Skip to content

Commit 9df6ec1

Browse files
authored
Merge pull request #108666 from TimShererWithAquent/us1679050s
Change SSL to TLS per 1679050
2 parents 362b7ab + 3d54482 commit 9df6ec1

20 files changed

+49
-49
lines changed

articles/active-directory/cloud-provisioning/how-to-prerequisites.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ Run the [IdFix tool](https://docs.microsoft.com/office365/enterprise/prepare-dir
4848

4949
| Port number | How it's used |
5050
| --- | --- |
51-
| **80** | Downloads the certificate revocation lists (CRLs) while validating the SSL certificate. |
51+
| **80** | Downloads the certificate revocation lists (CRLs) while validating the TLS/SSL certificate. |
5252
| **443** | Handles all outbound communication with the service. |
5353
| **8080** (optional) | Agents report their status every 10 minutes over port 8080, if port 443 is unavailable. This status is displayed in the Azure AD portal. |
5454

articles/active-directory/cloud-provisioning/tutorial-existing-forest.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ In this scenario, there is an existing forest synced using Azure AD Connect sync
3838

3939
| Port number | How it's used |
4040
| --- | --- |
41-
| **80** | Downloads the certificate revocation lists (CRLs) while validating the SSL certificate |
41+
| **80** | Downloads the certificate revocation lists (CRLs) while validating the TLS/SSL certificate |
4242
| **443** | Handles all outbound communication with the service |
4343
| **8080** (optional) | Agents report their status every 10 minutes over port 8080, if port 443 is unavailable. This status is displayed on the Azure AD portal. |
4444

articles/active-directory/cloud-provisioning/tutorial-single-forest.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ You can use the environment you create in this tutorial for testing or for getti
3636

3737
| Port number | How it's used |
3838
| --- | --- |
39-
| **80** | Downloads the certificate revocation lists (CRLs) while validating the SSL certificate |
39+
| **80** | Downloads the certificate revocation lists (CRLs) while validating the TLS/SSL certificate |
4040
| **443** | Handles all outbound communication with the service |
4141
| **8080** (optional) | Agents report their status every 10 minutes over port 8080, if port 443 is unavailable. This status is displayed on the Azure AD portal. |
4242

articles/active-directory/hybrid/how-to-connect-azure-ad-trust.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ Azure AD connect does not update all settings for Azure AD trust during configur
5858
| Add WAP server | None |
5959
| Device options | Issuance transform rules, IWA for device registration |
6060
| Add federated domain | If the domain is being added for the first time, that is, the setup is changing from single domain federation to multi-domain federation – Azure AD Connect will recreate the trust from scratch. If the trust with Azure AD is already configured for multiple domains, only Issuance transform rules are modified |
61-
| Update SSL | None |
61+
| Update TLS | None |
6262

6363
During all operations, in which, any setting is modified, Azure AD Connect makes a backup of the current trust settings at **%ProgramData%\AADConnect\ADFS**
6464

articles/active-directory/hybrid/how-to-connect-fed-management.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ This article describes how to manage and customize Active Directory Federation S
3131
| [Add an AD FS server](#addadfsserver) |How to expand an AD FS farm with an additional AD FS server. |
3232
| [Add an AD FS Web Application Proxy server](#addwapserver) |How to expand an AD FS farm with an additional Web Application Proxy (WAP) server. |
3333
| [Add a federated domain](#addfeddomain) |How to add a federated domain. |
34-
| [Update the SSL certificate](how-to-connect-fed-ssl-update.md)| How to update the SSL certificate for an AD FS farm. |
34+
| [Update the TLS/SSL certificate](how-to-connect-fed-ssl-update.md)| How to update the TLS/SSL certificate for an AD FS farm. |
3535
| **Customize AD FS** | |
3636
| [Add a custom company logo or illustration](#customlogo) |How to customize an AD FS sign-in page with a company logo and illustration. |
3737
| [Add a sign-in description](#addsignindescription) |How to add a sign-in page description. |
@@ -103,7 +103,7 @@ Configuring alternate login ID for AD FS consists of two main steps:
103103

104104
![Certificate password](./media/how-to-connect-fed-management/AddNewADFSServer4.PNG)
105105

106-
![Specify SSL certificate](./media/how-to-connect-fed-management/AddNewADFSServer5.PNG)
106+
![Specify TLS/SSL certificate](./media/how-to-connect-fed-management/AddNewADFSServer5.PNG)
107107

108108
5. On the **AD FS Servers** page, enter the server name or IP address to be added to the AD FS farm.
109109

@@ -131,7 +131,7 @@ Configuring alternate login ID for AD FS consists of two main steps:
131131
3. On the **Specify SSL certificate** page, provide the password for the PFX file that you provided when you configured the AD FS farm with Azure AD Connect.
132132
![Certificate password](./media/how-to-connect-fed-management/WapServer3.PNG)
133133

134-
![Specify SSL certificate](./media/how-to-connect-fed-management/WapServer4.PNG)
134+
![Specify TLS/SSL certificate](./media/how-to-connect-fed-management/WapServer4.PNG)
135135

136136
4. Add the server to be added as a WAP server. Because the WAP server might not be joined to the domain, the wizard asks for administrative credentials to the server being added.
137137

articles/active-directory/hybrid/how-to-connect-fed-ssl-update.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Azure AD Connect - Update the SSL certificate for an AD FS farm | Microsoft Docs
3-
description: This document details the steps to update the SSL certificate of an AD FS farm by using Azure AD Connect.
2+
title: Azure AD Connect - Update the TLS/SSL certificate for an AD FS farm | Microsoft Docs
3+
description: This document details the steps to update the TLS/SSL certificate of an AD FS farm by using Azure AD Connect.
44
services: active-directory
55
manager: daveba
66
editor: billmath
@@ -18,12 +18,12 @@ ms.author: billmath
1818
ms.collection: M365-identity-device-management
1919
---
2020

21-
# Update the SSL certificate for an Active Directory Federation Services (AD FS) farm
21+
# Update the TLS/SSL certificate for an Active Directory Federation Services (AD FS) farm
2222

2323
## Overview
24-
This article describes how you can use Azure AD Connect to update the SSL certificate for an Active Directory Federation Services (AD FS) farm. You can use the Azure AD Connect tool to easily update the SSL certificate for the AD FS farm even if the user sign-in method selected is not AD FS.
24+
This article describes how you can use Azure AD Connect to update the TLS/SSL certificate for an Active Directory Federation Services (AD FS) farm. You can use the Azure AD Connect tool to easily update the TLS/SSL certificate for the AD FS farm even if the user sign-in method selected is not AD FS.
2525

26-
You can perform the whole operation of updating SSL certificate for the AD FS farm across all federation and Web Application Proxy (WAP) servers in three simple steps:
26+
You can perform the whole operation of updating TLS/SSL certificate for the AD FS farm across all federation and Web Application Proxy (WAP) servers in three simple steps:
2727

2828
![Three steps](./media/how-to-connect-fed-ssl-update/threesteps.png)
2929

@@ -36,15 +36,15 @@ You can perform the whole operation of updating SSL certificate for the AD FS fa
3636
* **AD FS Farm**: Make sure that your AD FS farm is Windows Server 2012 R2-based or later.
3737
* **Azure AD Connect**: Ensure that the version of Azure AD Connect is 1.1.553.0 or higher. You'll use the task **Update AD FS SSL certificate**.
3838

39-
![Update SSL task](./media/how-to-connect-fed-ssl-update/updatessltask.png)
39+
![Update TLS task](./media/how-to-connect-fed-ssl-update/updatessltask.png)
4040

4141
## Step 1: Provide AD FS farm information
4242

4343
Azure AD Connect attempts to obtain information about the AD FS farm automatically by:
4444
1. Querying the farm information from AD FS (Windows Server 2016 or later).
4545
2. Referencing the information from previous runs, which are stored locally with Azure AD Connect.
4646

47-
You can modify the list of servers that are displayed by adding or removing the servers to reflect the current configuration of the AD FS farm. As soon as the server information is provided, Azure AD Connect displays the connectivity and current SSL certificate status.
47+
You can modify the list of servers that are displayed by adding or removing the servers to reflect the current configuration of the AD FS farm. As soon as the server information is provided, Azure AD Connect displays the connectivity and current TLS/SSL certificate status.
4848

4949
![AD FS server info](./media/how-to-connect-fed-ssl-update/adfsserverinfo.png)
5050

@@ -55,11 +55,11 @@ If the list contains a server that's no longer part of the AD FS farm, click **R
5555
>[!NOTE]
5656
> Removing a server from the list of servers for an AD FS farm in Azure AD Connect is a local operation and updates the information for the AD FS farm that Azure AD Connect maintains locally. Azure AD Connect doesn't modify the configuration on AD FS to reflect the change.
5757
58-
## Step 2: Provide a new SSL certificate
58+
## Step 2: Provide a new TLS/SSL certificate
5959

60-
After you've confirmed the information about AD FS farm servers, Azure AD Connect asks for the new SSL certificate. Provide a password-protected PFX certificate to continue the installation.
60+
After you've confirmed the information about AD FS farm servers, Azure AD Connect asks for the new TLS/SSL certificate. Provide a password-protected PFX certificate to continue the installation.
6161

62-
![SSL certificate](./media/how-to-connect-fed-ssl-update/certificate.png)
62+
![TLS/SSL certificate](./media/how-to-connect-fed-ssl-update/certificate.png)
6363

6464
After you provide the certificate, Azure AD Connect goes through a series of prerequisites. Verify the certificate to ensure that the certificate is correct for the AD FS farm:
6565

@@ -70,7 +70,7 @@ After you provide the certificate, Azure AD Connect goes through a series of pre
7070

7171
## Step 3: Select servers for the update
7272

73-
In the next step, select the servers that need to have the SSL certificate updated. Servers that are offline can't be selected for the update.
73+
In the next step, select the servers that need to have the TLS/SSL certificate updated. Servers that are offline can't be selected for the update.
7474

7575
![Select servers to update](./media/how-to-connect-fed-ssl-update/selectservers.png)
7676

@@ -80,7 +80,7 @@ After you complete the configuration, Azure AD Connect displays the message that
8080

8181
## FAQs
8282

83-
* **What should be the subject name of the certificate for the new AD FS SSL certificate?**
83+
* **What should be the subject name of the certificate for the new AD FS TLS/SSL certificate?**
8484

8585
Azure AD Connect checks if the subject name/alternate subject name of the certificate contains the federation service name. For example, if your federation service name is fs.contoso.com, the subject name/alternate subject name must be fs.contoso.com. Wildcard certificates are also accepted.
8686

@@ -92,7 +92,7 @@ After you complete the configuration, Azure AD Connect displays the message that
9292

9393
Azure AD Connect can't perform any operation if the server is offline. If the server is part of the AD FS farm, then check the connectivity to the server. After you've resolved the issue, press the refresh icon to update the status in the wizard. If the server was part of the farm earlier but now no longer exists, click **Remove** to delete it from the list of servers that Azure AD Connect maintains. Removing the server from the list in Azure AD Connect doesn't alter the AD FS configuration itself. If you're using AD FS in Windows Server 2016 or later, the server remains in the configuration settings and will be shown again the next time the task is run.
9494

95-
* **Can I update a subset of my farm servers with the new SSL certificate?**
95+
* **Can I update a subset of my farm servers with the new TLS/SSL certificate?**
9696

9797
Yes. You can always run the task **Update SSL Certificate** again to update the remaining servers. On the **Select servers for SSL certificate update** page, you can sort the list of servers on **SSL Expiry date** to easily access the servers that aren't updated yet.
9898

articles/active-directory/hybrid/how-to-connect-fed-whatis.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ This topic is the home for information on federation-related functionalities for
3737
| [Add a new AD FS server](how-to-connect-fed-management.md#addadfsserver) |Expand an AD FS farm with an additional AD FS server after initial installation. |
3838
| [Add a new AD FS WAP server](how-to-connect-fed-management.md#addwapserver) |Expand an AD FS farm with an additional Web Application Proxy (WAP) server after initial installation. |
3939
| [Add a new federated domain](how-to-connect-fed-management.md#addfeddomain) |Add another domain to be federated with Azure AD. |
40-
| [Update the SSL certificate](how-to-connect-fed-ssl-update.md)| Update the SSL certificate for an AD FS farm. |
40+
| [Update the TLS/SSL certificate](how-to-connect-fed-ssl-update.md)| Update the TLS/SSL certificate for an AD FS farm. |
4141
| [Renew federation certificates for Office 365 and Azure AD](how-to-connect-fed-o365-certs.md)|Renew your O365 certificate with Azure AD.|
4242
| **Other federation configuration** | |
4343
| [Federate multiple instances of Azure AD with single instance of AD FS](how-to-connect-fed-single-adfs-multitenant-federation.md) | Federate multiple Azure AD with single AD FS farm|

articles/active-directory/hybrid/how-to-connect-health-agent-install.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ The following table is a list of requirements for using Azure AD Connect Health.
3333
| Azure AD Connect Health Agent is installed on each targeted server | Azure AD Connect Health requires the Health Agents to be installed and configured on targeted servers to receive the data and provide the Monitoring and Analytics capabilities. <br /><br />For example, to get data from your AD FS infrastructure, the agent must be installed on the AD FS and Web Application Proxy servers. Similarly, to get data on your on-premises AD DS infrastructure, the agent must be installed on the domain controllers. <br /><br /> |
3434
| Outbound connectivity to the Azure service endpoints | During installation and runtime, the agent requires connectivity to Azure AD Connect Health service endpoints. If outbound connectivity is blocked using Firewalls, ensure that the following endpoints are added to the allowed list. See [outbound connectivity endpoints](how-to-connect-health-agent-install.md#outbound-connectivity-to-the-azure-service-endpoints) |
3535
|Outbound connectivity based on IP Addresses | For IP address based filtering on firewalls, refer to the [Azure IP Ranges](https://www.microsoft.com/download/details.aspx?id=41653).|
36-
| SSL Inspection for outbound traffic is filtered or disabled | The agent registration step or data upload operations may fail if there is SSL inspection or termination for outbound traffic at the network layer. Read more about [how to setup SSL inspection](https://technet.microsoft.com/library/ee796230.aspx) |
36+
| TLS Inspection for outbound traffic is filtered or disabled | The agent registration step or data upload operations may fail if there is TLS inspection or termination for outbound traffic at the network layer. Read more about [how to setup TLS inspection](https://technet.microsoft.com/library/ee796230.aspx) |
3737
| Firewall ports on the server running the agent |The agent requires the following firewall ports to be open in order for the agent to communicate with the Azure AD Health service endpoints.<br /><br /><li>TCP port 443</li><li>TCP port 5671</li> <br />Note that port 5671 is no longer required for the latest version of agent. Upgrade to the latest version so only port 443 is required. Read more about [enable firewall ports](https://technet.microsoft.com/library/ms345310(v=sql.100).aspx) |
3838
| Allow the following websites if IE Enhanced Security is enabled |If IE Enhanced Security is enabled, then the following websites must be allowed on the server that is going to have the agent installed.<br /><br /><li>https:\//login.microsoftonline.com</li><li>https:\//secure.aadcdn.microsoftonline-p.com</li><li>https:\//login.windows.net</li><li>https:\//aadcdn.msftauth.net</li><li>The federation server for your organization trusted by Azure Active Directory. For example: https:\//sts.contoso.com</li> Read more about [how to configure IE](https://support.microsoft.com/help/815141/internet-explorer-enhanced-security-configuration-changes-the-browsing). In case you have a proxy within your network , please see note below.|
3939
| Ensure PowerShell v4.0 or newer is installed | <li>Windows Server 2008 R2 ships with PowerShell v2.0, which is insufficient for the agent. Update PowerShell as explained below under [Agent installation on Windows Server 2008 R2 Servers](#agent-installation-on-windows-server-2008-r2-servers).</li><li>Windows Server 2012 ships with PowerShell v3.0, which is insufficient for the agent. [Update](https://www.microsoft.com/download/details.aspx?id=40855) the Windows Management Framework.</li><li>Windows Server 2012 R2 and later ship with a sufficiently recent version of PowerShell.</li>|

0 commit comments

Comments
 (0)