Skip to content

Commit deb6922

Browse files
committed
adding include
1 parent fedaff7 commit deb6922

File tree

3 files changed

+39
-16
lines changed

3 files changed

+39
-16
lines changed

articles/active-directory/cloud-provisioning/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -42,6 +42,8 @@
4242
href: how-to-install.md
4343
- name: Cloud provisioning configuration
4444
href: how-to-configure.md
45+
- name: Use Single Sign-On
46+
href: how-to-sso.md
4547
- name: Plan and design
4648
items:
4749
- name: Topologies and scenarios for Azure AD Connect cloud provisioning
Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
---
2+
title: 'How to use Single Sign-on with cloud provisioning'
3+
description: This article describes how to install and use sso with cloud provisioning.
4+
services: active-directory
5+
author: billmath
6+
manager: daveba
7+
ms.service: active-directory
8+
ms.workload: identity
9+
ms.topic: conceptual
10+
ms.date: 01/28/2020
11+
ms.subservice: hybrid
12+
ms.author: billmath
13+
ms.collection: M365-identity-device-management
14+
---
15+
16+
# Using Single Sign-On with cloud provisioning
17+
The following document describes how to use single sign-on with cloud provisioning.
18+
19+
[!INCLUDE [active-directory-cloud-provisioning-sso.md](../../../includes/active-directory-cloud-provisioning-sso.md)]
20+
21+
22+
23+
24+
25+
## Next steps
26+
27+
- [What is provisioning?](what-is-provisioning.md)
28+
- [What is Azure AD Connect cloud provisioning?](what-is-cloud-provisioning.md)

includes/active-directory-cloud-provisioning-sso.md

Lines changed: 9 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -11,30 +11,23 @@ ms.author: billmath
1111
## Steps to enable Single Sign-on
1212
Cloud provisioning works with Single Sign-on. Currently their is not an option to enable SSO when the agent is installed, however you can use the steps below to enable SSO and use it.
1313

14-
### Step 1: Import the Seamless SSO PowerShell module
14+
### Step 1: Download and extract Azure AD Connect files
15+
1. First, download the latest version of [Azure AD Connect](https://www.microsoft.com/download/details.aspx?id=47594)
16+
2. Open a command prompt using Administrative priviledges and navigate to the msi you just downloaded.
17+
3. Run the following: `msiexec /a C:\filepath\AzureADConnect.msi /qb TARGETDIR=C:\filepath\extractfolder`
18+
4. Change filepath and extractfolder to match your file path and the name of your extraction folder. The contents should now be in the extraction folder.
1519

16-
1. First, download, and install [Azure AD PowerShell](https://docs.microsoft.com/powershell/azure/active-directory/overview).
20+
### Step 2: Import the Seamless SSO PowerShell module
21+
22+
1. Download, and install [Azure AD PowerShell](https://docs.microsoft.com/powershell/azure/active-directory/overview).
1723
2. Browse to the `%programfiles%\Microsoft Azure Active Directory Connect` folder.
1824
3. Import the Seamless SSO PowerShell module by using this command: `Import-Module .\AzureADSSO.psd1`.
1925

20-
### Step 2: Get the list of Active Directory forests on which Seamless SSO has been enabled
26+
### Step 3: Get the list of Active Directory forests on which Seamless SSO has been enabled
2127

2228
1. Run PowerShell as an administrator. In PowerShell, call `New-AzureADSSOAuthenticationContext`. When prompted, enter your tenant's global administrator credentials.
2329
2. Call `Get-AzureADSSOStatus`. This command provides you with the list of Active Directory forests (look at the "Domains" list) on which this feature has been enabled.
2430

25-
### Step 3: Disable Seamless SSO for each Active Directory forest where you've set up the feature
26-
27-
1. Call `$creds = Get-Credential`. When prompted, enter the domain administrator credentials for the intended Active Directory forest.
28-
29-
> [!NOTE]
30-
>The domain administrator credentials username must be entered in the SAM account name format (contoso\johndoe or contoso.com\johndoe). We use the domain portion of the username to locate the Domain Controller of the Domain Administrator using DNS.
31-
32-
>[!NOTE]
33-
>The domain administrator account used must not be a member of the Protected Users group. If so, the operation will fail.
34-
35-
2. Call `Disable-AzureADSSOForest -OnPremCredentials $creds`. This command removes the `AZUREADSSOACC` computer account from the on-premises domain controller for this specific Active Directory forest.
36-
3. Repeat the preceding steps for each Active Directory forest where you’ve set up the feature.
37-
3831
### Step 4: Enable Seamless SSO for each Active Directory forest
3932

4033
1. Call `Enable-AzureADSSOForest`. When prompted, enter the domain administrator credentials for the intended Active Directory forest.

0 commit comments

Comments
 (0)