You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/hybrid/how-to-connect-pta-faq.yml
+22-8Lines changed: 22 additions & 8 deletions
Original file line number
Diff line number
Diff line change
@@ -25,7 +25,7 @@ sections:
25
25
- name: Ignored
26
26
questions:
27
27
- question: |
28
-
Which of the methods to sign in to Azure AD, Pass-through Authentication, password hash synchronization, and Active Directory Federation Services (AD FS), should I choose?
28
+
Which of the methods to sign in to Azure AD, Pass-through Authentication, password hash synchronization, and Active Directory Federation Services (AD FS) should I choose?
29
29
answer: |
30
30
Review [this guide](./choose-ad-authn.md) for a comparison of the various Azure AD sign-in methods and how to choose the right sign-in method for your organization.
31
31
@@ -180,20 +180,34 @@ sections:
180
180
If you uninstall a Pass-through Authentication Agent from a server, it causes the server to stop accepting sign-in requests. To avoid breaking the user sign-in capability on your tenant, ensure that you have another Authentication Agent running before you uninstall a Pass-through Authentication Agent.
181
181
182
182
- question: |
183
-
I have an older tenant that was originally setup using AD FS. We recently migrated to PTA but now are not seeing our UPN changes synchronizing to Azure AD. Why are our UPN changes not being synchronized?
183
+
I have an older tenant that was originally setup using AD FS. We recently migrated to PTA, but now are not seeing our UPN changes synchronizing to Azure AD. Why are our UPN changes not being synchronized?
184
184
answer: |
185
-
A: Under the following circumstances your on-premises UPN changes may not synchronize if:
185
+
Under the following circumstances your on-premises UPN changes might not synchronize if:
186
186
187
-
- Your Azure AD tenant was created prior to June 15th 2015
188
-
- You initially were federated with your Azure AD tenant using AD FS for authentication
189
-
- You switched to having managed users using PTA as authentication
187
+
- Your Azure AD tenant was created prior to June 15, 2015.
188
+
- You initially were federated with your Azure AD tenant using AD FS for authentication.
189
+
- You switched to having managed users using PTA as authentication.
190
190
191
-
This is because the default behavior of tenants created prior to June 15th 2015 was to block UPN changes. If you need to un-block UPN changes you need to run the following PowerShell cmdlt:
191
+
This is because the default behavior of tenants created prior to June 15, 2015 was to block UPN changes. If you need to un-block UPN changes you need to run the following PowerShell cmdlet:
Tenants created after June 15th 2015 have the default behavior of synchronizing UPN changes.
195
+
Tenants created after June 15, 2015 have the default behavior of synchronizing UPN changes.
196
196
197
+
- question: |
198
+
How do I capture the PTA Agent ID from Azure AD sign-in logs and the PTA server to validate which PTA server was used for a sign-in event?
199
+
answer: |
200
+
To validate which local server or authentication agent was used for a specific sign-in event:
201
+
202
+
1. In the Azure portal, go to the sign-in event.
203
+
2. Select **Authentication Details**. In the **Authentication Method Detail** column, Agent ID details are shown in the format "Pass-through Authentication; PTA AgentId: XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX".
204
+
3. To get Agent ID details for the agent that's installed on your local server, log in to your local server and run following cmdlet:
205
+
206
+
`Get-ItemProperty -Path 'HKLM:\SOFTWARE\Microsoft\Azure AD Connect Agents\Azure AD Connect Authentication Agent' | Select *Instance*`
207
+
208
+
The GUID value that's returned is the Agent ID of the authentication agent that's installed on that specific server. If you have multiple agents in your environment, you can run this cmdlet on each agent server and capture the Agent ID details.
209
+
4. Correlate the Agent ID that you get from the local server and from the Azure AD sign-in logs to validate which agent or server acknowledged the sign-request.
0 commit comments