Skip to content

Commit b6a6e02

Browse files
authored
Merge pull request #84704 from HAMATHAR/patch-1
Add details about how to capture PTA Agent ID
2 parents 3a33638 + 9c3da4a commit b6a6e02

File tree

1 file changed

+22
-8
lines changed

1 file changed

+22
-8
lines changed

articles/active-directory/hybrid/how-to-connect-pta-faq.yml

Lines changed: 22 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ sections:
2525
- name: Ignored
2626
questions:
2727
- question: |
28-
Which of the methods to sign in to Azure AD, Pass-through Authentication, password hash synchronization, and Active Directory Federation Services (AD FS), should I choose?
28+
Which of the methods to sign in to Azure AD, Pass-through Authentication, password hash synchronization, and Active Directory Federation Services (AD FS) should I choose?
2929
answer: |
3030
Review [this guide](./choose-ad-authn.md) for a comparison of the various Azure AD sign-in methods and how to choose the right sign-in method for your organization.
3131
@@ -180,20 +180,34 @@ sections:
180180
If you uninstall a Pass-through Authentication Agent from a server, it causes the server to stop accepting sign-in requests. To avoid breaking the user sign-in capability on your tenant, ensure that you have another Authentication Agent running before you uninstall a Pass-through Authentication Agent.
181181
182182
- question: |
183-
I have an older tenant that was originally setup using AD FS. We recently migrated to PTA but now are not seeing our UPN changes synchronizing to Azure AD. Why are our UPN changes not being synchronized?
183+
I have an older tenant that was originally setup using AD FS. We recently migrated to PTA, but now are not seeing our UPN changes synchronizing to Azure AD. Why are our UPN changes not being synchronized?
184184
answer: |
185-
A: Under the following circumstances your on-premises UPN changes may not synchronize if:
185+
Under the following circumstances your on-premises UPN changes might not synchronize if:
186186
187-
- Your Azure AD tenant was created prior to June 15th 2015
188-
- You initially were federated with your Azure AD tenant using AD FS for authentication
189-
- You switched to having managed users using PTA as authentication
187+
- Your Azure AD tenant was created prior to June 15, 2015.
188+
- You initially were federated with your Azure AD tenant using AD FS for authentication.
189+
- You switched to having managed users using PTA as authentication.
190190
191-
This is because the default behavior of tenants created prior to June 15th 2015 was to block UPN changes. If you need to un-block UPN changes you need to run the following PowerShell cmdlt:
191+
This is because the default behavior of tenants created prior to June 15, 2015 was to block UPN changes. If you need to un-block UPN changes you need to run the following PowerShell cmdlet:
192192
193193
`Set-MsolDirSyncFeature -Feature SynchronizeUpnForManagedUsers -Enable $True`
194194
195-
Tenants created after June 15th 2015 have the default behavior of synchronizing UPN changes.
195+
Tenants created after June 15, 2015 have the default behavior of synchronizing UPN changes.
196196
197+
- question: |
198+
How do I capture the PTA Agent ID from Azure AD sign-in logs and the PTA server to validate which PTA server was used for a sign-in event?
199+
answer: |
200+
To validate which local server or authentication agent was used for a specific sign-in event:
201+
202+
1. In the Azure portal, go to the sign-in event.
203+
2. Select **Authentication Details**. In the **Authentication Method Detail** column, Agent ID details are shown in the format "Pass-through Authentication; PTA AgentId: XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX".
204+
3. To get Agent ID details for the agent that's installed on your local server, log in to your local server and run following cmdlet:
205+
206+
`Get-ItemProperty -Path 'HKLM:\SOFTWARE\Microsoft\Azure AD Connect Agents\Azure AD Connect Authentication Agent' | Select *Instance*`
207+
208+
The GUID value that's returned is the Agent ID of the authentication agent that's installed on that specific server. If you have multiple agents in your environment, you can run this cmdlet on each agent server and capture the Agent ID details.
209+
4. Correlate the Agent ID that you get from the local server and from the Azure AD sign-in logs to validate which agent or server acknowledged the sign-request.
210+
197211
additionalContent: |
198212
199213
## Next steps

0 commit comments

Comments
 (0)