Skip to content

Commit cf82f44

Browse files
Merge pull request #208958 from yoelhor/patch-303
Update how-to-connect-staged-rollout.md
2 parents f6897b1 + 1d4e836 commit cf82f44

File tree

1 file changed

+12
-12
lines changed

1 file changed

+12
-12
lines changed

articles/active-directory/hybrid/how-to-connect-staged-rollout.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ manager: karenhoran
66
ms.service: active-directory
77
ms.workload: identity
88
ms.topic: how-to
9-
ms.date: 06/15/2022
9+
ms.date: 08/24/2022
1010
ms.subservice: hybrid
1111
ms.author: billmath
1212
ms.collection: M365-identity-device-management
@@ -31,16 +31,16 @@ For an overview of the feature, view this "Azure Active Directory: What is Stage
3131

3232
## Prerequisites
3333

34-
- You have an Azure Active Directory (Azure AD) tenant with federated domains.
34+
- You have an Azure Active Directory (Azure AD) tenant with [federated domains](./whatis-fed.md).
3535

3636
- You have decided to move one of the following options:
3737
- **Password hash synchronization (sync)**. For more information, see [What is password hash sync](whatis-phs.md)
3838
- **Pass-through authentication**. For more information, see [What is pass-through authentication](how-to-connect-pta.md)
39-
- **Azure AD Certificate-based authentication (CBA) settings**. For more information, see [What is pass-through authentication](../authentication/concept-certificate-based-authentication.md)
39+
- **Azure AD Certificate-based authentication (CBA) settings**. For more information, see [Overview of Azure AD certificate-based authentication](../authentication/concept-certificate-based-authentication.md)
4040

4141
For both options, we recommend enabling single sign-on (SSO) to achieve a silent sign-in experience.
4242
For Windows 7 or 8.1 domain-joined devices, we recommend using seamless SSO. For more information, see [What is seamless SSO](how-to-connect-sso.md).
43-
For Windows 10, Windows Server 2016 and later versions, it’s recommended to use SSO via [Primary Refresh Token (PRT)](../devices/concept-primary-refresh-token.md) with [Azure AD joined devices](../devices/concept-azure-ad-join.md), [hybrid Azure AD joined devices](../devices/concept-azure-ad-join-hybrid.md) or personal registered devices via Add Work or School Account.
43+
For Windows 10, Windows Server 2016 and later versions, it’s recommended to use SSO via [Primary Refresh Token (PRT)](../devices/concept-primary-refresh-token.md) with [Azure AD joined devices](../devices/concept-azure-ad-join.md), [hybrid Azure AD joined devices](../devices/concept-azure-ad-join-hybrid.md) or [personal registered devices](../devices/concept-azure-ad-register.md) via Add Work or School Account.
4444

4545
- You have configured all the appropriate tenant-branding and conditional access policies you need for users who are being migrated to cloud authentication.
4646

@@ -59,7 +59,7 @@ The following scenarios are supported for Staged Rollout. The feature works only
5959

6060
- Users who are provisioned to Azure AD by using Azure AD Connect. It does not apply to cloud-only users.
6161

62-
- User sign-in traffic on browsers and *modern authentication* clients. Applications or cloud services that use legacy authentication will fall back to federated authentication flows. An example might be Exchange online with modern authentication turned off, or Outlook 2010, which does not support modern authentication.
62+
- User sign-in traffic on browsers and *modern authentication* clients. Applications or cloud services that use [legacy authentication](../conditional-access/block-legacy-authentication.md) will fall back to federated authentication flows. An example of legacy authentication might be Exchange online with modern authentication turned off, or Outlook 2010, which does not support modern authentication.
6363

6464
- Group size is currently limited to 50,000 users. If you have groups that are larger than 50,000 users, it is recommended to split this group over multiple groups for Staged Rollout.
6565

@@ -172,19 +172,19 @@ You can roll out these options:
172172
- **Not supported** - **Password hash sync** + **Pass-through authentication** + **Seamless SSO**
173173
- **Certificate-based authentication settings**
174174

175-
Do the following:
175+
To configure Staged Rollout, follow these steps:
176176

177-
1. To access the UX, sign in to the [Azure AD portal](https://aka.ms/stagedrolloutux).
177+
1. Sign in to the [Azure portal](https://portal.azure.com/) in the User Administrator role for the organization.
178178

179-
2. Select the **Enable Staged Rollout for managed user sign-in** link.
179+
1. Search for and select **Azure Active Directory**.
180180

181-
For example, if you want to enable **Password Hash Sync** and **Seamless single sign-on**, slide both controls to **On**.
181+
1. From the left menu, select **Azure AD Connect**.
182182

183-
183+
1. On the *Azure AD Connect* page, under the *Staged rollout of cloud authentication*, select the **Enable staged rollout for managed user sign-in** link.
184184

185-
185+
1. On the *Enable staged rollout feature* page, select the options you want to enable: [Password Hash Sync](./whatis-phs.md), [Pass-through authentication](./how-to-connect-pta.md), [Seamless single sign-on](./how-to-connect-sso.md), or [Certificate-based Authentication (Preview)](../authentication/active-directory-certificate-based-authentication-get-started.md). For example, if you want to enable **Password Hash Sync** and **Seamless single sign-on**, slide both controls to **On**.
186186

187-
3. Add the groups to the feature to enable *pass-through authentication* and *seamless SSO*. To avoid a UX time-out, ensure that the security groups contain no more than 200 members initially.
187+
1. Add groups to the features you selected. For example, *pass-through authentication* and *seamless SSO*. To avoid a time-out, ensure that the security groups contain no more than 200 members initially.
188188

189189

190190

0 commit comments

Comments
 (0)