Skip to content

Commit c62e4a0

Browse files
authored
Merge pull request #91131 from billmath/sr1
staging
2 parents 0dccd17 + 531ce61 commit c62e4a0

File tree

14 files changed

+239
-0
lines changed

14 files changed

+239
-0
lines changed

articles/active-directory/hybrid/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -149,6 +149,8 @@
149149
href: plan-migrate-adfs-password-hash-sync.md
150150
- name: Migrate from federation to PTA
151151
href: plan-migrate-adfs-pass-through-authentication.md
152+
- name: Cloud authentication - Staged Rollout (Public Preview)
153+
href: how-to-connect-staged-rollout.md
152154
- name: Hybrid Identity Design Considerations
153155
items:
154156
- name: Hybrid Identity Design Considerations Overview
Lines changed: 237 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,237 @@
1+
---
2+
title: 'Azure AD Connect: Cloud authentication - staged rollout | Microsoft Docs'
3+
description: Explains how to migrate from federated authentication to cloud auth using a staged rollout.
4+
author: billmath
5+
manager: daveba
6+
ms.service: active-directory
7+
ms.workload: identity
8+
ms.topic: conceptual
9+
ms.date: 10/28/2019
10+
ms.subservice: hybrid
11+
ms.author: billmath
12+
ms.collection: M365-identity-device-management
13+
---
14+
15+
16+
# Cloud authentication: Staged rollout (Public Preview)
17+
18+
This feature allows you to migrate from federated authentication to cloud authentication by using a staged approach.
19+
20+
Moving away from federated authentication has implications. For example, if you have any of the following:
21+
22+
- an on-premises MFA server
23+
- are using smart cards for authentication
24+
- other federation only features
25+
26+
These features should be taken into consideration prior to switching to cloud authentication. Before trying this feature, we suggest you review our guide on choosing the right authentication method. See [this table](https://docs.microsoft.com/azure/security/fundamentals/choose-ad-authn#comparing-methods) for more details.
27+
28+
>[!VIDEO https://www.microsoft.com/videoplayer/embed/RE3inQJ]
29+
30+
31+
32+
## Prerequisites
33+
34+
- You have an Azure AD tenant with federated domains.
35+
36+
- You have decided to move to either Password Hash Sync + Seamless SSO **(Option A),** or Pass-through Authentication + Seamless SSO **(Option B).** Although seamless SSO is optional, we recommend enabling seamless SSO to achieve a silent sign-in experience for users using domain joined machines from inside corporate network.
37+
38+
- You have configured all the appropriate tenant branding and conditional access policies you need for users who are being migrated over to cloud authentication.
39+
40+
- If you plan to use Azure Multi-Factor Authentication, we recommend you use [converged registration for Self-service Password Reset (SSPR) and Azure MFA](../authentication/concept-registration-mfa-sspr-combined.md) to get your users to register their authentication methods once.
41+
42+
- To use this feature, you need to be Global Administrator on your tenant.
43+
44+
- To enable Seamless SSO on a specific AD forest, you need to be Domain Administrator.
45+
46+
## Supported scenarios
47+
48+
These scenarios are supported for staged rollout:
49+
50+
- This feature works only for users provisioned to Azure AD using Azure AD Connect and is not applicable for cloud-only users.
51+
52+
- This feature works only for user sign-in traffic on browsers and modern authentication clients. Applications or Cloud services using legacy authentication will fall back to federated authentication flows. (Example: Exchange online with Modern Authentication turned off, or Outlook 2010, which does not support Modern Authentication.)
53+
54+
## Unsupported Scenarios
55+
56+
These scenarios are not supported for staged rollout:
57+
58+
- Certain applications send the "domain\_hint" query parameter to Azure AD during authentication. These flows will continue and users enabled for staged rollout will continue to use federation for authentication.
59+
60+
<!-- -->
61+
62+
- Admin can roll out cloud authentication using security groups. (Cloud Security groups are recommended to avoid sync latency when using on-premises AD security groups.)
63+
64+
- You can use a **maximum of 10 groups per feature**; i.e., for each of Password Hash Sync / Pass-through Authentication / Seamless SSO.
65+
66+
- Nested groups are **not supported**. This is the scope for public preview as well.
67+
68+
- Dynamic groups are **not supported** for staged rollout.
69+
70+
- Contact Objects inside the group will block the group form being added.
71+
72+
- The final cutover from federated to cloud authentication still needs to happen using Azure AD Connect or PowerShell. This feature doesn't switch domains from federate to managed.
73+
74+
- When you first add a security group for staged rollout, it is limited to 200 users to avoid the UX from timing out. Once the group is added in the UX, you can add more users directly to the group as required.
75+
76+
## Get started with staged rollout
77+
78+
If you want to test Password Hash Sync (PHS) sign-in using staged rollout, please complete the below pre-work to enable Password Hash Sync staged rollout.
79+
80+
## Pre-work for Password Hash Sync
81+
82+
1. Enable Password Hash Sync from the [Optional features](how-to-connect-install-custom.md#optional-features) page in Azure AD Connect. 
83+
84+
![Screenshot of the Optional features page in Azure Active Directory Connect](media/how-to-connect-staged-rollout/sr1.png)
85+
86+
1. Ensure that a full Password Hash Sync cycle has run through so that all the users' password hashes have been synchronized to Azure AD. You can use the PowerShell diagnostics [here](tshoot-connect-password-hash-synchronization.md) to check the status of Password Hash Sync.
87+
88+
![Screenshot of the AADConnect Troubleshooting log](./media/how-to-connect-staged-rollout/sr2.png)
89+
90+
If you want to test Pass through-authentication (PTA) Sign-in using staged rollout, please complete the below pre-work to enable PTA for staged rollout.
91+
92+
## Pre-work for Pass-through Authentication
93+
94+
1. Identify a server running Windows Server 2012 R2 or later where you want the Pass through Authentication Agent to run (**DO NOT choose the Azure AD Connect server**). Ensure that the server is domain-joined, can authenticate selected users with Active Directory, and can communicate with Azure AD on outbound ports / URLs (see detailed [prerequisites](how-to-connect-sso-quick-start.md)).
95+
96+
1. [Download](https://aka.ms/getauthagent) & install the Microsoft Azure AD Connect Authentication Agent on the server. 
97+
98+
1. To enable [high availability](how-to-connect-sso-quick-start.md), install additional Authentication Agents on other servers.
99+
100+
1. Ensure that you have configured your [Smart Lockout settings](../authentication/howto-password-smart-lockout.md) appropriately. This is to ensure that your users' on-premises Active Directory accounts don't get locked out by bad actors.
101+
102+
We recommend enabling Seamless SSO irrespective of the sign-in method ( PHS or PTA ) you select for staged rollout. Please complete the below pre-work to enable Seamless SSO for staged rollout.
103+
104+
## Pre-work for Seamless SSO
105+
106+
Enable Seamless SSO on the AD forests using PowerShell. If you have more than one AD Forest, please enable the same for each forest individually. Seamless SSO will only be triggered for users selected for staged rollout and won't impact your existing federation setup.
107+
108+
**Summary of the steps**
109+
110+
1. First, log in to Azure AD Connect Server.
111+
112+
2. Navigate to the %programfiles%\\Microsoft Azure Active Directory Connect folder.
113+
114+
3. Import the Seamless SSO PowerShell module using this command: `Import-Module .\\AzureADSSO.psd1`.
115+
116+
4. Run PowerShell as an Administrator. In PowerShell, call `New-AzureADSSOAuthenticationContext`. This command should give you a dialog box where you can enter your tenant's Global Administrator credentials.
117+
118+
5. Call `Get-AzureADSSOStatus \| ConvertFrom-Json`. This command provides you the list of AD forests (look at the \"Domains\" list) on which this feature has been enabled. By default, it is set to false at the tenant level.
119+
120+
> **Example:**
121+
> ![Example of the Windows PowerShell output](./media/how-to-connect-staged-rollout/sr3.png)
122+
123+
6. Call `\$creds = Get-Credential`. When prompted, enter the Domain Administrator credentials for the intended AD forest.
124+
125+
7. Call `Enable-AzureADSSOForest -OnPremCredentials \$creds`. This command creates the AZUREADSSOACC computer account from the on-premises domain controller for this specific Active Directory forest that is required for Seamless SSO.
126+
127+
8. Seamless SSO requires URLs to be in the intranet zone. Please refer to the [seamless single sign-on quickstart](how-to-connect-sso-quick-start.md#step-3-roll-out-the-feature) to deploy those URL's using Group Policies.
128+
129+
9. You could also download our [deployment plans](https://aka.ms/SeamlessSSODPDownload) for Seamless SSO for a complete walkthrough.
130+
131+
## Enable staged rollout
132+
133+
Use the following steps to roll out a specific feature (Pass-through Authentication / Password Hash Sync / Seamless SSO) to a select set of users in a group:
134+
135+
### Enable the staged rollout of a specific feature on your tenant
136+
137+
You can roll out one of these options
138+
139+
- Password Hash Sync + Seamless SSO **(Option A)**
140+
141+
- Pass-through Authentication + Seamless SSO **(Option B)**
142+
143+
- Password Hash Sync + Pass-through Authentication + Seamless SSO **-\>** ***Not Supported***
144+
145+
Complete these steps:
146+
147+
1. Log in to the Azure AD Portal using the below URL to access the Preview UX.
148+
149+
> <https://aka.ms/stagedrolloutux>
150+
151+
2. Click on Enable staged rollout for managed user sign-in (preview)
152+
153+
*For Example:* (**OPTION B**) If you wish to enable Password Hash Sync and Seamless SSO, please slide the Password Hash Sync and Seamless single sign-on features to **'ON'** as shown below.
154+
155+
![](./media/how-to-connect-staged-rollout/sr4.png)
156+
157+
![](./media/how-to-connect-staged-rollout/sr5.png)
158+
159+
3. Add the respective groups to the feature to enable Pass-through Authentication and Seamless single sign-on. Please ensure the security groups have no more than 200 members initially to avoid UX time-out.
160+
161+
![](./media/how-to-connect-staged-rollout/sr6.png)
162+
163+
>[!NOTE]
164+
>The members in a group are automatically enabled for staged rollout. Nested and Dynamic groups are not supported for staged rollout.
165+
166+
## Auditing
167+
168+
We have enabled audit events for the different actions we perform for staged rollout.
169+
170+
- Audit event when you enable Staged Rollout for Password Hash Sync / Pass-through Authentication / Seamless SSO.
171+
172+
>[!NOTE]
173+
>Audit event that is logged when SeamlessSSO is turned **ON** using StagedRollout.
174+
175+
![](./media/how-to-connect-staged-rollout/sr7.png)
176+
177+
![](./media/how-to-connect-staged-rollout/sr8.png)
178+
179+
- Audit event when a group is added to Password Hash Sync / Pass-through Authentication / Seamless SSO.
180+
181+
>[!NOTE]
182+
>Audit event logged when a group is added to Password Hash Sync for staged rollout
183+
184+
![](./media/how-to-connect-staged-rollout/sr9.png)
185+
186+
![](./media/how-to-connect-staged-rollout/sr10.png)
187+
188+
- Audit event when a user who was added to the group is enabled for staged rollout
189+
190+
![](media/how-to-connect-staged-rollout/sr11.png)
191+
192+
![](./media/how-to-connect-staged-rollout/sr12.png)
193+
194+
## Validation
195+
196+
To test sign-in with Password Hash Sync or Pass-through Authentication (username / password sign-in):
197+
198+
1. Browse to <https://myapps.microsoft.com> on a private browser session from extranet and enter the UserPrincipalName (UPN) of the user account selected for staged roll out.
199+
200+
1. If user has been targeted for staged rollout, the user will not be redirected to your federated login page and instead will be asked to sign in on the Azure AD tenant-branded sign-in page.
201+
202+
1. Ensure that the sign-in successfully appears in the [Azure AD sign-in activity report](../reports-monitoring/concept-sign-ins.md) by filtering with the UserPrincipalName..
203+
204+
To test sign-in with Seamless SSO:
205+
206+
1. Browse to <https://myapps.microsoft.com>/ on a private browser session from intranet and enter the UserPrincipalName (UPN) of the user account selected for staged roll out.
207+
208+
1. If the user has been targeted for staged rollout of Seamless SSO, the user will see a "Trying to sign you in ..." message before being silently signed in.
209+
210+
1. Ensure that the sign-in successfully appears in the [Azure AD sign-in activity report](../reports-monitoring/concept-sign-ins.md) by filtering with the UserPrincipalName.
211+
212+
To check user sign-ins still happening on federation providers:
213+
214+
Here is how you can track user sign-ins still happening on AD FS for selected staged rollout users using [these instructions](https://docs.microsoft.com/windows-server/identity/ad-fs/troubleshooting/ad-fs-tshoot-logging#types-of-events). Check vendor documentation on how to check this on 3rd party federation providers.
215+
216+
## Roll back
217+
218+
### Remove a user from staged rollout
219+
220+
1. Removing the user from the group disables staged rollout for the user.
221+
222+
2. If you wish to disable staged rollout feature, please slide the feature back to **'OFF'** state to turn off staged rollout.
223+
224+
225+
## Frequently asked questions
226+
227+
- **Q: Can a customer use this capability in production?**
228+
229+
- A: Yes, this feature can be used in your production tenant, but we recommend that you first try this capability out in your test tenant.
230+
231+
- **Q: Can this feature be used to maintain a permanent "co-existence" where some users use federated authentication, and others cloud authentication?**
232+
233+
- A: No, this feature is designed for migrating from federated to cloud authentication in stages and then to eventually cut over to Cloud authentication. We do not recommend a permanent mixed state as this could lead to unexpected authentication flows.
234+
235+
- **Q: Can we use PowerShell to perform staged rollout?**
236+
237+
- A: Yes, Please find the documentation to use PowerShell to perform staged rollout here.
104 KB
Loading
94.8 KB
Loading
94.5 KB
Loading
68.4 KB
Loading
369 KB
Loading
189 KB
Loading
257 KB
Loading
131 KB
Loading

0 commit comments

Comments
 (0)