Skip to content

Commit 7581af8

Browse files
committed
udpating
1 parent 3598b4b commit 7581af8

File tree

1 file changed

+1
-24
lines changed

1 file changed

+1
-24
lines changed

articles/active-directory/cloud-sync/how-to-manage-registry-options.md

Lines changed: 1 addition & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.topic: how-to
1111
ms.tgt_pltfrm: na
1212
ms.workload: identity
13-
ms.date: 01/11/2023
13+
ms.date: 04/03/2023
1414
ms.subservice: hybrid
1515
ms.reviewer: chmutali
1616
ms.author: billmath
@@ -62,29 +62,6 @@ Use the following steps to turn on referral chasing:
6262
1. Restart the Azure AD Connect Provisioning Service from the *Services* console.
6363
1. If you have deployed multiple provisioning agents, apply this registry change to all agents for consistency.
6464

65-
## Skip GMSA configuration
66-
With agent version 1.1.281.0+, by default, when you run the agent configuration wizard, you are prompted to setup [Group Managed Service Account (GMSA)](/windows-server/security/group-managed-service-accounts/group-managed-service-accounts-overview). The GMSA setup by the wizard is used at runtime for all sync and provisioning operations.
67-
68-
If you are upgrading from a prior version of the agent and have setup a custom service account with delegated OU-level permissions specific to your Active Directory topology, you may want to skip/postpone GMSA configuration and plan for this change.
69-
70-
> [!NOTE]
71-
> This guidance specifically applies to customers who have configured HR (Workday/SuccessFactors) inbound provisioning with agent versions prior to 1.1.281.0 and have setup a custom service account for agent operations. In the long run, we recommend switching to GMSA as a best practice.
72-
73-
In this scenario, you can still upgrade the agent binaries and skip the GMSA configuration using the following steps:
74-
75-
1. Log on as Administrator on the Windows server running the Azure AD Connect Provisioning Agent.
76-
1. Run the agent installer to install the new agent binaries. Close the agent configuration wizard which opens up automatically after the installation is successful.
77-
1. Use the *Run* menu item to open the registry editor (regedit.exe)
78-
1. Locate the key folder **HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Azure AD Connect Agents\Azure AD Connect Provisioning Agent**
79-
1. Right-click and select "New -> DWORD Value"
80-
1. Provide the name:
81-
`UseCredentials`
82-
1. Double-click on the **Value Name** and enter the value data as `1`.
83-
> [!div class="mx-imgBorder"]
84-
> ![Use Credentials](media/how-to-manage-registry-options/use-credentials.png)
85-
1. Restart the Azure AD Connect Provisioning Service from the *Services* console.
86-
1. If you have deployed multiple provisioning agents, apply this registry change to all agents for consistency.
87-
1. From the desktop short cut, run the agent configuration wizard. The wizard will skip the GMSA configuration.
8865

8966

9067
> [!NOTE]

0 commit comments

Comments
 (0)