Skip to content

Commit 72a12c5

Browse files
authored
Merge pull request #251928 from MicrosoftDocs/alexbuckgit/docutune-autopr-20230918-155458-2299423-ignore-build
[BULK] - DocuTune - Rebranding of Azure Active Directory to Microsoft Entra (part 30)
2 parents 6e802fb + 2159a7e commit 72a12c5

36 files changed

+806
-718
lines changed

articles/active-directory/hybrid/connect/reference-connect-government-cloud.md

Lines changed: 19 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: 'Azure AD Connect: Hybrid identity considerations for Azure Government cloud'
3-
description: Special considerations for deploying Azure AD Connect with the Azure Government cloud.
2+
title: 'Microsoft Entra Connect: Hybrid identity considerations for Azure Government cloud'
3+
description: Special considerations for deploying Microsoft Entra Connect with the Azure Government cloud.
44
services: active-directory
55
author: billmath
66
manager: amycolannino
@@ -18,29 +18,31 @@ ms.collection: M365-identity-device-management
1818
This article describes considerations for integrating a hybrid environment with the Microsoft Azure Government cloud. This information is provided as a reference for administrators and architects who work with the Azure Government cloud.
1919

2020
> [!NOTE]
21-
> To integrate a Microsoft Active Directory environment (either on-premises or hosted in an IaaS that is part of the same cloud instance) with the Azure Government cloud, you need to upgrade to the latest release of [Azure AD Connect](https://www.microsoft.com/download/details.aspx?id=47594).
21+
> To integrate a Microsoft Active Directory environment (either on-premises or hosted in an IaaS that is part of the same cloud instance) with the Azure Government cloud, you need to upgrade to the latest release of [Microsoft Entra Connect](https://www.microsoft.com/download/details.aspx?id=47594).
2222
2323
For a full list of United States government Department of Defense endpoints, refer to the [documentation](/office365/enterprise/office-365-u-s-government-dod-endpoints).
2424

25-
## Azure AD Pass-through Authentication
25+
<a name='azure-ad-pass-through-authentication'></a>
26+
27+
## Microsoft Entra pass-through authentication
2628

2729
The following information describes implementation of Pass-through Authentication and the Azure Government cloud.
2830

2931
### Allow access to URLs
3032

31-
Before you deploy the Pass-through Authentication agent, verify whether a firewall exists between your servers and Azure AD. If your firewall or proxy allows Domain Name System (DNS) blocked or safe programs, add the following connections.
33+
Before you deploy the Pass-through Authentication agent, verify whether a firewall exists between your servers and Microsoft Entra ID. If your firewall or proxy allows Domain Name System (DNS) blocked or safe programs, add the following connections.
3234

3335
> [!IMPORTANT]
3436
> The following guidance applies only to the following:
3537
> - the pass-through authentication agent
36-
> - [Azure AD Application Proxy connector](../../app-proxy/what-is-application-proxy.md)
38+
> - [Microsoft Entra application proxy connector](../../app-proxy/what-is-application-proxy.md)
3739
>
38-
> For information on URLS for the Azure Active Directory Connect Provisioning Agent see the [installation pre-requisites](../cloud-sync/how-to-prerequisites.md) for cloud sync.
40+
> For information on URLS for the Microsoft Entra Connect Provisioning Agent see the [installation pre-requisites](../cloud-sync/how-to-prerequisites.md) for cloud sync.
3941
4042

4143
|URL |How it's used|
4244
|-----|-----|
43-
|&#42;.msappproxy.us</br>&#42;.servicebus.usgovcloudapi.net|The agent uses these URLs to communicate with the Azure AD cloud service. |
45+
|&#42;.msappproxy.us</br>&#42;.servicebus.usgovcloudapi.net|The agent uses these URLs to communicate with the Microsoft Entra cloud service. |
4446
|`mscrl.microsoft.us:80` </br>`crl.microsoft.us:80` </br>`ocsp.msocsp.us:80` </br>`www.microsoft.us:80`| The agent uses these URLs to verify certificates.|
4547
|login.windows.us </br>secure.aadcdn.microsoftonline-p.com </br>&#42;.microsoftonline.us </br>&#42;.microsoftonline-p.us </br>&#42;.msauth.net </br>&#42;.msauthimages.net </br>&#42;.msecnd.net</br>&#42;.msftauth.net </br>&#42;.msftauthimages.net</br>&#42;.phonefactor.net </br>enterpriseregistration.windows.net</br>management.azure.com </br>policykeyservice.dc.ad.msft.net</br>ctldl.windowsupdate.us:80| The agent uses these URLs during the registration process.
4648

@@ -65,26 +67,28 @@ Follow these steps to install the agent for the Azure Government cloud:
6567

6668
## Single sign-on
6769

68-
### Set up your Azure AD Connect server
70+
<a name='set-up-your-azure-ad-connect-server'></a>
71+
72+
### Set up your Microsoft Entra Connect server
6973

70-
If you use Pass-through Authentication as your sign-on method, no additional prerequisite check is required. If you use password hash synchronization as your sign-on method and there is a firewall between Azure AD Connect and Azure AD, ensure that:
74+
If you use Pass-through Authentication as your sign-on method, no additional prerequisite check is required. If you use password hash synchronization as your sign-on method and there is a firewall between Microsoft Entra Connect and Microsoft Entra ID, ensure that:
7175

72-
- You use Azure AD Connect version 1.1.644.0 or later.
76+
- You use Microsoft Entra Connect version 1.1.644.0 or later.
7377
- If your firewall or proxy allows DNS blocked or safe programs, add the connections to the &#42;.msappproxy.us URLs over port 443.
7478

7579
If not, allow access to the Azure datacenter IP ranges, which are updated weekly. This prerequisite applies only when you enable the feature. It isn't required for actual user sign-ons.
7680

7781
### Roll out Seamless Single Sign-On
7882

79-
You can gradually roll out Azure AD Seamless Single Sign-On to your users by using the following instructions. You start by adding the Azure AD URL `https://autologon.microsoft.us` to all or selected users' Intranet zone settings by using Group Policy in Active Directory.
83+
You can gradually roll out Microsoft Entra seamless single sign-on to your users by using the following instructions. You start by adding the Microsoft Entra URL `https://autologon.microsoft.us` to all or selected users' Intranet zone settings by using Group Policy in Active Directory.
8084

8185
You also need to enable the intranet zone policy setting **Allow updates to status bar via script through Group Policy**.
8286

8387
## Browser considerations
8488

8589
### Mozilla Firefox (all platforms)
8690

87-
Mozilla Firefox doesn't automatically use Kerberos authentication. Each user must manually add the Azure AD URL to their Firefox settings by following these steps:
91+
Mozilla Firefox doesn't automatically use Kerberos authentication. Each user must manually add the Microsoft Entra URL to their Firefox settings by following these steps:
8892

8993
1. Run Firefox and enter **about:config** in the address bar. Dismiss any notifications that you might see.
9094
1. Search for the **network.negotiate-auth.trusted-uris** preference. This preference lists the sites trusted by Firefox for Kerberos authentication.
@@ -94,11 +98,11 @@ Mozilla Firefox doesn't automatically use Kerberos authentication. Each user mus
9498

9599
### Microsoft Edge based on Chromium (all platforms)
96100

97-
If you have overridden the `AuthNegotiateDelegateAllowlist` or `AuthServerAllowlist` policy settings in your environment, ensure that you add the Azure AD URL `https://autologon.microsoft.us` to them.
101+
If you have overridden the `AuthNegotiateDelegateAllowlist` or `AuthServerAllowlist` policy settings in your environment, ensure that you add the Microsoft Entra URL `https://autologon.microsoft.us` to them.
98102

99103
### Google Chrome (all platforms)
100104

101-
If you have overridden the `AuthNegotiateDelegateWhitelist` or `AuthServerWhitelist` policy settings in your environment, ensure that you add the Azure AD URL `https://autologon.microsoft.us` to them.
105+
If you have overridden the `AuthNegotiateDelegateWhitelist` or `AuthServerWhitelist` policy settings in your environment, ensure that you add the Microsoft Entra URL `https://autologon.microsoft.us` to them.
102106

103107
## Next steps
104108

0 commit comments

Comments
 (0)