Skip to content

Commit 9f18b0a

Browse files
authored
Merge pull request #58025 from swkrish/master
Updates based on customer feedback
2 parents 6bead09 + 313fb58 commit 9f18b0a

File tree

5 files changed

+27
-10
lines changed

5 files changed

+27
-10
lines changed

articles/active-directory/hybrid/how-to-connect-pta-faq.md

Lines changed: 18 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.workload: identity
1212
ms.tgt_pltfrm: na
1313
ms.devlang: na
1414
ms.topic: article
15-
ms.date: 10/21/2018
15+
ms.date: 11/14/2018
1616
ms.component: hybrid
1717
ms.author: billmath
1818
---
@@ -75,6 +75,23 @@ If you have not configured password writeback for a specific user or if the user
7575

7676
Yes. If Web Proxy Auto-Discovery (WPAD) is enabled in your on-premises environment, Authentication Agents automatically attempt to locate and use a web proxy server on the network.
7777

78+
If you don't have WPAD in your environment, you can add proxy information (as shown below) to allow a Pass-through Authentication Agent to communicate with Azure AD:
79+
- Configure proxy information in Internet Explorer before you install the Pass-through Authentication Agent on the server. This will allow you to complete the installation of the Authentication Agent, but it will still show up as **Inactive** on the Admin portal.
80+
- On the server, navigate to "C:\Program Files\Microsoft Azure AD Connect Authentication Agent".
81+
- Edit the "AzureADConnectAuthenticationAgentService" configuration file and add the following lines (replace "http://contosoproxy.com:8080" with your actual proxy address):
82+
83+
```
84+
<system.net>
85+
<defaultProxy enabled="true" useDefaultCredentials="true">
86+
<proxy
87+
usesystemdefault="true"
88+
proxyaddress="http://contosoproxy.com:8080"
89+
bypassonlocal="true"
90+
/>
91+
</defaultProxy>
92+
</system.net>
93+
```
94+
7895
## Can I install two or more Pass-through Authentication Agents on the same server?
7996

8097
No, you can only install one Pass-through Authentication Agent on a single server. If you want to configure Pass-through Authentication for high availability, [follow the instructions here](how-to-connect-pta-quick-start.md#step-4-ensure-high-availability).

articles/active-directory/hybrid/how-to-connect-sso-faq.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.workload: identity
1212
ms.tgt_pltfrm: na
1313
ms.devlang: na
1414
ms.topic: article
15-
ms.date: 09/04/2018
15+
ms.date: 11/14/2018
1616
ms.component: hybrid
1717
ms.author: billmath
1818
---
@@ -41,7 +41,7 @@ Listed below is a non-exhaustive list of applications that can send these parame
4141
| -- | -- |
4242
| Access panel | https://myapps.microsoft.com/contoso.com |
4343
| Outlook on Web | https://outlook.office365.com/contoso.com |
44-
| Office 365 portal | https://portal.office.com?domain_hint=contoso.com |
44+
| Office 365 portals | https://portal.office.com?domain_hint=contoso.com, https://www.office.com?domain_hint=contoso.com |
4545

4646
In addition, users get a silent sign-on experience if an application sends sign-in requests to Azure AD's tenanted endpoints - that is, https://login.microsoftonline.com/contoso.com/<..> or https://login.microsoftonline.com/<tenant_ID>/<..> - instead of Azure AD's common endpoint - that is, https://login.microsoftonline.com/common/<...>. Listed below is a non-exhaustive list of applications that make these types of sign-in requests.
4747

articles/active-directory/hybrid/how-to-connect-sso-how-it-works.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.workload: identity
1212
ms.tgt_pltfrm: na
1313
ms.devlang: na
1414
ms.topic: article
15-
ms.date: 07/19/2018
15+
ms.date: 11/14/2018
1616
ms.component: hybrid
1717
ms.author: billmath
1818
---
@@ -74,8 +74,8 @@ The sign-in flow on a native client is as follows:
7474

7575
1. The user tries to access a native application (for example, the Outlook client) from a domain-joined corporate device inside your corporate network.
7676
2. If the user is not already signed in, the native application retrieves the username of the user from the device's Windows session.
77-
3. The app sends the username to Azure AD, and retrieves your tenant's WS-Trust MEX endpoint.
78-
4. The app then queries the WS-Trust MEX endpoint to see if integrated authentication endpoint is available.
77+
3. The app sends the username to Azure AD, and retrieves your tenant's WS-Trust MEX endpoint. This WS-Trust endpoint is used exclusively by the Seamless SSO feature, and is not a general implementation of the WS-Trust protocol on Azure AD.
78+
4. The app then queries the WS-Trust MEX endpoint to see if integrated authentication endpoint is available. The integrated authentication endpoint is used exclusively by the Seamless SSO feature.
7979
5. If step 4 succeeds, a Kerberos challenge is issued.
8080
6. If the app is able to retrieve the Kerberos ticket, it forwards it up to Azure AD's integrated authentication endpoint.
8181
7. Azure AD decrypts the Kerberos ticket and validates it.

articles/active-directory/hybrid/how-to-connect-sso-quick-start.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.workload: identity
1212
ms.tgt_pltfrm: na
1313
ms.devlang: na
1414
ms.topic: article
15-
ms.date: 10/21/2018
15+
ms.date: 11/14/2018
1616
ms.component: hybrid
1717
ms.author: billmath
1818
---
@@ -86,7 +86,7 @@ Follow these instructions to verify that you have enabled Seamless SSO correctly
8686
![Azure portal: Azure AD Connect pane](./media/how-to-connect-sso-quick-start/sso10.png)
8787

8888
>[!IMPORTANT]
89-
> Seamless SSO creates a computer account named `AZUREADSSOACC` (which represents Azure AD) in your on-premises Active Directory (AD) in each AD forest. This computer account is needed for the feature to work. Move the `AZUREADSSOACC` computer account to an Organization Unit (OU) where other computer accounts are stored to ensure that it is managed in the same way and is not deleted.
89+
> Seamless SSO creates a computer account named `AZUREADSSOACC` (which represents Azure AD) in your on-premises Active Directory (AD) in each AD forest. This computer account is needed for the feature to work. If you are using Pass-the-Hash and Credential Theft Mitigation architectures in your on-premises environment, ensure that the `AZUREADSSOACC` computer account doesn't end up in the Quarantine container. Make the appropriate changes to create the computer account in the Computers container. After Seamless SSO is successfully enabled on the Azure AD Connect wizard, move the `AZUREADSSOACC` computer account to an Organization Unit (OU) where other computer accounts are managed to ensure that it is not deleted inadvertently.
9090
9191
## Step 3: Roll out the feature
9292

articles/active-directory/hybrid/tshoot-connect-pass-through-authentication.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.workload: identity
1212
ms.tgt_pltfrm: na
1313
ms.devlang: na
1414
ms.topic: article
15-
ms.date: 09/24/2018
15+
ms.date: 11/14/2018
1616
ms.component: hybrid
1717
ms.author: billmath
1818
---
@@ -120,7 +120,7 @@ For errors related to installation, check the Azure AD Connect logs at **%Progra
120120

121121
For errors related to the Authentication Agent, open up the Event Viewer application on the server and check under **Application and Service Logs\Microsoft\AzureAdConnect\AuthenticationAgent\Admin**.
122122

123-
For detailed analytics, enable the "Session" log. Don't run the Authentication Agent with this log enabled during normal operations; use only for troubleshooting. The log contents are only visible after the log is disabled again.
123+
For detailed analytics, enable the "Session" log (right-click inside the Event Viewer application to find this option). Don't run the Authentication Agent with this log enabled during normal operations; use only for troubleshooting. The log contents are only visible after the log is disabled again.
124124

125125
### Detailed trace logs
126126

0 commit comments

Comments
 (0)