Skip to content

Commit e89cc08

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 8f2940d + eb52d95 commit e89cc08

File tree

77 files changed

+777
-573
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

77 files changed

+777
-573
lines changed
Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
{
2+
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/high-performance-compute/index.yml",
5+
"redirect_url": "/articles/high-performance-computing",
6+
"redirect_document_id": false
7+
}
8+
]
9+
}

articles/active-directory/cloud-sync/how-to-install.md

Lines changed: 21 additions & 63 deletions
Original file line numberDiff line numberDiff line change
@@ -7,13 +7,14 @@ manager: amycolannino
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: how-to
10-
ms.date: 03/01/2022
10+
ms.date: 11/11/2022
1111
ms.subservice: hybrid
1212
ms.author: billmath
1313
ms.collection: M365-identity-device-management
1414
---
1515

1616
# Install the Azure AD Connect provisioning agent
17+
1718
This article walks you through the installation process for the Azure Active Directory (Azure AD) Connect provisioning agent and how to initially configure it in the Azure portal.
1819

1920
>[!IMPORTANT]
@@ -27,66 +28,19 @@ For more information and an example, see the following video.
2728
> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RWK5mR]
2829
2930
## Group Managed Service Accounts
30-
A group Managed Service Account (gMSA) is a managed domain account that provides automatic password management, simplified service principal name (SPN) management, and the ability to delegate the management to other administrators. It also extends this functionality over multiple servers. Azure AD Connect cloud sync supports and recommends the use of a group Managed Service Account for running the agent. For more information on a group Managed Service Account, see [Group Managed Service Accounts](how-to-prerequisites.md#group-managed-service-accounts).
31+
A Group Managed Service Account (gMSA) is a managed domain account that provides automatic password management, simplified service principal name (SPN) management, and the ability to delegate the management to other administrators. It also extends this functionality over multiple servers. Azure AD Connect cloud sync supports and recommends the use of a Group Managed Service Account for running the agent. For more information on a Group Managed Service Account, see [Group Managed Service Accounts](how-to-prerequisites.md#group-managed-service-accounts).
3132

3233

3334
### Upgrade an existing agent to use the gMSA
34-
To upgrade an existing agent to use the group Managed Service Account created during installation, update the agent service to the latest version by running AADConnectProvisioningAgent.msi. Now run through the installation wizard again and provide the credentials to create the account when prompted.
35+
To upgrade an existing agent to use the Group Managed Service Account created during installation, update the agent service to the latest version by running AADConnectProvisioningAgent.msi. Now run through the installation wizard again and provide the credentials to create the account when prompted.
3536

3637
## Install the agent
3738

38-
To install the agent:
39-
40-
1. Sign in to the server you'll use with enterprise admin permissions.
41-
2. Sign in to the Azure portal, and then go to **Azure Active Directory**.
42-
3. On the menu on the left, select **Azure AD Connect**.
43-
4. Select **Manage cloud sync**.
44-
[![Screenshot that shows manage cloud sync](media/how-to-install/new-install-1.png)](media/how-to-install/new-install-1.png#lightbox)</br>
45-
5. At the top, click **Download agent**.
46-
[![Screenshot that the download agent](media/how-to-install/new-install-2.png)](media/how-to-install/new-install-2.png#lightbox)</br>
47-
7. On the right, click **Accept terms and download**.
48-
[![Screenshot that accept and download](media/how-to-install/new-install-3.png)](media/how-to-install/new-install-3.png#lightbox)</br>
49-
9. Once the agent has completed downloading, click **Open file**. This will start the installation.
50-
[![Screenshot that shows open file](media/how-to-install/new-install-4.png)](media/how-to-install/new-install-4.png#lightbox)</br>
51-
10. On the **Microsoft Azure AD Connect Provisioning Agent Package** screen, accept the licensing terms, and select **Install**.
52-
[![Screenshot that shows install](media/how-to-install/new-install-5.png)](media/how-to-install/new-install-5.png#lightbox)</br>
53-
11. After this operation finishes, the configuration wizard starts. Click **Next**.
54-
[![Screenshot that shows wizard](media/how-to-install/new-install-6.png)](media/how-to-install/new-install-6.png#lightbox)</br>
55-
13. Sign in with your Azure AD global administrator account.
56-
14. On the **Configure Service Account** screen, select either **Create gMSA**, or **Use custom gMSA**. If you allow the agent to create the account, it will be named **provAgentgMSA$**. If you specify **Use custom gMSA**, you're prompted to provide this account.
57-
[![Screenshot that shows create service account](media/how-to-install/new-install-7.png)](media/how-to-install/new-install-7.png#lightbox)</br>
58-
15. Enter the domain administrator credentials to create the group Managed Service account that will be used to run the agent service. Select **Next**.
59-
![Screenshot that shows the Create gMSA option.](media/how-to-install/install-12.png)</br>
60-
16. On the **Connect Active Directory** screen, click **Next**. Your current domain has been added automatically. If you wish to add additional domains, enter them and select **Add Directory**. Then sign in with an administrator account from that domain.
61-
[![Screenshot that shows connecting to AD](media/how-to-install/new-install-8.png)](media/how-to-install/new-install-8.png#lightbox)</br>
62-
17. Optionally, you can manage the preference of domain controllers the agent will use. To do this, click **Add Directory** and select the **Select domain controller priority** checkbox and then order the list of domain controllers. Select **OK**. Click **Next**.
63-
[![Screenshot that shows adding domain controller priority](media/how-to-install/new-install-10.png)](media/how-to-install/new-install-10.png#lightbox)</br>
64-
18. On the **Agent installation** screen, confirm settings and the account that will be created and select **Confirm**.
65-
[![Screenshot that shows install confirmation](media/how-to-install/new-install-11.png)](media/how-to-install/new-install-11.png#lightbox)</br>
66-
20. After this operation finishes, you should see **Your agent installation is complete.** Select **Exit**.
67-
21. If you still see the initial **Microsoft Azure AD Connect Provisioning Agent Package** screen, select **Close**.
39+
[!INCLUDE [active-directory-cloud-sync-how-to-install](../../../includes/active-directory-cloud-sync-how-to-install.md)]
6840

6941
## Verify agent installation
70-
Agent verification occurs in the Azure portal and on the local server that's running the agent.
71-
72-
### Azure portal agent verification
73-
To verify the agent is being seen by Azure:
74-
75-
1. Sign in to the Azure portal.
76-
2. On the left, select **Azure Active Directory** > **Azure AD Connect**. In the center, select **Manage cloud sync**.
77-
![Screenshot that shows the Azure portal.](media/how-to-install/install-6.png)</br>
78-
3. On the **Azure AD Connect cloud sync** screen, select **Review all agents**.
79-
![Screenshot that shows the Review all agents option.](media/how-to-install/install-7.png)</br>
80-
4. On the **On-premises provisioning agents** screen, you see the agents you installed. Verify that the agent in question is there and is marked *active*.
81-
![Screenshot that shows On-premises provisioning agents screen.](media/how-to-install/verify-1.png)</br>
8242

83-
### On the local server
84-
To verify that the agent is running:
85-
86-
1. Sign in to the server with an administrator account.
87-
2. Open **Services** by going to it or by selecting **Start** > **Run** > **Services.msc**.
88-
3. Under **Services**, make sure **Microsoft Azure AD Connect Agent Updater** and **Microsoft Azure AD Connect Provisioning Agent** are present. Also, ensure the status is *Running*.
89-
![Screenshot that shows the Services screen.](media/how-to-install/troubleshoot-1.png)
43+
[!INCLUDE [active-directory-cloud-sync-how-to-verify-installation](../../../includes/active-directory-cloud-sync-how-to-verify-installation.md)]
9044

9145
>[!IMPORTANT]
9246
>The agent has been installed, but it must be configured and enabled before it will start synchronizing users. To configure a new agent, see [Create a new configuration for Azure AD Connect cloud sync](how-to-configure.md).
@@ -102,16 +56,20 @@ To use password writeback and enable the self-service password reset (SSPR) serv
10256

10357
For more information on using password writeback with Azure AD Connect cloud sync, see [Tutorial: Enable cloud sync self-service password reset writeback to an on-premises environment (preview)](../../active-directory/authentication/tutorial-enable-cloud-sync-sspr-writeback.md).
10458

105-
## Installing against US govt cloud
106-
By default, the Azure Active Directory (Azure AD) Connect provisioning agent installs against the default Azure cloud environment. If you are installing the agent for use in the US government cloud do the following:
59+
## Installing against US government cloud
60+
61+
By default, the Azure Active Directory (Azure AD) Connect provisioning agent installs against the default Azure cloud environment. If you're installing the agent for use in the US government, follow these steps:
10762

108-
- In step #7 above, instead of click **Open file**, go to start run and navigate to the **AADConnectProvisioningAgentSetup.exe** file. In the run box, after the executable, enter **ENVIRONMENTNAME=AzureUSGovernment** and click **Ok**.
109-
[![Screenshot showing US govt cloud install](media/how-to-install/new-install-12.png)](media/how-to-install/new-install-12.png#lightbox)</br>
63+
- In step #7 above, instead of select **Open file**, go to start run and navigate to the **AADConnectProvisioningAgentSetup.exe** file. In the run box, after the executable, enter **ENVIRONMENTNAME=AzureUSGovernment** and select **Ok**.
64+
65+
[![Screenshot showing US government cloud install.](media/how-to-install/new-install-12.png)](media/how-to-install/new-install-12.png#lightbox)
11066

11167
## Password hash synchronization and FIPS with cloud sync
68+
11269
If your server has been locked down according to Federal Information Processing Standard (FIPS), then MD5 is disabled.
11370

114-
**To enable MD5 for password hash synchronization, perform the following steps:**
71+
72+
To enable MD5 for password hash synchronization, perform the following steps:
11573

11674
1. Go to %programfiles%\Microsoft Azure AD Connect Provisioning Agent.
11775
2. Open AADConnectProvisioningAgent.exe.config.
@@ -121,12 +79,12 @@ If your server has been locked down according to Federal Information Processing
12179

12280
For reference, this snippet is what it should look like:
12381

124-
```
125-
<configuration>
126-
<runtime>
127-
<enforceFIPSPolicy enabled="false"/>
128-
</runtime>
129-
</configuration>
82+
```xml
83+
<configuration>
84+
<runtime>
85+
<enforceFIPSPolicy enabled="false"/>
86+
</runtime>
87+
</configuration>
13088
```
13189

13290
For information about security and FIPS, see [Azure AD password hash sync, encryption, and FIPS compliance](https://blogs.technet.microsoft.com/enterprisemobility/2014/06/28/aad-password-sync-encryption-and-fips-compliance/).

0 commit comments

Comments
 (0)