Skip to content

Commit be0f65a

Browse files
authored
Merge pull request #50827 from swkrish/master
fixes to PS module and other small fixes
2 parents 1522632 + 6b8afa5 commit be0f65a

6 files changed

+40
-39
lines changed

articles/active-directory/connect/active-directory-aadconnect-pass-through-authentication-current-limitations.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.workload: identity
1212
ms.tgt_pltfrm: na
1313
ms.devlang: na
1414
ms.topic: article
15-
ms.date: 07/25/2018
15+
ms.date: 09/04/2018
1616
ms.component: hybrid
1717
ms.author: billmath
1818
---
@@ -42,7 +42,7 @@ The following scenarios are _not_ supported:
4242
- Pass-through Authentication is not integrated with [Azure AD Connect Health](../connect-health/active-directory-aadconnect-health.md).
4343

4444
>[!IMPORTANT]
45-
>As a workaround for unsupported scenarios _only_ (except Azure AD Connect Health integration), enable Password Hash Synchronization on the [Optional features](active-directory-aadconnect-get-started-custom.md#optional-features) page in the Azure AD Connect wizard. When users sign into applications listed in the "unsupported scenarios" section, those specific sign-in requests are _not_ handled by Pass-through Authentication Agents, and therefore will not be recorded in [Pass-through Authentication logs](active-directory-aadconnect-troubleshoot-pass-through-authentication.md#collecting-pass-through-authentication-agent-logs).
45+
>As a workaround for unsupported scenarios _only_ (except Azure AD Connect Health integration), enable Password Hash Synchronization on the [Optional features](active-directory-aadconnect-get-started-custom.md#optional-features) page in the Azure AD Connect wizard.
4646
4747
>[!NOTE]
4848
Enabling Password Hash Synchronization gives you the option to failover authentication if your on-premises infrastructure is disrupted. This failover from Pass-through Authentication to Password Hash Synchronization is not automatic. You'll need to switch the sign-in method manually using Azure AD Connect. If the server running Azure AD Connect goes down, you'll require help from Microsoft Support to turn off Pass-through Authentication.

articles/active-directory/connect/active-directory-aadconnect-pass-through-authentication-faq.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.workload: identity
1212
ms.tgt_pltfrm: na
1313
ms.devlang: na
1414
ms.topic: article
15-
ms.date: 07/23/2018
15+
ms.date: 09/24/2018
1616
ms.component: hybrid
1717
ms.author: billmath
1818
---
@@ -43,25 +43,25 @@ Yes. Pass-through Authentication supports `Alternate ID` as the username when co
4343

4444
## Does password hash synchronization act as a fallback to Pass-through Authentication?
4545

46-
No. Pass-through Authentication _does not_ automatically failover to password hash synchronization. It only acts as a fallback for [scenarios that Pass-through Authentication doesn't support today](active-directory-aadconnect-pass-through-authentication-current-limitations.md#unsupported-scenarios). To avoid user sign-in failures, you should configure Pass-through Authentication for [high availability](active-directory-aadconnect-pass-through-authentication-quick-start.md#step-4-ensure-high-availability).
46+
No. Pass-through Authentication _does not_ automatically failover to password hash synchronization. To avoid user sign-in failures, you should configure Pass-through Authentication for [high availability](active-directory-aadconnect-pass-through-authentication-quick-start.md#step-4-ensure-high-availability).
4747

4848
## Can I install an [Azure AD Application Proxy](../manage-apps/application-proxy.md) connector on the same server as a Pass-through Authentication Agent?
4949

5050
Yes. The rebranded versions of the Pass-through Authentication Agent, version 1.5.193.0 or later, support this configuration.
5151

5252
## What versions of Azure AD Connect and Pass-through Authentication Agent do you need?
5353

54-
For this feature to work, you need version 1.1.486.0 or later for Azure AD Connect and 1.5.58.0 or later for the Pass-through Authentication Agent. Install all the software on servers with Windows Server 2012 R2 or later.
54+
For this feature to work, you need version 1.1.750.0 or later for Azure AD Connect and 1.5.193.0 or later for the Pass-through Authentication Agent. Install all the software on servers with Windows Server 2012 R2 or later.
5555

5656
## What happens if my user's password has expired and they try to sign in by using Pass-through Authentication?
5757

58-
If you have configured [password writeback](../user-help/active-directory-passwords-update-your-own-password.md) for a specific user, and if the user signs in by using Pass-through Authentication, they can change or reset their passwords. The passwords are written back to on-premises Active Directory as expected.
58+
If you have configured [password writeback](../authentication/concept-sspr-writeback.md) for a specific user, and if the user signs in by using Pass-through Authentication, they can change or reset their passwords. The passwords are written back to on-premises Active Directory as expected.
5959

6060
If you have not configured password writeback for a specific user or if the user doesn't have a valid Azure AD license assigned, the user can't update their password in the cloud. They can't update their password, even if their password has expired. The user instead sees this message: "Your organization doesn't allow you to update your password on this site. Update it according to the method recommended by your organization, or ask your admin if you need help." The user or the administrator must reset their password in on-premises Active Directory.
6161

6262
## How does Pass-through Authentication protect you against brute-force password attacks?
6363

64-
Read [Azure Active Directory Pass-through Authentication: Smart Lockout](../authentication/howto-password-smart-lockout.md) for more information.
64+
[Read information about Smart Lockout](../authentication/howto-password-smart-lockout.md).
6565

6666
## What do Pass-through Authentication Agents communicate over ports 80 and 443?
6767

@@ -77,7 +77,7 @@ Yes. If Web Proxy Auto-Discovery (WPAD) is enabled in your on-premises environme
7777

7878
## Can I install two or more Pass-through Authentication Agents on the same server?
7979

80-
No, you can only install one Pass-through Authentication Agent on a single server. If you want to configure Pass-through Authentication for high availability, follow the instructions in [Azure Active Directory Pass-through Authentication: Quick start](active-directory-aadconnect-pass-through-authentication-quick-start.md#step-4-ensure-high-availability).
80+
No, you can only install one Pass-through Authentication Agent on a single server. If you want to configure Pass-through Authentication for high availability, [follow the instructions here](active-directory-aadconnect-pass-through-authentication-quick-start.md#step-4-ensure-high-availability).
8181

8282
## How do I remove a Pass-through Authentication Agent?
8383

articles/active-directory/connect/active-directory-aadconnect-sso-faq.md

Lines changed: 17 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.workload: identity
1212
ms.tgt_pltfrm: na
1313
ms.devlang: na
1414
ms.topic: article
15-
ms.date: 08/07/2018
15+
ms.date: 09/04/2018
1616
ms.component: hybrid
1717
ms.author: billmath
1818
---
@@ -79,12 +79,11 @@ Follow these steps on the on-premises server where you are running Azure AD Conn
7979

8080
### Step 1. Get list of AD forests where Seamless SSO has been enabled
8181

82-
1. First, download, and install the [Microsoft Online Services Sign-In Assistant](http://go.microsoft.com/fwlink/?LinkID=286152).
83-
2. Then download and install the [64-bit Azure Active Directory module for Windows PowerShell](https://docs.microsoft.com/powershell/azure/active-directory/install-msonlinev1?view=azureadps-1.0).
84-
3. Navigate to the `%programfiles%\Microsoft Azure Active Directory Connect` folder.
85-
4. Import the Seamless SSO PowerShell module using this command: `Import-Module .\AzureADSSO.psd1`.
86-
5. Run PowerShell as an Administrator. In PowerShell, call `New-AzureADSSOAuthenticationContext`. This command should give you a popup to enter your tenant's Global Administrator credentials.
87-
6. Call `Get-AzureADSSOStatus`. This command provides you the list of AD forests (look at the "Domains" list) on which this feature has been enabled.
82+
1. First, download, and install [Azure AD PowerShell](https://docs.microsoft.com/powershell/azure/active-directory/overview).
83+
2. Navigate to the `%programfiles%\Microsoft Azure Active Directory Connect` folder.
84+
3. Import the Seamless SSO PowerShell module using this command: `Import-Module .\AzureADSSO.psd1`.
85+
4. Run PowerShell as an Administrator. In PowerShell, call `New-AzureADSSOAuthenticationContext`. This command should give you a popup to enter your tenant's Global Administrator credentials.
86+
5. Call `Get-AzureADSSOStatus`. This command provides you the list of AD forests (look at the "Domains" list) on which this feature has been enabled.
8887

8988
### Step 2. Update the Kerberos decryption key on each AD forest that it was set it up on
9089

@@ -118,26 +117,24 @@ To complete the clean-up process, follow steps 2 and 3 on the on-premises server
118117

119118
Run the following steps on the on-premises server where you are running Azure AD Connect:
120119

121-
1. First, download, and install the [Microsoft Online Services Sign-In Assistant](http://go.microsoft.com/fwlink/?LinkID=286152).
122-
2. Then download and install the [64-bit Azure Active Directory module for Windows PowerShell](http://go.microsoft.com/fwlink/p/?linkid=236297).
123-
3. Navigate to the `%programfiles%\Microsoft Azure Active Directory Connect` folder.
124-
4. Import the Seamless SSO PowerShell module using this command: `Import-Module .\AzureADSSO.psd1`.
125-
5. Run PowerShell as an Administrator. In PowerShell, call `New-AzureADSSOAuthenticationContext`. This command should give you a popup to enter your tenant's Global Administrator credentials.
126-
6. Call `Enable-AzureADSSO -Enable $false`.
120+
1. First, download, and install [Azure AD PowerShell](https://docs.microsoft.com/powershell/azure/active-directory/overview).
121+
2. Navigate to the `%programfiles%\Microsoft Azure Active Directory Connect` folder.
122+
3. Import the Seamless SSO PowerShell module using this command: `Import-Module .\AzureADSSO.psd1`.
123+
4. Run PowerShell as an Administrator. In PowerShell, call `New-AzureADSSOAuthenticationContext`. This command should give you a popup to enter your tenant's Global Administrator credentials.
124+
5. Call `Enable-AzureADSSO -Enable $false`.
127125

128126
>[!IMPORTANT]
129127
>Disabling Seamless SSO using PowerShell will not change the state in Azure AD Connect. Seamless SSO will show as enabled in the **Change user sign-in** page.
130128
131129
### Step 2. Get list of AD forests where Seamless SSO has been enabled
132130

133-
Follow steps 1 through 5 below if you have disabled Seamless SSO using Azure AD Connect. If you have disabled Seamless SSO using PowerShell instead, jump ahead to step 6 below.
131+
Follow tasks 1 through 4 below if you have disabled Seamless SSO using Azure AD Connect. If you have disabled Seamless SSO using PowerShell instead, jump ahead to task 5 below.
134132

135-
1. First, download, and install the [Microsoft Online Services Sign-In Assistant](http://go.microsoft.com/fwlink/?LinkID=286152).
136-
2. Then download and install the [64-bit Azure Active Directory module for Windows PowerShell](http://go.microsoft.com/fwlink/p/?linkid=236297).
137-
3. Navigate to the `%programfiles%\Microsoft Azure Active Directory Connect` folder.
138-
4. Import the Seamless SSO PowerShell module using this command: `Import-Module .\AzureADSSO.psd1`.
139-
5. Run PowerShell as an Administrator. In PowerShell, call `New-AzureADSSOAuthenticationContext`. This command should give you a popup to enter your tenant's Global Administrator credentials.
140-
6. Call `Get-AzureADSSOStatus`. This command provides you the list of AD forests (look at the "Domains" list) on which this feature has been enabled.
133+
1. First, download, and install [Azure AD PowerShell](https://docs.microsoft.com/powershell/azure/active-directory/overview).
134+
2. Navigate to the `%programfiles%\Microsoft Azure Active Directory Connect` folder.
135+
3. Import the Seamless SSO PowerShell module using this command: `Import-Module .\AzureADSSO.psd1`.
136+
4. Run PowerShell as an Administrator. In PowerShell, call `New-AzureADSSOAuthenticationContext`. This command should give you a popup to enter your tenant's Global Administrator credentials.
137+
5. Call `Get-AzureADSSOStatus`. This command provides you the list of AD forests (look at the "Domains" list) on which this feature has been enabled.
141138

142139
### Step 3. Manually delete the `AZUREADSSOACCT` computer account from each AD forest that you see listed.
143140

articles/active-directory/connect/active-directory-aadconnect-sso-quick-start.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.workload: identity
1212
ms.tgt_pltfrm: na
1313
ms.devlang: na
1414
ms.topic: article
15-
ms.date: 08/01/2018
15+
ms.date: 09/04/2018
1616
ms.component: hybrid
1717
ms.author: billmath
1818
---
@@ -38,6 +38,9 @@ Ensure that the following prerequisites are in place:
3838
3939
* **Use a supported Azure AD Connect topology**: Ensure that you are using one of Azure AD Connect's supported topologies described [here](active-directory-aadconnect-topologies.md).
4040

41+
>[!NOTE]
42+
>Seamless SSO supports multiple AD forests, whether there is AD trusts between them or not.
43+
4144
* **Set up domain administrator credentials**: You need to have domain administrator credentials for each Active Directory forest that:
4245
* You synchronize to Azure AD through Azure AD Connect.
4346
* Contains users you want to enable for Seamless SSO.
@@ -175,7 +178,7 @@ Mozilla Firefox doesn't automatically use Kerberos authentication. Each user mus
175178

176179
#### Safari (macOS)
177180

178-
Ensure that the machine running the macOS is joined to AD. For instructions on joining AD, see [Best Practices for Integrating OS X with Active Directory](http://www.isaca.org/Groups/Professional-English/identity-management/GroupDocuments/Integrating-OS-X-with-Active-Directory.pdf).
181+
Ensure that the machine running the macOS is joined to AD. Instructions for AD-joining your macOS device is outside the scope of this article.
179182

180183
#### Google Chrome (all platforms)
181184

articles/active-directory/connect/active-directory-aadconnect-troubleshoot-pass-through-authentication.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.workload: identity
1212
ms.tgt_pltfrm: na
1313
ms.devlang: na
1414
ms.topic: article
15-
ms.date: 07/19/2018
15+
ms.date: 09/24/2018
1616
ms.component: hybrid
1717
ms.author: billmath
1818
---
@@ -92,7 +92,7 @@ Ensure that you use a cloud-only Global Administrator account for all Azure AD C
9292

9393
If you have Pass-through Authentication enabled on your tenant and you try to uninstall Azure AD Connect, it shows you the following warning message: "Users will not be able to sign-in to Azure AD unless you have other Pass-through Authentication agents installed on other servers."
9494

95-
Ensure that your setup is [high available](active-directory-aadconnect-pass-through-authentication-quick-start.md#step-4-ensure-high-availability) before you uninstall Azure AD Connect to avoid breaking user sign-in.
95+
Ensure that your setup is [highly available](active-directory-aadconnect-pass-through-authentication-quick-start.md#step-4-ensure-high-availability) before you uninstall Azure AD Connect to avoid breaking user sign-in.
9696

9797
## Issues with enabling the feature
9898

@@ -124,7 +124,7 @@ For detailed analytics, enable the "Session" log. Don't run the Authentication A
124124

125125
### Detailed trace logs
126126

127-
To troubleshoot user sign-in failures, look for trace logs at **%ProgramData%\Microsoft\Azure AD Connect Authentication Agent\Trace\\**. These logs include reasons why a specific user sign-in failed using the Pass-through Authentication feature. These errors are also mapped to the sign-in failure reasons shown in the preceding [table](#sign-in-failure-reasons-on-the-Azure-portal). Following is an example log entry:
127+
To troubleshoot user sign-in failures, look for trace logs at **%ProgramData%\Microsoft\Azure AD Connect Authentication Agent\Trace\\**. These logs include reasons why a specific user sign-in failed using the Pass-through Authentication feature. These errors are also mapped to the sign-in failure reasons shown in the preceding sign-in failure reasons table. Following is an example log entry:
128128

129129
```
130130
AzureADConnectAuthenticationAgentService.exe Error: 0 : Passthrough Authentication request failed. RequestId: 'df63f4a4-68b9-44ae-8d81-6ad2d844d84e'. Reason: '1328'.

articles/active-directory/connect/active-directory-aadconnect-troubleshoot-sso.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.assetid: 9f994aca-6088-40f5-b2cc-c753a4f41da7
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: article
12-
ms.date: 07/26/2018
12+
ms.date: 09/04/2018
1313
ms.component: hybrid
1414
ms.author: billmath
1515
---
@@ -29,7 +29,7 @@ This article helps you find troubleshooting information about common problems re
2929
- Seamless SSO doesn't work in Internet Explorer when Enhanced Protected mode is turned on.
3030
- Seamless SSO doesn't work on mobile browsers on iOS and Android.
3131
- If a user is part of too many groups in Active Directory, the user's Kerberos ticket will likely be too large to process, and this will cause Seamless SSO to fail. Azure AD HTTPS requests can have headers with a maximum size of 50 KB; Kerberos tickets need to be smaller than that limit to accommodate other Azure AD artifacts (typically, 2 - 5 KB) such as cookies. Our recommendation is to reduce user's group memberships and try again.
32-
- If you're synchronizing 30 or more Active Directory forests, you can't enable Seamless SSO through Azure AD Connect. As a workaround, you can [manually enable](#manual-reset-of-azure-ad-seamless-sso) the feature on your tenant.
32+
- If you're synchronizing 30 or more Active Directory forests, you can't enable Seamless SSO through Azure AD Connect. As a workaround, you can [manually enable](#manual-reset-of-the-feature) the feature on your tenant.
3333
- Adding the Azure AD service URL (https://autologon.microsoftazuread-sso.com) to the Trusted sites zone instead of the Local intranet zone *blocks users from signing in*.
3434
- Disabling the use of the **RC4_HMAC_MD5** encryption type for Kerberos in your Active Directory settings will break Seamless SSO. In your Group Policy Management Editor tool ensure that the policy value for **RC4_HMAC_MD5** under **Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "Network Security: Configure encryption types allowed for Kerberos"** is "Enabled".
3535

@@ -101,10 +101,9 @@ If troubleshooting didn't help, you can manually reset the feature on your tenan
101101

102102
### Step 1: Import the Seamless SSO PowerShell module
103103

104-
1. Download and install the [Microsoft Online Services Sign-In Assistant](http://go.microsoft.com/fwlink/?LinkID=286152).
105-
2. Download and install the [64-bit Azure Active Directory module for Windows PowerShell](http://go.microsoft.com/fwlink/p/?linkid=236297).
106-
3. Browse to the `%programfiles%\Microsoft Azure Active Directory Connect` folder.
107-
4. Import the Seamless SSO PowerShell module by using this command: `Import-Module .\AzureADSSO.psd1`.
104+
1. First, download, and install [Azure AD PowerShell](https://docs.microsoft.com/powershell/azure/active-directory/overview).
105+
2. Browse to the `%programfiles%\Microsoft Azure Active Directory Connect` folder.
106+
3. Import the Seamless SSO PowerShell module by using this command: `Import-Module .\AzureADSSO.psd1`.
108107

109108
### Step 2: Get the list of Active Directory forests on which Seamless SSO has been enabled
110109

@@ -124,8 +123,10 @@ If troubleshooting didn't help, you can manually reset the feature on your tenan
124123
### Step 4: Enable Seamless SSO for each Active Directory forest
125124

126125
1. Call `Enable-AzureADSSOForest`. When prompted, enter the domain administrator credentials for the intended Active Directory forest.
126+
127127
>[!NOTE]
128128
>We use the Domain Administrator's username, provided in the User Principal Names (UPN) ([email protected]) format or the domain qualified sam-account name (contoso\johndoe or contoso.com\johndoe) format, to find the intended AD forest. If you use domain qualified sam-account name, we use the domain portion of the username to [locate the Domain Controller of the Domain Administrator using DNS](https://social.technet.microsoft.com/wiki/contents/articles/24457.how-domain-controllers-are-located-in-windows.aspx). If you use UPN instead, we [translate it to a domain qualified sam-account name](https://docs.microsoft.com/windows/desktop/api/ntdsapi/nf-ntdsapi-dscracknamesa) before locating the appropriate Domain Controller.
129+
129130
2. Repeat the preceding step for each Active Directory forest where you want to set up the feature.
130131

131132
### Step 5. Enable the feature on your tenant

0 commit comments

Comments
 (0)