Skip to content

Commit d3b8a25

Browse files
authored
Update how-to-connect-pta-faq.yml
1 parent 6ad01d9 commit d3b8a25

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

articles/active-directory/hybrid/how-to-connect-pta-faq.yml

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ sections:
4141
- question: |
4242
Does Pass-through Authentication support "Alternate ID" as the username, instead of "userPrincipalName"?
4343
answer: |
44-
Yes, sign-in using a non-UPN value, such as an alternate email, is supported for both pass-through authentication (PTA) and password hash sync (PHS). For more information about [Alternate Login ID](../authentication/howto-authentication-use-email-signin.md).
44+
Yes, both pass-through authentication (PTA) and password hash sync (PHS) support sign-in using a non-UPN value, such as an alternate email. For more information about [Alternate Login ID](../authentication/howto-authentication-use-email-signin.md).
4545
4646
- question: |
4747
Does password hash synchronization act as a fallback to Pass-through Authentication?
@@ -74,8 +74,8 @@ sections:
7474
7575
To manually upgrade a connector:
7676
77-
- Download the latest version of the Agent. (You will find it under Azure AD connect Pass-through Authentication on the Azure portal. You can also find the link at Azure AD Pass-through Authentication: Version release history | Microsoft Docs..
78-
- The installer restarts the Microsoft Azure AD Connect Authentication Agent services. In some cases, a reboot of the server might be required if the installer cannot replace all files. Therefore we recommend closing all applications (i.e. Event Viewer) before you start the upgrade.
77+
- Download the latest version of the Agent. (You find it under Azure AD connect Pass-through Authentication on the Azure portal. You can also find the link at Azure AD Pass-through Authentication: Version release history | Microsoft Docs..
78+
- The installer restarts the Microsoft Azure AD Connect Authentication Agent services. In some cases, a server reboot is required if the installer cannot replace all files. Therefore we recommend closing all applications that is, Event Viewer before you start the upgrade.
7979
- Run the installer. The upgrade process is quick and does not require providing any credentials and the Agent will not be re-registered.
8080
8181
- question: |
@@ -88,7 +88,7 @@ sections:
8888
- question: |
8989
The user logs on to Azure AD with credentials (username, password). In the meantime the user’s password expires, but the user can still access Azure AD resources. Why does this happen?
9090
answer: |
91-
The password expiry does not trigger the revocation of authentication tokens or cookies. Until the tokens or cookies are valid, the user will be able to use them. This applies regardless of the authentication type (PTA, PHS and federated scenarios).
91+
The password expiry does not trigger the revocation of authentication tokens or cookies. Until the tokens or cookies are valid, the user is able to use them. This applies regardless of the authentication type (PTA, PHS and federated scenarios).
9292
9393
For more details please check the documentation below:
9494
[Microsoft identity platform access tokens - Microsoft identity platform | Microsoft Docs](../develop/access-tokens.md)
@@ -114,7 +114,7 @@ sections:
114114
Yes. If Web Proxy Auto-Discovery (WPAD) is enabled in your on-premises environment, Authentication Agents automatically attempt to locate and use a web proxy server on the network.
115115
116116
If you don't have WPAD in your environment, you can add proxy information (as shown below) to allow a Pass-through Authentication Agent to communicate with Azure AD:
117-
- Configure proxy information in Internet Explorer before you install the Pass-through Authentication Agent on the server. This will allow you to complete the installation of the Authentication Agent, but it will still show up as **Inactive** on the Admin portal.
117+
- Configure proxy information in Internet Explorer before you install the Pass-through Authentication Agent on the server. This allows you to complete the installation of the Authentication Agent, but it will still show up as **Inactive** on the Admin portal.
118118
- On the server, navigate to "C:\Program Files\Microsoft Azure AD Connect Authentication Agent".
119119
- Edit the "AzureADConnectAuthenticationAgentService" configuration file and add the following lines (replace "http\://contosoproxy.com:8080" with your actual proxy address):
120120
@@ -170,8 +170,8 @@ sections:
170170
Consider the peak and average load of sign-in requests that you expect to see on your tenant. As a benchmark, a single Authentication Agent can handle 300 to 400 authentications per second on a standard 4-core CPU, 16-GB RAM server.
171171
172172
To estimate network traffic, use the following sizing guidance:
173-
- Each request has a payload size of (0.5K + 1K * num_of_agents) bytes; i.e., data from Azure AD to the Authentication Agent. Here, "num_of_agents" indicates the number of Authentication Agents registered on your tenant.
174-
- Each response has a payload size of 1K bytes; i.e., data from the Authentication Agent to Azure AD.
173+
- Each request has a payload size of (0.5K + 1K * num_of_agents) bytes; that is, data from Azure AD to the Authentication Agent. Here, "num_of_agents" indicates the number of Authentication Agents registered on your tenant.
174+
- Each response has a payload size of 1K bytes; that is, data from the Authentication Agent to Azure AD.
175175
176176
For most customers, two or three Authentication Agents in total are sufficient for high availability and capacity. You should install Authentication Agents close to your domain controllers to improve sign-in latency.
177177

0 commit comments

Comments
 (0)