Skip to content

Commit 82dc6c0

Browse files
committed
Include md, tone, format, and inclusive lang
1 parent 182fa36 commit 82dc6c0

21 files changed

+249
-299
lines changed

articles/active-directory/cloud-sync/how-to-install.md

Lines changed: 18 additions & 60 deletions
Original file line numberDiff line numberDiff line change
@@ -7,13 +7,14 @@ manager: amycolannino
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: how-to
10-
ms.date: 03/01/2022
10+
ms.date: 11/11/2022
1111
ms.subservice: hybrid
1212
ms.author: billmath
1313
ms.collection: M365-identity-device-management
1414
---
1515

1616
# Install the Azure AD Connect provisioning agent
17+
1718
This article walks you through the installation process for the Azure Active Directory (Azure AD) Connect provisioning agent and how to initially configure it in the Azure portal.
1819

1920
>[!IMPORTANT]
@@ -35,58 +36,11 @@ To upgrade an existing agent to use the group Managed Service Account created du
3536

3637
## Install the agent
3738

38-
To install the agent:
39-
40-
1. Sign in to the server you'll use with enterprise admin permissions.
41-
2. Sign in to the Azure portal, and then go to **Azure Active Directory**.
42-
3. On the menu on the left, select **Azure AD Connect**.
43-
4. Select **Manage cloud sync**.
44-
[![Screenshot that shows manage cloud sync](media/how-to-install/new-install-1.png)](media/how-to-install/new-install-1.png#lightbox)</br>
45-
5. At the top, click **Download agent**.
46-
[![Screenshot that the download agent](media/how-to-install/new-install-2.png)](media/how-to-install/new-install-2.png#lightbox)</br>
47-
7. On the right, click **Accept terms and download**.
48-
[![Screenshot that accept and download](media/how-to-install/new-install-3.png)](media/how-to-install/new-install-3.png#lightbox)</br>
49-
9. Once the agent has completed downloading, click **Open file**. This will start the installation.
50-
[![Screenshot that shows open file](media/how-to-install/new-install-4.png)](media/how-to-install/new-install-4.png#lightbox)</br>
51-
10. On the **Microsoft Azure AD Connect Provisioning Agent Package** screen, accept the licensing terms, and select **Install**.
52-
[![Screenshot that shows install](media/how-to-install/new-install-5.png)](media/how-to-install/new-install-5.png#lightbox)</br>
53-
11. After this operation finishes, the configuration wizard starts. Click **Next**.
54-
[![Screenshot that shows wizard](media/how-to-install/new-install-6.png)](media/how-to-install/new-install-6.png#lightbox)</br>
55-
13. Sign in with your Azure AD global administrator account.
56-
14. On the **Configure Service Account** screen, select either **Create gMSA**, or **Use custom gMSA**. If you allow the agent to create the account, it will be named **provAgentgMSA$**. If you specify **Use custom gMSA**, you're prompted to provide this account.
57-
[![Screenshot that shows create service account](media/how-to-install/new-install-7.png)](media/how-to-install/new-install-7.png#lightbox)</br>
58-
15. Enter the domain administrator credentials to create the group Managed Service account that will be used to run the agent service. Select **Next**.
59-
![Screenshot that shows the Create gMSA option.](media/how-to-install/install-12.png)</br>
60-
16. On the **Connect Active Directory** screen, click **Next**. Your current domain has been added automatically. If you wish to add additional domains, enter them and select **Add Directory**. Then sign in with an administrator account from that domain.
61-
[![Screenshot that shows connecting to AD](media/how-to-install/new-install-8.png)](media/how-to-install/new-install-8.png#lightbox)</br>
62-
17. Optionally, you can manage the preference of domain controllers the agent will use. To do this, click **Add Directory** and select the **Select domain controller priority** checkbox and then order the list of domain controllers. Select **OK**. Click **Next**.
63-
[![Screenshot that shows adding domain controller priority](media/how-to-install/new-install-10.png)](media/how-to-install/new-install-10.png#lightbox)</br>
64-
18. On the **Agent installation** screen, confirm settings and the account that will be created and select **Confirm**.
65-
[![Screenshot that shows install confirmation](media/how-to-install/new-install-11.png)](media/how-to-install/new-install-11.png#lightbox)</br>
66-
20. After this operation finishes, you should see **Your agent installation is complete.** Select **Exit**.
67-
21. If you still see the initial **Microsoft Azure AD Connect Provisioning Agent Package** screen, select **Close**.
39+
[!INCLUDE [active-directory-cloud-sync-how-to-install](../../../includes/active-directory-cloud-sync-how-to-install.md)]
6840

6941
## Verify agent installation
70-
Agent verification occurs in the Azure portal and on the local server that's running the agent.
71-
72-
### Azure portal agent verification
73-
To verify the agent is being seen by Azure:
74-
75-
1. Sign in to the Azure portal.
76-
2. On the left, select **Azure Active Directory** > **Azure AD Connect**. In the center, select **Manage cloud sync**.
77-
![Screenshot that shows the Azure portal.](media/how-to-install/install-6.png)</br>
78-
3. On the **Azure AD Connect cloud sync** screen, select **Review all agents**.
79-
![Screenshot that shows the Review all agents option.](media/how-to-install/install-7.png)</br>
80-
4. On the **On-premises provisioning agents** screen, you see the agents you installed. Verify that the agent in question is there and is marked *active*.
81-
![Screenshot that shows On-premises provisioning agents screen.](media/how-to-install/verify-1.png)</br>
8242

83-
### On the local server
84-
To verify that the agent is running:
85-
86-
1. Sign in to the server with an administrator account.
87-
2. Open **Services** by going to it or by selecting **Start** > **Run** > **Services.msc**.
88-
3. Under **Services**, make sure **Microsoft Azure AD Connect Agent Updater** and **Microsoft Azure AD Connect Provisioning Agent** are present. Also, ensure the status is *Running*.
89-
![Screenshot that shows the Services screen.](media/how-to-install/troubleshoot-1.png)
43+
[!INCLUDE [active-directory-cloud-sync-how-to-verify-installation](../../../includes/active-directory-cloud-sync-how-to-verify-installation.md)]
9044

9145
>[!IMPORTANT]
9246
>The agent has been installed, but it must be configured and enabled before it will start synchronizing users. To configure a new agent, see [Create a new configuration for Azure AD Connect cloud sync](how-to-configure.md).
@@ -103,15 +57,19 @@ To use password writeback and enable the self-service password reset (SSPR) serv
10357
For more information on using password writeback with Azure AD Connect cloud sync, see [Tutorial: Enable cloud sync self-service password reset writeback to an on-premises environment (preview)](../../active-directory/authentication/tutorial-enable-cloud-sync-sspr-writeback.md).
10458

10559
## Installing against US govt cloud
106-
By default, the Azure Active Directory (Azure AD) Connect provisioning agent installs against the default Azure cloud environment. If you are installing the agent for use in the US government cloud do the following:
10760

108-
- In step #7 above, instead of click **Open file**, go to start run and navigate to the **AADConnectProvisioningAgentSetup.exe** file. In the run box, after the executable, enter **ENVIRONMENTNAME=AzureUSGovernment** and click **Ok**.
109-
[![Screenshot showing US govt cloud install](media/how-to-install/new-install-12.png)](media/how-to-install/new-install-12.png#lightbox)</br>
61+
By default, the Azure Active Directory (Azure AD) Connect provisioning agent installs against the default Azure cloud environment. If you're installing the agent for use in the US government, follow these steps:
62+
63+
- In step #7 above, instead of select **Open file**, go to start run and navigate to the **AADConnectProvisioningAgentSetup.exe** file. In the run box, after the executable, enter **ENVIRONMENTNAME=AzureUSGovernment** and select **Ok**.
64+
65+
[![Screenshot showing US govt cloud install](media/how-to-install/new-install-12.png)](media/how-to-install/new-install-12.png#lightbox)
11066

11167
## Password hash synchronization and FIPS with cloud sync
68+
11269
If your server has been locked down according to Federal Information Processing Standard (FIPS), then MD5 is disabled.
11370

114-
**To enable MD5 for password hash synchronization, perform the following steps:**
71+
72+
To enable MD5 for password hash synchronization, perform the following steps:
11573

11674
1. Go to %programfiles%\Microsoft Azure AD Connect Provisioning Agent.
11775
2. Open AADConnectProvisioningAgent.exe.config.
@@ -121,12 +79,12 @@ If your server has been locked down according to Federal Information Processing
12179

12280
For reference, this snippet is what it should look like:
12381

124-
```
125-
<configuration>
126-
<runtime>
127-
<enforceFIPSPolicy enabled="false"/>
128-
</runtime>
129-
</configuration>
82+
```xml
83+
<configuration>
84+
<runtime>
85+
<enforceFIPSPolicy enabled="false"/>
86+
</runtime>
87+
</configuration>
13088
```
13189

13290
For information about security and FIPS, see [Azure AD password hash sync, encryption, and FIPS compliance](https://blogs.technet.microsoft.com/enterprisemobility/2014/06/28/aad-password-sync-encryption-and-fips-compliance/).

articles/active-directory/cloud-sync/tutorial-existing-forest.md

Lines changed: 28 additions & 57 deletions
Original file line numberDiff line numberDiff line change
@@ -17,11 +17,11 @@ ms.collection: M365-identity-device-management
1717

1818
This tutorial walks you through adding cloud sync to an existing hybrid identity environment.
1919

20-
![Create](media/tutorial-existing-forest/existing-forest-new-forest-2.png)
20+
![Diagram that shows the Azure AD Connect cloud sync flow.](media/tutorial-existing-forest/existing-forest-new-forest-2.png)
2121

2222
You can use the environment you create in this tutorial for testing or for getting more familiar with how a hybrid identity works.
2323

24-
In this scenario, there is an existing forest synced using Azure AD Connect sync to an Azure AD tenant. And you have a new forest that you want to sync to the same Azure AD tenant. You will setup cloud sync for the new forest.
24+
In this scenario, there's an existing forest synced using Azure AD Connect sync to an Azure AD tenant. And you have a new forest that you want to sync to the same Azure AD tenant. You'll set up cloud sync for the new forest.
2525

2626
## Prerequisites
2727
### In the Azure Active Directory admin center
@@ -31,9 +31,9 @@ In this scenario, there is an existing forest synced using Azure AD Connect sync
3131

3232
### In your on-premises environment
3333

34-
1. Identify a domain-joined host server running Windows Server 2012 R2 or greater with minimum of 4 GB RAM and .NET 4.7.1+ runtime
34+
1. Identify a domain-joined host server running Windows Server 2012 R2 or greater with minimum of 4-GB RAM and .NET 4.7.1+ runtime
3535

36-
2. If there is a firewall between your servers and Azure AD, configure the following items:
36+
2. If there's a firewall between your servers and Azure AD, configure the following items:
3737
- Ensure that agents can make *outbound* requests to Azure AD over the following ports:
3838

3939
| Port number | How it's used |
@@ -45,86 +45,57 @@ In this scenario, there is an existing forest synced using Azure AD Connect sync
4545
If your firewall enforces rules according to the originating users, open these ports for traffic from Windows services that run as a network service.
4646
- If your firewall or proxy allows you to specify safe suffixes, then add connections to **\*.msappproxy.net** and **\*.servicebus.windows.net**. If not, allow access to the [Azure datacenter IP ranges](https://www.microsoft.com/download/details.aspx?id=41653), which are updated weekly.
4747
- Your agents need access to **login.windows.net** and **login.microsoftonline.com** for initial registration. Open your firewall for those URLs as well.
48-
- For certificate validation, unblock the following URLs: **mscrl.microsoft.com:80**, **crl.microsoft.com:80**, **ocsp.msocsp.com:80**, and **www\.microsoft.com:80**. Since these URLs are used for certificate validation with other Microsoft products you may already have these URLs unblocked.
48+
- For certificate validation, unblock the following URLs: **mscrl.microsoft.com:80**, **crl.microsoft.com:80**, **ocsp.msocsp.com:80**, and **www\.microsoft.com:80**. Since these URLs are used for certificate validation with other Microsoft products, you may already have these URLs unblocked.
4949

5050
## Install the Azure AD Connect provisioning agent
51-
1. Sign in to the domain joined server. If you are using the [Basic AD and Azure environment](tutorial-basic-ad-azure.md) tutorial, it would be DC1.
52-
2. Sign in to the Azure portal using cloud-only global admin credentials.
53-
3. On the left, select **Azure Active Directory**, click **Azure AD Connect** and in the center select **Manage cloud sync**.</br>
54-
![Azure portal](media/how-to-install/install-6.png)</br>
55-
4. Click on "Download agent"
56-
5. Run the Azure AD Connect provisioning agent
57-
6. On the splash screen, **Accept** the licensing terms and click **Install**.</br>
58-
![Screenshot that shows the "Microsoft Azure AD Connect Provisioning Agent Package" splash screen.](media/how-to-install/install-1.png)</br>
5951

60-
7. Once this operation completes, the configuration wizard will launch. Sign in with your Azure AD global administrator account. Note that if you have IE enhanced security enabled this will block the sign-in. If this is the case, close the installation, disable IE enhanced security in Server Manager, and click the **AAD Connect Provisioning Agent Wizard** to restart the installation.
61-
8. On the **Connect Active Directory** screen, click **Add directory** and then sign in with your Active Directory domain administrator account. The domain administrator account should not have password change requirements. In case the password expires or changes, you will need to re-configure the agent with the new credentials. This operation will add your on-premises directory. Click **Next**.</br>
62-
![Screenshot that shows the "Connect Active Directory" screen.](media/how-to-install/install-3a.png)</br>
52+
If you're using the [Basic AD and Azure environment](tutorial-basic-ad-azure.md) tutorial, it would be DC1. To install the agent, follow these steps:
6353

64-
9. On the **Configuration complete** screen, click **Confirm**. This operation will register and restart the agent.</br>
65-
![Screenshot that shows the "Configuration complete" screen.](media/how-to-install/install-4a.png)</br>
54+
[!INCLUDE [active-directory-cloud-sync-how-to-install](../../../includes/active-directory-cloud-sync-how-to-install.md)]
6655

67-
> [!NOTE]
68-
> The group managed service account (for example, CONTOSO\provAgentgMSA$) is created in the same Active Directory domain where the host server has joined.
6956

70-
10. Once this operation completes you should see a notice: **Your agent configuration was successfully verified.** You can click **Exit**.</br>
71-
![Welcome screen](media/how-to-install/install-5.png)</br>
72-
11. If you still see the initial splash screen, click **Close**.
57+
## Verify agent installation
7358

59+
[!INCLUDE [active-directory-cloud-sync-how-to-verify-installation](../../../includes/active-directory-cloud-sync-how-to-verify-installation.md)]
7460

75-
## Verify agent installation
76-
Agent verification occurs in the Azure portal and on the local server that is running the agent.
61+
## Configure Azure AD Connect cloud sync
62+
Use the following steps to configure provisioning
7763

78-
### Azure portal agent verification
79-
To verify the agent is being seen by Azure follow these steps:
64+
1. Sign in to the Azure AD portal.
65+
2. Select **Azure Active Directory**
66+
3. Select **Azure AD Connect**
67+
4. Select **Manage cloud sync**
8068

81-
1. Sign in to the Azure portal.
82-
2. On the left, select **Azure Active Directory**, click **Azure AD Connect** and in the center select **Manage cloud sync**.</br>
83-
![Azure portal](media/how-to-install/install-6.png)</br>
69+
![Screenshot showing "Manage cloud sync" link.](media/how-to-configure/manage-1.png)
8470

85-
3. On the **Azure AD Connect cloud sync** screen click **Review all agents**.
86-
![Azure AD Provisioning](media/how-to-install/install-7.png)</br>
87-
88-
4. On the **On-premises provisioning agents screen** you will see the agents you have installed. Verify that the agent in question is there and is marked **active**.
89-
![Provisioning agents](media/how-to-install/verify-1.png)</br>
71+
5. Select **New Configuration**
9072

91-
### On the local server
92-
To verify that the agent is running follow these steps:
73+
![Screenshot of Azure AD Connect cloud sync screen with "New configuration" link highlighted.](media/tutorial-single-forest/configure-1.png)
9374

94-
1. Log on to the server with an administrator account
95-
2. Open **Services** by either navigating to it or by going to Start/Run/Services.msc.
96-
3. Under **Services**, make sure **Microsoft Azure AD Connect Agent Updater** and **Microsoft Azure AD Connect Provisioning Agent** are present and the status is **Running**.
97-
![Services](media/how-to-install/troubleshoot-1.png)
75+
7. On the configuration screen, enter a **Notification email**, move the selector to **Enable** and select **Save**.
9876

99-
## Configure Azure AD Connect cloud sync
100-
Use the following steps to configure provisioning
77+
![Screenshot of Configure screen with Notification email filled in and Enable selected.](media/how-to-configure/configure-2.png)
10178

102-
1. Sign in to the Azure AD portal.
103-
2. Click **Azure Active Directory**
104-
3. Click **Azure AD Connect**
105-
4. Select **Manage cloud sync**
106-
![Screenshot showing "Manage cloud sync" link.](media/how-to-configure/manage-1.png)
107-
5. Click **New Configuration**
108-
![Screenshot of Azure AD Connect cloud sync screen with "New configuration" link highlighted.](media/tutorial-single-forest/configure-1.png)
109-
7. On the configuration screen, enter a **Notification email**, move the selector to **Enable** and click **Save**.
110-
![Screenshot of Configure screen with Notification email filled in and Enable selected.](media/how-to-configure/configure-2.png)
11179
1. The configuration status should now be **Healthy**.
112-
![Screenshot of Azure AD Connect cloud sync screen showing Healthy status.](media/how-to-configure/manage-4.png)
80+
81+
![Screenshot of Azure AD Connect cloud sync screen showing Healthy status.](media/how-to-configure/manage-4.png)
11382

11483
## Verify users are created and synchronization is occurring
115-
You will now verify that the users that you had in our on-premises directory have been synchronized and now exist in our Azure AD tenant. Be aware that this may take a few hours to complete. To verify users are synchronized do the following.
84+
85+
You'll now verify that the users that you had in our on-premises directory have been synchronized and now exist in our Azure AD tenant. This process may take a few hours to complete. To verify users are synchronized, do the following:
11686

11787

11888
1. Browse to the [Azure portal](https://portal.azure.com) and sign in with an account that has an Azure subscription.
11989
2. On the left, select **Azure Active Directory**
12090
3. Under **Manage**, select **Users**.
121-
4. Verify that you see the new users in our tenant</br>
91+
4. Verify that you see the new users in our tenant
12292

12393
## Test signing in with one of our users
12494

12595
1. Browse to [https://myapps.microsoft.com](https://myapps.microsoft.com)
126-
2. Sign in with a user account that was created in our new tenant. You will need to sign in using the following format: ([email protected]). Use the same password that the user uses to sign in on-premises.</br>
127-
![Verify](media/tutorial-single-forest/verify-1.png)</br>
96+
2. Sign in with a user account that was created in our new tenant. You'll need to sign in using the following format: ([email protected]). Use the same password that the user uses to sign in on-premises.
97+
98+
![Screenshot that shows the my apps portal with a signed in users.](media/tutorial-single-forest/verify-1.png)
12899

129100
You have now successfully set up a hybrid identity environment that you can use to test and familiarize yourself with what Azure has to offer.
130101

0 commit comments

Comments
 (0)