Skip to content

Commit db43690

Browse files
committed
fixing
1 parent ce62a74 commit db43690

File tree

1 file changed

+11
-11
lines changed

1 file changed

+11
-11
lines changed

articles/active-directory/hybrid/how-to-connect-sso-faq.yml

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -41,15 +41,15 @@ sections:
4141
- question: |
4242
What applications take advantage of `domain_hint` or `login_hint` parameter capability of Seamless SSO?
4343
answer: |
44-
Listed below is a non-exhaustive list of applications that can send these parameters to Azure AD, and therefore provides users a silent sign-on experience using Seamless SSO (i.e., no need for your users to input their usernames or passwords):
44+
The table has a list of applications that can send these parameters to Azure AD. This action provides users a silent sign-on experience using Seamless SSO.:
4545
4646
| Application name | Application URL to be used |
4747
| -- | -- |
4848
| Access panel | https:\//myapps.microsoft.com/contoso.com |
4949
| Outlook on Web | https:\//outlook.office365.com/contoso.com |
5050
| Office 365 portals | https:\//portal.office.com?domain_hint=contoso.com, https:\//www.office.com?domain_hint=contoso.com |
5151
52-
In addition, users get a silent sign-on experience if an application sends sign-in requests to Azure AD's endpoints set up as tenants - that is, https:\//login.microsoftonline.com/contoso.com/<..> or https:\//login.microsoftonline.com/<tenant_ID>/<..> - instead of Azure AD's common endpoint - that is, https:\//login.microsoftonline.com/common/<...>. Listed below is a non-exhaustive list of applications that make these types of sign-in requests.
52+
In addition, users get a silent sign-on experience if an application sends sign-in requests to Azure AD's endpoints set up as tenants - that is, https:\//login.microsoftonline.com/contoso.com/<..> or https:\//login.microsoftonline.com/<tenant_ID>/<..> - instead of Azure AD's common endpoint - that is, https:\//login.microsoftonline.com/common/<...>. The table has a list of applications that make these types of sign-in requests.
5353
5454
| Application name | Application URL to be used |
5555
| -- | -- |
@@ -70,25 +70,25 @@ sections:
7070
answer: |
7171
[Azure AD Join](../devices/overview.md) provides SSO to users if their devices are registered with Azure AD. These devices don't necessarily have to be domain-joined. SSO is provided using *primary refresh tokens* or *PRTs*, and not Kerberos. The user experience is most optimal on Windows 10 devices. SSO happens automatically on the Microsoft Edge browser. It also works on Chrome with the use of a browser extension.
7272
73-
You can use both Azure AD Join and Seamless SSO on your tenant. These two features are complementary. If both features are turned on, then SSO from Azure AD Join takes precedence over Seamless SSO.
73+
You can use Azure AD Join and Seamless SSO on your tenant. These two features are complementary. If both features are turned on, then SSO from Azure AD Join takes precedence over Seamless SSO.
7474
7575
- question: |
7676
I want to register non-Windows 10 devices with Azure AD, without using AD FS. Can I use Seamless SSO instead?
7777
answer: |
7878
Yes, this scenario needs version 2.1 or later of the [workplace-join client](https://www.microsoft.com/download/details.aspx?id=53554).
7979
8080
- question: |
81-
How can I roll over the Kerberos decryption key of the `AZUREADSSO` computer account?
81+
How can I roll-over the Kerberos decryption key of the `AZUREADSSO` computer account?
8282
answer: |
83-
It is important to frequently roll over the Kerberos decryption key of the `AZUREADSSO` computer account (which represents Azure AD) created in your on-premises AD forest.
83+
It is important to frequently roll-over the Kerberos decryption key of the `AZUREADSSO` computer account (which represents Azure AD) created in your on-premises AD forest.
8484
8585
>[!IMPORTANT]
86-
>We highly recommend that you roll over the Kerberos decryption key at least every 30 days.
86+
>We highly recommend that you roll-over the Kerberos decryption key at least every 30 days.
8787
8888
Follow these steps on the on-premises server where you are running Azure AD Connect:
8989
9090
> [!NOTE]
91-
>You will need both domain administrator and global administrator or hybrid identity administrator credentials for the steps below.
91+
>You will need domain administrator and global administrator/hybrid identity administrator credentials for the steps.
9292
>If you are not a domain admin and you were assigned permissions by the domain admin, you should call `Update-AzureADSSOForest -OnPremCredentials $creds -PreserveCustomPermissionsOnDesktopSsoAccount`
9393
9494
**Step 1. Get list of AD forests where Seamless SSO has been enabled**
@@ -132,7 +132,7 @@ sections:
132132
133133
After completing the wizard, Seamless SSO will be disabled on your tenant. However, you will see a message on screen that reads as follows:
134134
135-
"Single sign-on is now disabled, but there are additional manual steps to perform in order to complete clean-up. [Learn more](tshoot-connect-sso.md#step-3-disable-seamless-sso-for-each-active-directory-forest-where-youve-set-up-the-feature)"
135+
"Single sign-on is now disabled, but there are other manual steps to perform in order to complete clean-up. [Learn more](tshoot-connect-sso.md#step-3-disable-seamless-sso-for-each-active-directory-forest-where-youve-set-up-the-feature)"
136136
137137
To complete the clean-up process, follow steps 2 and 3 on the on-premises server where you are running Azure AD Connect.
138138
@@ -143,7 +143,7 @@ sections:
143143
1. First, download, and install [Azure AD PowerShell](/powershell/azure/active-directory/overview).
144144
2. Navigate to the `$env:ProgramFiles"\Microsoft Azure Active Directory Connect"` folder.
145145
3. Import the Seamless SSO PowerShell module using this command: `Import-Module .\AzureADSSO.psd1`.
146-
4. Run PowerShell as an Administrator. In PowerShell, call `New-AzureADSSOAuthenticationContext`. This command should give you a popup to enter your tenant's Global Administrator or Hybrid Identity Adminstrator credentials.
146+
4. Run PowerShell as an Administrator. In PowerShell, call `New-AzureADSSOAuthenticationContext`. This command should give you a popup to enter your tenant's Global Administrator or Hybrid Identity Administrator credentials.
147147
5. Call `Enable-AzureADSSO -Enable $false`.
148148
149149
At this point Seamless SSO is disabled but the domains will remain configured in case you would like to enable Seamless SSO back. If you would like to remove the domains from Seamless SSO configuration completely, call the following cmdlet after you completed step 5 above: `Disable-AzureADSSOForest -DomainFqdn <fqdn>`.
@@ -153,12 +153,12 @@ sections:
153153
154154
**Step 2. Get list of AD forests where Seamless SSO has been enabled**
155155
156-
Follow tasks 1 through 4 below if you have disabled Seamless SSO using Azure AD Connect. If you have disabled Seamless SSO using PowerShell instead, jump ahead to task 5 below.
156+
Follow tasks 1 through 4 if you have disabled Seamless SSO using Azure AD Connect. If you have disabled Seamless SSO using PowerShell instead, jump ahead to task 5.
157157
158158
1. First, download, and install [Azure AD PowerShell](/powershell/azure/active-directory/overview).
159159
2. Navigate to the `$env:ProgramFiles"\Microsoft Azure Active Directory Connect"` folder.
160160
3. Import the Seamless SSO PowerShell module using this command: `Import-Module .\AzureADSSO.psd1`.
161-
4. Run PowerShell as an Administrator. In PowerShell, call `New-AzureADSSOAuthenticationContext`. This command should give you a popup to enter your tenant's Global Administrator or Hybrid Identity Adminstrator credentials.
161+
4. Run PowerShell as an Administrator. In PowerShell, call `New-AzureADSSOAuthenticationContext`. This command should give you a popup to enter your tenant's Global Administrator or Hybrid Identity Administrator credentials.
162162
5. Call `Get-AzureADSSOStatus | ConvertFrom-Json`. This command provides you the list of AD forests (look at the "Domains" list) on which this feature has been enabled.
163163
164164
**Step 3. Manually delete the `AZUREADSSO` computer account from each AD forest that you see listed.**

0 commit comments

Comments
 (0)