Skip to content

Commit 9651dfe

Browse files
Updated computer account name
------- cc: @billmath
1 parent aa2d6fe commit 9651dfe

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

articles/active-directory/hybrid/how-to-connect-sso-faq.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -69,9 +69,9 @@ You can use both Azure AD Join and Seamless SSO on your tenant. These two featur
6969

7070
Yes, this scenario needs version 2.1 or later of the [workplace-join client](https://www.microsoft.com/download/details.aspx?id=53554).
7171

72-
**Q: How can I roll over the Kerberos decryption key of the `AZUREADSSOACC` computer account?**
72+
**Q: How can I roll over the Kerberos decryption key of the `AZUREADSSO` computer account?**
7373

74-
It is important to frequently roll over the Kerberos decryption key of the `AZUREADSSOACC` computer account (which represents Azure AD) created in your on-premises AD forest.
74+
It is important to frequently roll over the Kerberos decryption key of the `AZUREADSSO` computer account (which represents Azure AD) created in your on-premises AD forest.
7575

7676
>[!IMPORTANT]
7777
>We highly recommend that you roll over the Kerberos decryption key at least every 30 days.
@@ -96,7 +96,7 @@ Follow these steps on the on-premises server where you are running Azure AD Conn
9696
>[!NOTE]
9797
>The domain administrator account used must not be a member of the Protected Users group. If so, the operation will fail.
9898
99-
2. Call `Update-AzureADSSOForest -OnPremCredentials $creds`. This command updates the Kerberos decryption key for the `AZUREADSSOACC` computer account in this specific AD forest and updates it in Azure AD.
99+
2. Call `Update-AzureADSSOForest -OnPremCredentials $creds`. This command updates the Kerberos decryption key for the `AZUREADSSO` computer account in this specific AD forest and updates it in Azure AD.
100100
3. Repeat the preceding steps for each AD forest that you’ve set up the feature on.
101101

102102
>[!IMPORTANT]
@@ -140,7 +140,7 @@ Follow these steps on the on-premises server where you are running Azure AD Conn
140140
4. Run PowerShell as an Administrator. In PowerShell, call `New-AzureADSSOAuthenticationContext`. This command should give you a popup to enter your tenant's Global Administrator credentials.
141141
5. Call `Get-AzureADSSOStatus | ConvertFrom-Json`. This command provides you the list of AD forests (look at the "Domains" list) on which this feature has been enabled.
142142

143-
**Step 3. Manually delete the `AZUREADSSOACCT` computer account from each AD forest that you see listed.**
143+
**Step 3. Manually delete the `AZUREADSSO` computer account from each AD forest that you see listed.**
144144

145145
## Next steps
146146

0 commit comments

Comments
 (0)