Skip to content

Commit d6fb90d

Browse files
authored
Merge pull request #89674 from jay98014/bpl_fixes_20190925
Update BPL docs with deployment requirements\agent updater faq.
2 parents 6d840a4 + 636a3a4 commit d6fb90d

File tree

2 files changed

+8
-5
lines changed

2 files changed

+8
-5
lines changed

articles/active-directory/authentication/howto-password-ban-bad-on-premises-deploy.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -40,23 +40,24 @@ After the feature has been running in audit mode for a reasonable period, you ca
4040
## Deployment requirements
4141

4242
* Licensing requirements for Azure AD password protection can be found in the article [Eliminate bad passwords in your organization](concept-password-ban-bad.md#license-requirements).
43-
* All domain controllers that get the DC Agent service for Azure AD password protection installed must run Windows Server 2012 or later. This requirement does not imply that the Active Directory domain or forest must also be at Windows Server 2012 domain or forest functional level. As mentioned in [Design Principles](concept-password-ban-bad-on-premises.md#design-principles), there is no minimum DFL or FFL required for either the DC agent or proxy software to run.
43+
* All machines where the Azure AD Password Protection DC Agent software will be installed must run Windows Server 2012 or later. This requirement does not imply that the Active Directory domain or forest must also be at Windows Server 2012 domain or forest functional level. As mentioned in [Design Principles](concept-password-ban-bad-on-premises.md#design-principles), there is no minimum DFL or FFL required for either the DC agent or proxy software to run.
4444
* All machines that get the DC agent service installed must have .NET 4.5 installed.
45-
* All machines that get the proxy service for Azure AD password protection installed must run Windows Server 2012 R2 or later.
45+
* All machines where the Azure AD Password Protection Proxy service will be installed must run Windows Server 2012 R2 or later.
4646
> [!NOTE]
47-
> Proxy service deployment is a mandatory requirement for deploying Azure AD password protection even though the Domain controller may have outbound direct internet connectivity.
47+
> Proxy service deployment is a mandatory requirement for deploying Azure AD password protection even though the domain controller may have outbound direct internet connectivity.
4848
>
4949
* All machines where the Azure AD Password Protection Proxy service will be installed must have .NET 4.7 installed.
5050
.NET 4.7 should already be installed on a fully updated Windows Server. If this is not the case, download and run the installer found at [The .NET Framework 4.7 offline installer for Windows](https://support.microsoft.com/help/3186497/the-net-framework-4-7-offline-installer-for-windows).
51-
* All machines, including domain controllers, that get Azure AD password protection components installed must have the Universal C Runtime installed. You can get the runtime by making sure you have all updates from Windows Update. Or you can get it in an OS-specific update package. For more information, see [Update for Universal C Runtime in Windows](https://support.microsoft.com/help/2999226/update-for-uniersal-c-runtime-in-windows).
51+
* All machines, including domain controllers, that have Azure AD password protection components installed must have the Universal C Runtime installed. You can get the runtime by making sure you have all updates from Windows Update. Or you can get it in an OS-specific update package. For more information, see [Update for Universal C Runtime in Windows](https://support.microsoft.com/help/2999226/update-for-uniersal-c-runtime-in-windows).
5252
* Network connectivity must exist between at least one domain controller in each domain and at least one server that hosts the proxy service for password protection. This connectivity must allow the domain controller to access RPC endpoint mapper port 135 and the RPC server port on the proxy service. By default, the RPC server port is a dynamic RPC port, but it can be configured to [use a static port](#static).
53-
* All machines that host the proxy service must have network access to the following endpoints:
53+
* All machines where the Azure AD Password Protection Proxy service will be installed must have network access to the following endpoints:
5454

5555
|**Endpoint**|**Purpose**|
5656
| --- | --- |
5757
|`https://login.microsoftonline.com`|Authentication requests|
5858
|`https://enterpriseregistration.windows.net`|Azure AD password protection functionality|
5959

60+
You must also enable network access for the set of ports and urls specified in the [Application Proxy environment setup procedures](https://docs.microsoft.com/azure/active-directory/manage-apps/application-proxy-add-on-premises-application#prepare-your-on-premises-environment). These configuration steps are required in order for the Microsoft Azure AD Connect Agent Updater service to be able to function (this service is installed side-by-side with the Proxy service). It is not recommended to install Azure AD Password Protection Proxy and Application Proxy side by side on the same machine, due to incompatibilities between the versions of the Microsoft Azure AD Connect Agent Updater software.
6061
* All machines that host the proxy service for password protection must be configured to grant domain controllers the ability to logon to the proxy service. This is controlled via the "Access this computer from the network" privilege assignment.
6162
* All machines that host the proxy service for password protection must be configured to allow outbound TLS 1.2 HTTP traffic.
6263
* A Global Administrator account to register the proxy service for password protection and forest with Azure AD.

articles/active-directory/authentication/howto-password-ban-bad-on-premises-faq.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -98,6 +98,8 @@ No. Since the proxy server is stateless, it's not important which specific proxy
9898

9999
Yes. The Azure AD Password Protection Proxy service and Azure AD Connect should never conflict directly with each other.
100100

101+
Unfortunately, an incompatibility has been found between the version of the Microsoft Azure AD Connect Agent Updater service that is installed by the Azure AD Password Protection Proxy software and the version of the service that is installed by the [Azure Active Directory Application Proxy](https://docs.microsoft.com/azure/active-directory/manage-apps/application-proxy) software. This incompatibility may result in the Agent Updater service being unable to contact Azure for software updates. It is not recommended to install Azure AD Password Protection Proxy and Azure Active Directory Application Proxy on the same machine.
102+
101103
**Q: In what order should the DC agents and proxies be installed and registered?**
102104

103105
Any ordering of Proxy agent installation, DC agent installation, forest registration, and Proxy registration is supported.

0 commit comments

Comments
 (0)