You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/hybrid/migrate-from-federation-to-cloud-authentication.md
+15-15Lines changed: 15 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -102,11 +102,11 @@ Here are key migration considerations.
102
102
103
103
### Plan for customizations settings
104
104
105
-
The onload.js file cannot be duplicated in Azure AD. If your AD FS instance is heavily customized and relies on specific customization settings in the onload.js file, verify if Azure AD can meet your current customization requirements and plan accordingly. Communicate these upcoming changes to your users.
105
+
The onload.js file can't be duplicated in Azure AD. If your AD FS instance is heavily customized and relies on specific customization settings in the onload.js file, verify if Azure AD can meet your current customization requirements and plan accordingly. Communicate these upcoming changes to your users.
106
106
107
107
#### Sign-in experience
108
108
109
-
You cannot customize Azure AD sign-in experience. No matter how your users signed-in earlier, you need a fully qualified domain name such as User Principal Name (UPN) or email to sign into Azure AD.
109
+
You can't customize Azure AD sign-in experience. No matter how your users signed-in earlier, you need a fully qualified domain name such as User Principal Name (UPN) or email to sign into Azure AD.
110
110
111
111
#### Organization branding
112
112
@@ -125,15 +125,15 @@ Consider replacing AD FS access control policies with the equivalent Azure AD [C
125
125
126
126
### Plan support for MFA
127
127
128
-
For federated domains, MFA may be enforced by Azure AD Conditional Access or by the on-premises federation provider. You can enable protection to prevent bypassing of Azure AD Multi-Factor Authentication by configuring the security setting **federatedIdpMfaBehavior**. Enable the protection for a federated domain in your Azure AD tenant. Make sure that Azure AD Multi-Factor Authentication is always performed when a federated user accesses an application that is governed by a Conditional Access policy that requires MFA. This includes performing Azure AD Multi-Factor Authentication even when federated identity provider has issued federated token claims that on-prem MFA has been performed. Enforcing Azure AD Multi-Factor Authentication every time assures that a bad actor cannot bypass Azure AD Multi-Factor Authentication by imitating that MFA has already been performed by the identity provider, and is highly recommended unless you perform MFA for your federated users using a third party MFA provider.
128
+
For federated domains, MFA may be enforced by Azure AD Conditional Access or by the on-premises federation provider. You can enable protection to prevent bypassing of Azure AD Multi-Factor Authentication by configuring the security setting **federatedIdpMfaBehavior**. Enable the protection for a federated domain in your Azure AD tenant. Make sure that Azure AD Multi-Factor Authentication is always performed when a federated user accesses an application that is governed by a Conditional Access policy that requires MFA. This includes performing Azure AD Multi-Factor Authentication even when federated identity provider has issued federated token claims that on-prem MFA has been performed. Enforcing Azure AD Multi-Factor Authentication every time assures that a bad actor can't bypass Azure AD Multi-Factor Authentication by imitating that identity provider already performed MFA and is highly recommended unless you perform MFA for your federated users using a third party MFA provider.
129
129
130
130
The following table explains the behavior for each option. For more information, see **federatedIdpMfaBehavior**.
131
131
132
132
| Value | Description |
133
133
| :--- | :--- |
134
-
| acceptIfMfaDoneByFederatedIdp | Azure AD accepts MFA that's performed by the federated identity provider. If the federated identity provider didn't perform MFA, Azure AD performs the MFA. |
135
-
| enforceMfaByFederatedIdp | Azure AD accepts MFA that's performed by federated identity provider. If the federated identity provider didn't perform MFA, it redirects the request to federated identity provider to perform MFA. |
136
-
| rejectMfaByFederatedIdp | Azure AD always performs MFA and rejects MFA that's performed by the federated identity provider. |
134
+
| acceptIfMfaDoneByFederatedIdp | Azure AD accepts MFA thatfederated identity provider performs. If the federated identity provider didn't perform MFA, Azure AD performs the MFA. |
135
+
| enforceMfaByFederatedIdp | Azure AD accepts MFA thatfederated identity provider performs. If the federated identity provider didn't perform MFA, it redirects the request to federated identity provider to perform MFA. |
136
+
| rejectMfaByFederatedIdp | Azure AD always performs MFA and rejects MFA thatfederated identity provider performs. |
137
137
138
138
>[!NOTE]
139
139
> The **federatedIdpMfaBehavior** setting is an evolved version of the **SupportsMfa** property of the [Set-MsolDomainFederationSettings MSOnline v1 PowerShell cmdlet](/powershell/module/msonline/set-msoldomainfederationsettings).
@@ -164,7 +164,7 @@ For more information, see **[Migrate from Microsoft MFA Server to Azure Multi-fa
164
164
165
165
## Plan for implementation
166
166
167
-
This section includes pre-work before you switch your sign-in method and convert the domains.
167
+
This section includes prework before you switch your sign-in method and convert the domains.
168
168
169
169
### Create necessary groups for staged rollout
170
170
@@ -176,19 +176,19 @@ We recommend you use a group mastered in Azure AD, also known as a cloud-only gr
176
176
177
177
The members in a group are automatically enabled for staged rollout. Nested and dynamic groups are not supported for staged rollout.
178
178
179
-
### Pre-work for SSO
179
+
### Prework for SSO
180
180
181
181
The version of SSO that you use is dependent on your device OS and join state.
182
182
183
183
-**For Windows 10, Windows Server 2016 and later versions**, we recommend using SSO via [Primary Refresh Token (PRT)](../devices/concept-primary-refresh-token.md) with [Azure AD joined devices](../devices/concept-azure-ad-join.md), [hybrid Azure AD joined devices](../devices/concept-azure-ad-join-hybrid.md) and [Azure AD registered devices](../devices/concept-azure-ad-register.md).
184
184
185
185
-**For macOS and iOS devices**, we recommend using SSO via the [Microsoft Enterprise SSO plug-in for Apple devices](../develop/apple-sso-plugin.md). This feature requires that your Apple devices are managed by an MDM. If you use Intune as your MDM then follow the [Microsoft Enterprise SSO plug-in for Apple Intune deployment guide](/mem/intune/configuration/use-enterprise-sso-plug-in-ios-ipados-macos). If you use another MDM then follow the [Jamf Pro / generic MDM deployment guide](/mem/intune/configuration/use-enterprise-sso-plug-in-ios-ipados-macos-with-jamf-pro).
186
186
187
-
-**For Windows 7 and 8.1 devices**, we recommend using [seamless SSO](how-to-connect-sso.md) with domain-joined to register the computer in Azure AD. You don't have to sync these accounts like you do for Windows 10 devices. However, you must complete this [pre-work for seamless SSO using PowerShell](how-to-connect-staged-rollout.md#pre-work-for-seamless-sso).
187
+
-**For Windows 7 and 8.1 devices**, we recommend using [seamless SSO](how-to-connect-sso.md) with domain-joined to register the computer in Azure AD. You don't have to sync these accounts like you do for Windows 10 devices. However, you must complete this [prework for seamless SSO using PowerShell](how-to-connect-staged-rollout.md#pre-work-for-seamless-sso).
188
188
189
-
### Pre-work for PHS and PTA
189
+
### Prework for PHS and PTA
190
190
191
-
Depending on the choice of sign-in method, complete the [pre-work for PHS](how-to-connect-staged-rollout.md#pre-work-for-password-hash-sync) or [for PTA](how-to-connect-staged-rollout.md#pre-work-for-pass-through-authentication).
191
+
Depending on the choice of sign-in method, complete the [prework for PHS](how-to-connect-staged-rollout.md#pre-work-for-password-hash-sync) or [for PTA](how-to-connect-staged-rollout.md#pre-work-for-pass-through-authentication).
192
192
193
193
## Implement your solution
194
194
@@ -200,7 +200,7 @@ If you're using staged rollout, follow the steps in the links below:
200
200
201
201
1.[Enable staged rollout of a specific feature on your tenant.](how-to-connect-staged-rollout.md#enable-staged-rollout)
202
202
203
-
2. Once testing is complete, [convert domains from federated to managed](#convert-domains-from-federated-to-managed).
203
+
2. Once testing is complete, [convert domains from federated to be managed](#convert-domains-from-federated-to-managed).
204
204
205
205
### Without using staged rollout
206
206
@@ -296,7 +296,7 @@ For most customers, two or three authentication agents are sufficient to provide
296
296
297
297
1. Select **Pass-through authentication**.
298
298
2. On the **Pass-through authentication** page, select the **Download** button.
299
-
3. On the **Download agent** page, select **Accept terms and download**.
299
+
3. On the **Download agent** page, select **Accept terms and download**.f
300
300
301
301
More authentication agents start to download. Install the secondary authentication agent on a domain-joined server.
302
302
@@ -312,7 +312,7 @@ For most customers, two or three authentication agents are sufficient to provide
312
312
313
313
*Available if you didn't initially configure your federated domains by using Azure AD Connect or if you're using third-party federation services.*
314
314
315
-
On your Azure AD Connect server, follow the steps 1- 5 in [Option A](#option-a). Notice that on the User sign-in page, the **Do not configure** option is pre-selected.
315
+
On your Azure AD Connect server, follow the steps 1- 5 in [Option A](#option-a). Notice that on the User sign-in page, the **Do not configure** option is preselected.
316
316
317
317

318
318
@@ -386,7 +386,7 @@ If you used staged rollout, you should remember to turn off the staged rollout f
386
386
387
387
Historically, updates to the **UserPrincipalName** attribute, which uses the sync service from the on-premises environment, are blocked unless both of these conditions are true:
388
388
389
-
- The user is in a managed (non-federated) identity domain.
389
+
- The user is in a managed (nonfederated) identity domain.
390
390
- The user hasn't been assigned a license.
391
391
392
392
To learn how to verify or turn on this feature, see [Sync userPrincipalName updates](how-to-connect-syncservice-features.md).
0 commit comments