Skip to content

Commit 8367d7b

Browse files
committed
updating
1 parent 122380b commit 8367d7b

File tree

2 files changed

+13
-12
lines changed

2 files changed

+13
-12
lines changed

articles/active-directory/hybrid/how-to-connect-pta-quick-start.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: 'Azure AD Pass-through Authentication - Quick start | Microsoft Docs'
2+
title: 'Azure AD Pass-through Authentication - Quickstart | Microsoft Docs'
33
description: This article describes how to get started with Azure Active Directory (Azure AD) Pass-through Authentication.
44
services: active-directory
55
keywords: Azure AD Connect Pass-through Authentication, install Active Directory, required components for Azure AD, SSO, Single Sign-on
@@ -18,7 +18,7 @@ ms.author: billmath
1818
ms.collection: M365-identity-device-management
1919
---
2020

21-
# Azure Active Directory Pass-through Authentication: Quick start
21+
# Azure Active Directory Pass-through Authentication: Quickstart
2222

2323
## Deploy Azure AD Pass-through Authentication
2424

@@ -61,12 +61,12 @@ Ensure that the following prerequisites are in place.
6161
| **8080** (optional) | Authentication Agents report their status every ten minutes over port 8080, if port 443 is unavailable. This status is displayed on the Azure AD portal. Port 8080 is _not_ used for user sign-ins. |
6262
6363
If your firewall enforces rules according to the originating users, open these ports for traffic from Windows services that run as a network service.
64-
- If your firewall or proxy allows DNS whitelisting, whitelist connections to **\*.msappproxy.net** and **\*.servicebus.windows.net**. If not, allow access to the [Azure datacenter IP ranges](https://www.microsoft.com/download/details.aspx?id=41653), which are updated weekly.
64+
- If your firewall or proxy allows DNS whitelisting, add connections to **\*.msappproxy.net** and **\*.servicebus.windows.net**. If not, allow access to the [Azure datacenter IP ranges](https://www.microsoft.com/download/details.aspx?id=41653), which are updated weekly.
6565
- Your Authentication Agents need access to **login.windows.net** and **login.microsoftonline.com** for initial registration. Open your firewall for those URLs as well.
6666
- For certificate validation, unblock the following URLs: **mscrl.microsoft.com:80**, **crl.microsoft.com:80**, **ocsp.msocsp.com:80**, and **www\.microsoft.com:80**. Since these URLs are used for certificate validation with other Microsoft products you may already have these URLs unblocked.
6767

6868
### Azure Government cloud prerequisite
69-
Prior to enabling Pass-through Authentication through Azure AD Connect with Step 2, download the latest release of the PTA agent from the Azure Portal. You need to ensure that your agent is versions **x.x.xxx.x** or later. To verify your agent see [Upgrade authentication agents](how-to-connect-pta-upgrade-preview-authentication-agents.md)
69+
Prior to enabling Pass-through Authentication through Azure AD Connect with Step 2, download the latest release of the PTA agent from the Azure portal. You need to ensure that your agent is versions **x.x.xxx.x** or later. To verify your agent see [Upgrade authentication agents](how-to-connect-pta-upgrade-preview-authentication-agents.md)
7070

7171
After downloading the latest release of the agent, proceed with the below instructions to configure Pass-Through Authentication through Azure AD Connect.
7272

@@ -114,8 +114,8 @@ If you plan to deploy Pass-through Authentication in a production environment, y
114114
Installing multiple Pass-through Authentication Agents ensures high availability, but not deterministic load balancing between the Authentication Agents. To determine how many Authentication Agents you need for your tenant, consider the peak and average load of sign-in requests that you expect to see on your tenant. As a benchmark, a single Authentication Agent can handle 300 to 400 authentications per second on a standard 4-core CPU, 16-GB RAM server.
115115

116116
To estimate network traffic, use the following sizing guidance:
117-
- Each request has a payload size of (0.5K + 1K * num_of_agents) bytes; i.e., data from Azure AD to the Authentication Agent. Here, "num_of_agents" indicates the number of Authentication Agents registered on your tenant.
118-
- Each response has a payload size of 1K bytes; i.e., data from the Authentication Agent to Azure AD.
117+
- Each request has a payload size of (0.5K + 1K * num_of_agents) bytes, that is, data from Azure AD to the Authentication Agent. Here, "num_of_agents" indicates the number of Authentication Agents registered on your tenant.
118+
- Each response has a payload size of 1K bytes, that is, data from the Authentication Agent to Azure AD.
119119

120120
For most customers, three Authentication Agents in total are sufficient for high availability and capacity. You should install Authentication Agents close to your domain controllers to improve sign-in latency.
121121

articles/active-directory/hybrid/reference-connect-government-cloud.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: 'Azure AD Connect: Hybrid Identity Considerations for Azure Government '
2+
title: 'Azure AD Connect: Hybrid identity considerations for Azure Government'
33
description: Special considerations for deploying Azure AD Connect with the government cloud.
44
services: active-directory
55
author: billmath
@@ -14,9 +14,9 @@ ms.collection: M365-identity-device-management
1414
---
1515

1616
# Hybrid identity considerations for Azure Government
17-
The following document describes the considerations for implementing a hybrid environment with the Azure Government cloud. This information is provide as reference for administrators and architects who are working with the Azure Government cloud.
17+
The following document describes the considerations for implementing a hybrid environment with the Azure Government cloud. This information is provided as reference for administrators and architects who are working with the Azure Government cloud.
1818
> [!NOTE]
19-
> In order to integrate an on-premises AD environment with the Azure Governemnt cloud you need to upgrade to the latest release of [Azure AD Connect](https://www.microsoft.com/download/details.aspx?id=47594).
19+
> In order to integrate an on-premises AD environment with the Azure Governemnt cloud, you need to upgrade to the latest release of [Azure AD Connect](https://www.microsoft.com/download/details.aspx?id=47594).
2020
2121
> [!NOTE]
2222
> For a full list of U.S. Government DoD Endpoints, refer to the [documentation](https://docs.microsoft.com/office365/enterprise/office-365-u-s-government-dod-endpoints)
@@ -25,7 +25,7 @@ The following document describes the considerations for implementing a hybrid en
2525
The following information is provided for implementation of pass-through authentication (PTA) and the Azure Government cloud.
2626

2727
### Allow access to URLs
28-
Before deploying the pass-through authentication agent, verify if there is a firewall between your servers and Azure AD. If your firewall or proxy allows DNS whitelisting, whitelist the following connections:
28+
Before deploying the pass-through authentication agent, verify if there is a firewall between your servers and Azure AD. If your firewall or proxy allows DNS whitelisting, add the following connections:
2929
> [!NOTE]
3030
> The following guidance also applies to installing the [Application Proxy connector](https://aka.ms/whyappproxy) for Azure Government environments.
3131
@@ -36,7 +36,7 @@ Before deploying the pass-through authentication agent, verify if there is a fir
3636
|login.windows.us secure.aadcdn.microsoftonline-p.com *.microsoftonline.us </br>*.microsoftonline-p.us </br>*.msauth.net </br>*.msauthimages.net </br>*.msecnd.net</br>*.msftauth.net </br>*.msftauthimages.net</br>*.phonefactor.net </br>enterpriseregistration.windows.net</br>management.azure.com </br>policykeyservice.dc.ad.msft.net</br>ctdl.windowsupdate.us:80| The agent uses these URLs during the registration process.|
3737

3838
### Install the agent for the Azure Government cloud
39-
In order to install the agent for the Azure Government cloud you must follow these specific steps:
39+
In order to install the agent for the Azure Government cloud, you must follow these specific steps:
4040
In the command line terminal, navigate to folder where the executable for installing the agent is located.
4141
Run the following command which specifies the installation is for Azure Government.
4242

@@ -53,7 +53,8 @@ AADApplicationProxyConnectorInstaller.exe ENVIRONMENTNAME="AzureUSGovernment"
5353
## Single sign on
5454
Set up your Azure AD Connect server: If you use Pass-through Authentication as your sign-in method, no additional prerequisite check is required. If you use password hash synchronization as your sign-in method, and if there is a firewall between Azure AD Connect and Azure AD, ensure that:
5555
- You use version 1.1.644.0 or later of Azure AD Connect.
56-
- If your firewall or proxy allows DNS whitelisting, whitelist the connections to the *.msapproxy.us URLs over port 443. If not, allow access to the Azure datacenter IP ranges, which are updated weekly. This prerequisite is applicable only when you enable the feature. It is not required for actual user sign-ins.
56+
- If your firewall or proxy allows DNS whitelisting, add the connections to the *.msapproxy.us URLs over port 443. If not, allow access to the Azure datacenter IP ranges, which are updated weekly. Th
57+
- is prerequisite is applicable only when you enable the feature. It is not required for actual user sign-ins.
5758

5859
### Rolling out seamless SSO
5960
You can gradually roll out Seamless SSO to your users using the instructions provided below. You start by adding the following Azure AD URL to all or selected users' Intranet zone settings by using Group Policy in Active Directory:

0 commit comments

Comments
 (0)