You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/hybrid/how-to-connect-sso-faq.yml
+10-10Lines changed: 10 additions & 10 deletions
Original file line number
Diff line number
Diff line change
@@ -26,7 +26,7 @@ sections:
26
26
- question: |
27
27
What sign-in methods do Seamless SSO work with
28
28
answer: |
29
-
Seamless SSO can be combined with either the [Password Hash Synchronization](how-to-connect-password-hash-synchronization.md) or [Pass-through Authentication](how-to-connect-pta.md) sign-in methods. However this feature cannot be used with Active Directory Federation Services (ADFS).
29
+
Seamless SSO can be combined with either the [Password Hash Synchronization](how-to-connect-password-hash-synchronization.md) or [Pass-through Authentication](how-to-connect-pta.md) sign-in methods. However this feature can't be used with Active Directory Federation Services (ADFS).
30
30
31
31
- question: |
32
32
Is Seamless SSO a free feature?
@@ -80,16 +80,16 @@ sections:
80
80
- question: |
81
81
How can I roll-over the Kerberos decryption key of the `AZUREADSSO` computer account?
82
82
answer: |
83
-
It is important to frequently roll-over the Kerberos decryption key of the `AZUREADSSO` computer account (which represents Azure AD) created in your on-premises AD forest.
83
+
It's important to frequently roll-over the Kerberos decryption key of the `AZUREADSSO` computer account (which represents Azure AD) created in your on-premises AD forest.
84
84
85
85
>[!IMPORTANT]
86
86
>We highly recommend that you roll-over the Kerberos decryption key at least every 30 days.
87
87
88
-
Follow these steps on the on-premises server where you are running Azure AD Connect:
88
+
Follow these steps on the on-premises server where you're running Azure AD Connect:
89
89
90
90
> [!NOTE]
91
-
>You will need domain administrator and global administrator/hybrid identity administrator credentials for the steps.
92
-
>If you are not a domain admin and you were assigned permissions by the domain admin, you should call `Update-AzureADSSOForest -OnPremCredentials $creds -PreserveCustomPermissionsOnDesktopSsoAccount`
91
+
>You'll need domain administrator and global administrator/hybrid identity administrator credentials for the steps.
92
+
>If you're not a domain admin and you were assigned permissions by the domain admin, you should call `Update-AzureADSSOForest -OnPremCredentials $creds -PreserveCustomPermissionsOnDesktopSsoAccount`
93
93
94
94
**Step 1. Get list of AD forests where Seamless SSO has been enabled**
95
95
@@ -114,10 +114,10 @@ sections:
114
114
3. Repeat the preceding steps for each AD forest that you’ve set up the feature on.
115
115
116
116
>[!NOTE]
117
-
>If you are updating a forest, other than the Azure AD Connect one, make sure connectivity to the global catalog server (TCP 3268 and TCP 3269) is available.
117
+
>If you're updating a forest, other than the Azure AD Connect one, make sure connectivity to the global catalog server (TCP 3268 and TCP 3269) is available.
118
118
119
119
>[!IMPORTANT]
120
-
>This does not need to be done on servers running Azure AD Connect in staging mode.
120
+
>This doesn't need to be done on servers running Azure AD Connect in staging mode.
121
121
>Ensure that you _don't_ run the `Update-AzureADSSOForest` command more than once per forest. Otherwise, the feature stops working until the time your users' Kerberos tickets expire and are reissued by your on-premises Active Directory.
122
122
123
123
- question: |
@@ -134,11 +134,11 @@ sections:
134
134
135
135
"Single sign-on is now disabled, but there are other manual steps to perform in order to complete clean-up. [Learn more](tshoot-connect-sso.md#step-3-disable-seamless-sso-for-each-active-directory-forest-where-youve-set-up-the-feature)"
136
136
137
-
To complete the clean-up process, follow steps 2 and 3 on the on-premises server where you are running Azure AD Connect.
137
+
To complete the clean-up process, follow steps 2 and 3 on the on-premises server where you're running Azure AD Connect.
138
138
139
139
**Option B: Disable using PowerShell**
140
140
141
-
Run the following steps on the on-premises server where you are running Azure AD Connect:
141
+
Run the following steps on the on-premises server where you're running Azure AD Connect:
142
142
143
143
1. First, download, and install [Azure AD PowerShell](/powershell/azure/active-directory/overview).
144
144
2. Navigate to the `$env:ProgramFiles"\Microsoft Azure Active Directory Connect"` folder.
@@ -149,7 +149,7 @@ sections:
149
149
At this point Seamless SSO is disabled but the domains will remain configured in case you would like to enable Seamless SSO back. If you would like to remove the domains from Seamless SSO configuration completely, call the following cmdlet after you completed step 5 above: `Disable-AzureADSSOForest -DomainFqdn <fqdn>`.
150
150
151
151
>[!IMPORTANT]
152
-
>Disabling Seamless SSO using PowerShell will not change the state in Azure AD Connect. Seamless SSO will show as enabled in the **Change user sign-in** page.
152
+
>Disabling Seamless SSO using PowerShell won't change the state in Azure AD Connect. Seamless SSO will show as enabled in the **Change user sign-in** page.
153
153
154
154
**Step 2. Get list of AD forests where Seamless SSO has been enabled**
0 commit comments