AD Connect.
137+
To complete the clean-up process, follow steps 2 and 3 on the on-premises server where you're running Azure AD Connect.
138138
139139
**Option B: Disable using PowerShell**
140140
141-
Run the following steps on the on-premises server where you are running Azure AD Connect:
141+
Run the following steps on the on-premises server where you're running Azure AD Connect:
142142
143143
1. First, download, and install [Azure AD PowerShell](/powershell/azure/active-directory/overview).
144144
2. Navigate to the `$env:ProgramFiles"\Microsoft Azure Active Directory Connect"` folder.
@@ -149,7 +149,7 @@ sections:
149149
At this point Seamless SSO is disabled but the domains will remain configured in case you would like to enable Seamless SSO back. If you would like to remove the domains from Seamless SSO configuration completely, call the following cmdlet after you completed step 5 above: `Disable-AzureADSSOForest -DomainFqdn <fqdn>`.
150150
151151
>[!IMPORTANT]
152-
>Disabling Seamless SSO using PowerShell will not change the state in Azure AD Connect. Seamless SSO will show as enabled in the **Change user sign-in** page.
152+
>Disabling Seamless SSO using PowerShell won't change the state in Azure AD Connect. Seamless SSO will show as enabled in the **Change user sign-in** page.
153153
154154
**Step 2. Get list of AD forests where Seamless SSO has been enabled**
155155

0 commit comments

Comments
 (0)