You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/connect/active-directory-aadconnect-pass-through-authentication-current-limitations.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.workload: identity
12
12
ms.tgt_pltfrm: na
13
13
ms.devlang: na
14
14
ms.topic: article
15
-
ms.date: 07/25/2018
15
+
ms.date: 09/04/2018
16
16
ms.component: hybrid
17
17
ms.author: billmath
18
18
---
@@ -42,7 +42,7 @@ The following scenarios are _not_ supported:
42
42
- Pass-through Authentication is not integrated with [Azure AD Connect Health](../connect-health/active-directory-aadconnect-health.md).
43
43
44
44
>[!IMPORTANT]
45
-
>As a workaround for unsupported scenarios _only_ (except Azure AD Connect Health integration), enable Password Hash Synchronization on the [Optional features](active-directory-aadconnect-get-started-custom.md#optional-features) page in the Azure AD Connect wizard. When users sign into applications listed in the "unsupported scenarios" section, those specific sign-in requests are _not_ handled by Pass-through Authentication Agents, and therefore will not be recorded in [Pass-through Authentication logs](active-directory-aadconnect-troubleshoot-pass-through-authentication.md#collecting-pass-through-authentication-agent-logs).
45
+
>As a workaround for unsupported scenarios _only_ (except Azure AD Connect Health integration), enable Password Hash Synchronization on the [Optional features](active-directory-aadconnect-get-started-custom.md#optional-features) page in the Azure AD Connect wizard.
46
46
47
47
>[!NOTE]
48
48
Enabling Password Hash Synchronization gives you the option to failover authentication if your on-premises infrastructure is disrupted. This failover from Pass-through Authentication to Password Hash Synchronization is not automatic. You'll need to switch the sign-in method manually using Azure AD Connect. If the server running Azure AD Connect goes down, you'll require help from Microsoft Support to turn off Pass-through Authentication.
Copy file name to clipboardExpand all lines: articles/active-directory/connect/active-directory-aadconnect-pass-through-authentication-faq.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.workload: identity
12
12
ms.tgt_pltfrm: na
13
13
ms.devlang: na
14
14
ms.topic: article
15
-
ms.date: 07/23/2018
15
+
ms.date: 09/24/2018
16
16
ms.component: hybrid
17
17
ms.author: billmath
18
18
---
@@ -43,25 +43,25 @@ Yes. Pass-through Authentication supports `Alternate ID` as the username when co
43
43
44
44
## Does password hash synchronization act as a fallback to Pass-through Authentication?
45
45
46
-
No. Pass-through Authentication _does not_ automatically failover to password hash synchronization. It only acts as a fallback for [scenarios that Pass-through Authentication doesn't support today](active-directory-aadconnect-pass-through-authentication-current-limitations.md#unsupported-scenarios). To avoid user sign-in failures, you should configure Pass-through Authentication for [high availability](active-directory-aadconnect-pass-through-authentication-quick-start.md#step-4-ensure-high-availability).
46
+
No. Pass-through Authentication _does not_ automatically failover to password hash synchronization. To avoid user sign-in failures, you should configure Pass-through Authentication for [high availability](active-directory-aadconnect-pass-through-authentication-quick-start.md#step-4-ensure-high-availability).
47
47
48
48
## Can I install an [Azure AD Application Proxy](../manage-apps/application-proxy.md) connector on the same server as a Pass-through Authentication Agent?
49
49
50
50
Yes. The rebranded versions of the Pass-through Authentication Agent, version 1.5.193.0 or later, support this configuration.
51
51
52
52
## What versions of Azure AD Connect and Pass-through Authentication Agent do you need?
53
53
54
-
For this feature to work, you need version 1.1.486.0 or later for Azure AD Connect and 1.5.58.0 or later for the Pass-through Authentication Agent. Install all the software on servers with Windows Server 2012 R2 or later.
54
+
For this feature to work, you need version 1.1.750.0 or later for Azure AD Connect and 1.5.193.0 or later for the Pass-through Authentication Agent. Install all the software on servers with Windows Server 2012 R2 or later.
55
55
56
56
## What happens if my user's password has expired and they try to sign in by using Pass-through Authentication?
57
57
58
-
If you have configured [password writeback](../user-help/active-directory-passwords-update-your-own-password.md) for a specific user, and if the user signs in by using Pass-through Authentication, they can change or reset their passwords. The passwords are written back to on-premises Active Directory as expected.
58
+
If you have configured [password writeback](../authentication/concept-sspr-writeback.md) for a specific user, and if the user signs in by using Pass-through Authentication, they can change or reset their passwords. The passwords are written back to on-premises Active Directory as expected.
59
59
60
60
If you have not configured password writeback for a specific user or if the user doesn't have a valid Azure AD license assigned, the user can't update their password in the cloud. They can't update their password, even if their password has expired. The user instead sees this message: "Your organization doesn't allow you to update your password on this site. Update it according to the method recommended by your organization, or ask your admin if you need help." The user or the administrator must reset their password in on-premises Active Directory.
61
61
62
62
## How does Pass-through Authentication protect you against brute-force password attacks?
63
63
64
-
Read [Azure Active Directory Pass-through Authentication: Smart Lockout](../authentication/howto-password-smart-lockout.md) for more information.
64
+
[Read information about Smart Lockout](../authentication/howto-password-smart-lockout.md).
65
65
66
66
## What do Pass-through Authentication Agents communicate over ports 80 and 443?
67
67
@@ -77,7 +77,7 @@ Yes. If Web Proxy Auto-Discovery (WPAD) is enabled in your on-premises environme
77
77
78
78
## Can I install two or more Pass-through Authentication Agents on the same server?
79
79
80
-
No, you can only install one Pass-through Authentication Agent on a single server. If you want to configure Pass-through Authentication for high availability, follow the instructions in [Azure Active Directory Pass-through Authentication: Quick start](active-directory-aadconnect-pass-through-authentication-quick-start.md#step-4-ensure-high-availability).
80
+
No, you can only install one Pass-through Authentication Agent on a single server. If you want to configure Pass-through Authentication for high availability, [follow the instructions here](active-directory-aadconnect-pass-through-authentication-quick-start.md#step-4-ensure-high-availability).
81
81
82
82
## How do I remove a Pass-through Authentication Agent?
Copy file name to clipboardExpand all lines: articles/active-directory/connect/active-directory-aadconnect-sso-faq.md
+17-20Lines changed: 17 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.workload: identity
12
12
ms.tgt_pltfrm: na
13
13
ms.devlang: na
14
14
ms.topic: article
15
-
ms.date: 08/07/2018
15
+
ms.date: 09/04/2018
16
16
ms.component: hybrid
17
17
ms.author: billmath
18
18
---
@@ -79,12 +79,11 @@ Follow these steps on the on-premises server where you are running Azure AD Conn
79
79
80
80
### Step 1. Get list of AD forests where Seamless SSO has been enabled
81
81
82
-
1. First, download, and install the [Microsoft Online Services Sign-In Assistant](http://go.microsoft.com/fwlink/?LinkID=286152).
83
-
2. Then download and install the [64-bit Azure Active Directory module for Windows PowerShell](https://docs.microsoft.com/powershell/azure/active-directory/install-msonlinev1?view=azureadps-1.0).
84
-
3. Navigate to the `%programfiles%\Microsoft Azure Active Directory Connect` folder.
85
-
4. Import the Seamless SSO PowerShell module using this command: `Import-Module .\AzureADSSO.psd1`.
86
-
5. Run PowerShell as an Administrator. In PowerShell, call `New-AzureADSSOAuthenticationContext`. This command should give you a popup to enter your tenant's Global Administrator credentials.
87
-
6. Call `Get-AzureADSSOStatus`. This command provides you the list of AD forests (look at the "Domains" list) on which this feature has been enabled.
82
+
1. First, download, and install [Azure AD PowerShell](https://docs.microsoft.com/powershell/azure/active-directory/overview).
83
+
2. Navigate to the `%programfiles%\Microsoft Azure Active Directory Connect` folder.
84
+
3. Import the Seamless SSO PowerShell module using this command: `Import-Module .\AzureADSSO.psd1`.
85
+
4. Run PowerShell as an Administrator. In PowerShell, call `New-AzureADSSOAuthenticationContext`. This command should give you a popup to enter your tenant's Global Administrator credentials.
86
+
5. Call `Get-AzureADSSOStatus`. This command provides you the list of AD forests (look at the "Domains" list) on which this feature has been enabled.
88
87
89
88
### Step 2. Update the Kerberos decryption key on each AD forest that it was set it up on
90
89
@@ -118,26 +117,24 @@ To complete the clean-up process, follow steps 2 and 3 on the on-premises server
118
117
119
118
Run the following steps on the on-premises server where you are running Azure AD Connect:
120
119
121
-
1. First, download, and install the [Microsoft Online Services Sign-In Assistant](http://go.microsoft.com/fwlink/?LinkID=286152).
122
-
2. Then download and install the [64-bit Azure Active Directory module for Windows PowerShell](http://go.microsoft.com/fwlink/p/?linkid=236297).
123
-
3. Navigate to the `%programfiles%\Microsoft Azure Active Directory Connect` folder.
124
-
4. Import the Seamless SSO PowerShell module using this command: `Import-Module .\AzureADSSO.psd1`.
125
-
5. Run PowerShell as an Administrator. In PowerShell, call `New-AzureADSSOAuthenticationContext`. This command should give you a popup to enter your tenant's Global Administrator credentials.
126
-
6. Call `Enable-AzureADSSO -Enable $false`.
120
+
1. First, download, and install [Azure AD PowerShell](https://docs.microsoft.com/powershell/azure/active-directory/overview).
121
+
2. Navigate to the `%programfiles%\Microsoft Azure Active Directory Connect` folder.
122
+
3. Import the Seamless SSO PowerShell module using this command: `Import-Module .\AzureADSSO.psd1`.
123
+
4. Run PowerShell as an Administrator. In PowerShell, call `New-AzureADSSOAuthenticationContext`. This command should give you a popup to enter your tenant's Global Administrator credentials.
124
+
5. Call `Enable-AzureADSSO -Enable $false`.
127
125
128
126
>[!IMPORTANT]
129
127
>Disabling Seamless SSO using PowerShell will not change the state in Azure AD Connect. Seamless SSO will show as enabled in the **Change user sign-in** page.
130
128
131
129
### Step 2. Get list of AD forests where Seamless SSO has been enabled
132
130
133
-
Follow steps 1 through 5 below if you have disabled Seamless SSO using Azure AD Connect. If you have disabled Seamless SSO using PowerShell instead, jump ahead to step 6 below.
131
+
Follow tasks 1 through 4 below if you have disabled Seamless SSO using Azure AD Connect. If you have disabled Seamless SSO using PowerShell instead, jump ahead to task 5 below.
134
132
135
-
1. First, download, and install the [Microsoft Online Services Sign-In Assistant](http://go.microsoft.com/fwlink/?LinkID=286152).
136
-
2. Then download and install the [64-bit Azure Active Directory module for Windows PowerShell](http://go.microsoft.com/fwlink/p/?linkid=236297).
137
-
3. Navigate to the `%programfiles%\Microsoft Azure Active Directory Connect` folder.
138
-
4. Import the Seamless SSO PowerShell module using this command: `Import-Module .\AzureADSSO.psd1`.
139
-
5. Run PowerShell as an Administrator. In PowerShell, call `New-AzureADSSOAuthenticationContext`. This command should give you a popup to enter your tenant's Global Administrator credentials.
140
-
6. Call `Get-AzureADSSOStatus`. This command provides you the list of AD forests (look at the "Domains" list) on which this feature has been enabled.
133
+
1. First, download, and install [Azure AD PowerShell](https://docs.microsoft.com/powershell/azure/active-directory/overview).
134
+
2. Navigate to the `%programfiles%\Microsoft Azure Active Directory Connect` folder.
135
+
3. Import the Seamless SSO PowerShell module using this command: `Import-Module .\AzureADSSO.psd1`.
136
+
4. Run PowerShell as an Administrator. In PowerShell, call `New-AzureADSSOAuthenticationContext`. This command should give you a popup to enter your tenant's Global Administrator credentials.
137
+
5. Call `Get-AzureADSSOStatus`. This command provides you the list of AD forests (look at the "Domains" list) on which this feature has been enabled.
141
138
142
139
### Step 3. Manually delete the `AZUREADSSOACCT` computer account from each AD forest that you see listed.
Copy file name to clipboardExpand all lines: articles/active-directory/connect/active-directory-aadconnect-sso-quick-start.md
+5-2Lines changed: 5 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.workload: identity
12
12
ms.tgt_pltfrm: na
13
13
ms.devlang: na
14
14
ms.topic: article
15
-
ms.date: 08/01/2018
15
+
ms.date: 09/04/2018
16
16
ms.component: hybrid
17
17
ms.author: billmath
18
18
---
@@ -38,6 +38,9 @@ Ensure that the following prerequisites are in place:
38
38
39
39
***Use a supported Azure AD Connect topology**: Ensure that you are using one of Azure AD Connect's supported topologies described [here](active-directory-aadconnect-topologies.md).
40
40
41
+
>[!NOTE]
42
+
>Seamless SSO supports multiple AD forests, whether there is AD trusts between them or not.
43
+
41
44
***Set up domain administrator credentials**: You need to have domain administrator credentials for each Active Directory forest that:
42
45
* You synchronize to Azure AD through Azure AD Connect.
43
46
* Contains users you want to enable for Seamless SSO.
@@ -175,7 +178,7 @@ Mozilla Firefox doesn't automatically use Kerberos authentication. Each user mus
175
178
176
179
#### Safari (macOS)
177
180
178
-
Ensure that the machine running the macOS is joined to AD. For instructions on joining AD, see [Best Practices for Integrating OS X with Active Directory](http://www.isaca.org/Groups/Professional-English/identity-management/GroupDocuments/Integrating-OS-X-with-Active-Directory.pdf).
181
+
Ensure that the machine running the macOS is joined to AD. Instructions for AD-joining your macOS device is outside the scope of this article.
Copy file name to clipboardExpand all lines: articles/active-directory/connect/active-directory-aadconnect-troubleshoot-pass-through-authentication.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.workload: identity
12
12
ms.tgt_pltfrm: na
13
13
ms.devlang: na
14
14
ms.topic: article
15
-
ms.date: 07/19/2018
15
+
ms.date: 09/24/2018
16
16
ms.component: hybrid
17
17
ms.author: billmath
18
18
---
@@ -92,7 +92,7 @@ Ensure that you use a cloud-only Global Administrator account for all Azure AD C
92
92
93
93
If you have Pass-through Authentication enabled on your tenant and you try to uninstall Azure AD Connect, it shows you the following warning message: "Users will not be able to sign-in to Azure AD unless you have other Pass-through Authentication agents installed on other servers."
94
94
95
-
Ensure that your setup is [high available](active-directory-aadconnect-pass-through-authentication-quick-start.md#step-4-ensure-high-availability) before you uninstall Azure AD Connect to avoid breaking user sign-in.
95
+
Ensure that your setup is [highly available](active-directory-aadconnect-pass-through-authentication-quick-start.md#step-4-ensure-high-availability) before you uninstall Azure AD Connect to avoid breaking user sign-in.
96
96
97
97
## Issues with enabling the feature
98
98
@@ -124,7 +124,7 @@ For detailed analytics, enable the "Session" log. Don't run the Authentication A
124
124
125
125
### Detailed trace logs
126
126
127
-
To troubleshoot user sign-in failures, look for trace logs at **%ProgramData%\Microsoft\Azure AD Connect Authentication Agent\Trace\\**. These logs include reasons why a specific user sign-in failed using the Pass-through Authentication feature. These errors are also mapped to the sign-in failure reasons shown in the preceding [table](#sign-in-failure-reasons-on-the-Azure-portal). Following is an example log entry:
127
+
To troubleshoot user sign-in failures, look for trace logs at **%ProgramData%\Microsoft\Azure AD Connect Authentication Agent\Trace\\**. These logs include reasons why a specific user sign-in failed using the Pass-through Authentication feature. These errors are also mapped to the sign-in failure reasons shown in the preceding sign-infailurereasons table. Following is an example log entry:
@@ -29,7 +29,7 @@ This article helps you find troubleshooting information about common problems re
29
29
- Seamless SSO doesn't work in Internet Explorer when Enhanced Protected mode is turned on.
30
30
- Seamless SSO doesn't work on mobile browsers on iOS and Android.
31
31
- If a user is part of too many groups in Active Directory, the user's Kerberos ticket will likely be too large to process, and this will cause Seamless SSO to fail. Azure AD HTTPS requests can have headers with a maximum size of 50 KB; Kerberos tickets need to be smaller than that limit to accommodate other Azure AD artifacts (typically, 2 - 5 KB) such as cookies. Our recommendation is to reduce user's group memberships and try again.
32
-
- If you're synchronizing 30 or more Active Directory forests, you can't enable Seamless SSO through Azure AD Connect. As a workaround, you can [manually enable](#manual-reset-of-azure-ad-seamless-sso) the feature on your tenant.
32
+
- If you're synchronizing 30 or more Active Directory forests, you can't enable Seamless SSO through Azure AD Connect. As a workaround, you can [manually enable](#manual-reset-of-the-feature) the feature on your tenant.
33
33
- Adding the Azure AD service URL (https://autologon.microsoftazuread-sso.com) to the Trusted sites zone instead of the Local intranet zone *blocks users from signing in*.
34
34
- Disabling the use of the **RC4_HMAC_MD5** encryption type for Kerberos in your Active Directory settings will break Seamless SSO. In your Group Policy Management Editor tool ensure that the policy value for **RC4_HMAC_MD5** under **Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "Network Security: Configure encryption types allowed for Kerberos"** is "Enabled".
35
35
@@ -101,10 +101,9 @@ If troubleshooting didn't help, you can manually reset the feature on your tenan
101
101
102
102
### Step 1: Import the Seamless SSO PowerShell module
103
103
104
-
1. Download and install the [Microsoft Online Services Sign-In Assistant](http://go.microsoft.com/fwlink/?LinkID=286152).
105
-
2. Download and install the [64-bit Azure Active Directory module for Windows PowerShell](http://go.microsoft.com/fwlink/p/?linkid=236297).
106
-
3. Browse to the `%programfiles%\Microsoft Azure Active Directory Connect` folder.
107
-
4. Import the Seamless SSO PowerShell module by using this command: `Import-Module .\AzureADSSO.psd1`.
104
+
1. First, download, and install [Azure AD PowerShell](https://docs.microsoft.com/powershell/azure/active-directory/overview).
105
+
2. Browse to the `%programfiles%\Microsoft Azure Active Directory Connect` folder.
106
+
3. Import the Seamless SSO PowerShell module by using this command: `Import-Module .\AzureADSSO.psd1`.
108
107
109
108
### Step 2: Get the list of Active Directory forests on which Seamless SSO has been enabled
110
109
@@ -124,8 +123,10 @@ If troubleshooting didn't help, you can manually reset the feature on your tenan
124
123
### Step 4: Enable Seamless SSO for each Active Directory forest
125
124
126
125
1. Call `Enable-AzureADSSOForest`. When prompted, enter the domain administrator credentials for the intended Active Directory forest.
126
+
127
127
>[!NOTE]
128
128
>We use the Domain Administrator's username, provided in the User Principal Names (UPN) ([email protected]) format or the domain qualified sam-account name (contoso\johndoe or contoso.com\johndoe) format, to find the intended AD forest. If you use domain qualified sam-account name, we use the domain portion of the username to [locate the Domain Controller of the Domain Administrator using DNS](https://social.technet.microsoft.com/wiki/contents/articles/24457.how-domain-controllers-are-located-in-windows.aspx). If you use UPN instead, we [translate it to a domain qualified sam-account name](https://docs.microsoft.com/windows/desktop/api/ntdsapi/nf-ntdsapi-dscracknamesa) before locating the appropriate Domain Controller.
129
+
129
130
2. Repeat the preceding step for each Active Directory forest where you want to set up the feature.
0 commit comments