You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-sync/how-to-install.md
+21-63Lines changed: 21 additions & 63 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,13 +7,14 @@ manager: amycolannino
7
7
ms.service: active-directory
8
8
ms.workload: identity
9
9
ms.topic: how-to
10
-
ms.date: 03/01/2022
10
+
ms.date: 11/11/2022
11
11
ms.subservice: hybrid
12
12
ms.author: billmath
13
13
ms.collection: M365-identity-device-management
14
14
---
15
15
16
16
# Install the Azure AD Connect provisioning agent
17
+
17
18
This article walks you through the installation process for the Azure Active Directory (Azure AD) Connect provisioning agent and how to initially configure it in the Azure portal.
18
19
19
20
>[!IMPORTANT]
@@ -27,66 +28,19 @@ For more information and an example, see the following video.
A group Managed Service Account (gMSA) is a managed domain account that provides automatic password management, simplified service principal name (SPN) management, and the ability to delegate the management to other administrators. It also extends this functionality over multiple servers. Azure AD Connect cloud sync supports and recommends the use of a group Managed Service Account for running the agent. For more information on a group Managed Service Account, see [Group Managed Service Accounts](how-to-prerequisites.md#group-managed-service-accounts).
31
+
A Group Managed Service Account (gMSA) is a managed domain account that provides automatic password management, simplified service principal name (SPN) management, and the ability to delegate the management to other administrators. It also extends this functionality over multiple servers. Azure AD Connect cloud sync supports and recommends the use of a Group Managed Service Account for running the agent. For more information on a Group Managed Service Account, see [Group Managed Service Accounts](how-to-prerequisites.md#group-managed-service-accounts).
31
32
32
33
33
34
### Upgrade an existing agent to use the gMSA
34
-
To upgrade an existing agent to use the group Managed Service Account created during installation, update the agent service to the latest version by running AADConnectProvisioningAgent.msi. Now run through the installation wizard again and provide the credentials to create the account when prompted.
35
+
To upgrade an existing agent to use the Group Managed Service Account created during installation, update the agent service to the latest version by running AADConnectProvisioningAgent.msi. Now run through the installation wizard again and provide the credentials to create the account when prompted.
35
36
36
37
## Install the agent
37
38
38
-
To install the agent:
39
-
40
-
1. Sign in to the server you'll use with enterprise admin permissions.
41
-
2. Sign in to the Azure portal, and then go to **Azure Active Directory**.
42
-
3. On the menu on the left, select **Azure AD Connect**.
43
-
4. Select **Manage cloud sync**.
44
-
[](media/how-to-install/new-install-1.png#lightbox)</br>
45
-
5. At the top, click **Download agent**.
46
-
[](media/how-to-install/new-install-2.png#lightbox)</br>
47
-
7. On the right, click **Accept terms and download**.
48
-
[](media/how-to-install/new-install-3.png#lightbox)</br>
49
-
9. Once the agent has completed downloading, click **Open file**. This will start the installation.
50
-
[](media/how-to-install/new-install-4.png#lightbox)</br>
51
-
10. On the **Microsoft Azure AD Connect Provisioning Agent Package** screen, accept the licensing terms, and select **Install**.
52
-
[](media/how-to-install/new-install-5.png#lightbox)</br>
53
-
11. After this operation finishes, the configuration wizard starts. Click **Next**.
54
-
[](media/how-to-install/new-install-6.png#lightbox)</br>
55
-
13. Sign in with your Azure AD global administrator account.
56
-
14. On the **Configure Service Account** screen, select either **Create gMSA**, or **Use custom gMSA**. If you allow the agent to create the account, it will be named **provAgentgMSA$**. If you specify **Use custom gMSA**, you're prompted to provide this account.
57
-
[](media/how-to-install/new-install-7.png#lightbox)</br>
58
-
15. Enter the domain administrator credentials to create the group Managed Service account that will be used to run the agent service. Select **Next**.
59
-
</br>
60
-
16. On the **Connect Active Directory** screen, click **Next**. Your current domain has been added automatically. If you wish to add additional domains, enter them and select **Add Directory**. Then sign in with an administrator account from that domain.
61
-
[](media/how-to-install/new-install-8.png#lightbox)</br>
62
-
17. Optionally, you can manage the preference of domain controllers the agent will use. To do this, click **Add Directory** and select the **Select domain controller priority** checkbox and then order the list of domain controllers. Select **OK**. Click **Next**.
63
-
[](media/how-to-install/new-install-10.png#lightbox)</br>
64
-
18. On the **Agent installation** screen, confirm settings and the account that will be created and select **Confirm**.
65
-
[](media/how-to-install/new-install-11.png#lightbox)</br>
66
-
20. After this operation finishes, you should see **Your agent installation is complete.** Select **Exit**.
67
-
21. If you still see the initial **Microsoft Azure AD Connect Provisioning Agent Package** screen, select **Close**.
Agent verification occurs in the Azure portal and on the local server that's running the agent.
71
-
72
-
### Azure portal agent verification
73
-
To verify the agent is being seen by Azure:
74
-
75
-
1. Sign in to the Azure portal.
76
-
2. On the left, select **Azure Active Directory** > **Azure AD Connect**. In the center, select **Manage cloud sync**.
77
-
</br>
78
-
3. On the **Azure AD Connect cloud sync** screen, select **Review all agents**.
79
-
</br>
80
-
4. On the **On-premises provisioning agents** screen, you see the agents you installed. Verify that the agent in question is there and is marked *active*.
81
-
</br>
82
42
83
-
### On the local server
84
-
To verify that the agent is running:
85
-
86
-
1. Sign in to the server with an administrator account.
87
-
2. Open **Services** by going to it or by selecting **Start** > **Run** > **Services.msc**.
88
-
3. Under **Services**, make sure **Microsoft Azure AD Connect Agent Updater** and **Microsoft Azure AD Connect Provisioning Agent** are present. Also, ensure the status is *Running*.
89
-

>The agent has been installed, but it must be configured and enabled before it will start synchronizing users. To configure a new agent, see [Create a new configuration for Azure AD Connect cloud sync](how-to-configure.md).
@@ -102,16 +56,20 @@ To use password writeback and enable the self-service password reset (SSPR) serv
102
56
103
57
For more information on using password writeback with Azure AD Connect cloud sync, see [Tutorial: Enable cloud sync self-service password reset writeback to an on-premises environment (preview)](../../active-directory/authentication/tutorial-enable-cloud-sync-sspr-writeback.md).
104
58
105
-
## Installing against US govt cloud
106
-
By default, the Azure Active Directory (Azure AD) Connect provisioning agent installs against the default Azure cloud environment. If you are installing the agent for use in the US government cloud do the following:
59
+
## Installing against US government cloud
60
+
61
+
By default, the Azure Active Directory (Azure AD) Connect provisioning agent installs against the default Azure cloud environment. If you're installing the agent for use in the US government, follow these steps:
107
62
108
-
- In step #7 above, instead of click **Open file**, go to start run and navigate to the **AADConnectProvisioningAgentSetup.exe** file. In the run box, after the executable, enter **ENVIRONMENTNAME=AzureUSGovernment** and click **Ok**.
109
-
[](media/how-to-install/new-install-12.png#lightbox)</br>
63
+
- In step #7 above, instead of select **Open file**, go to start run and navigate to the **AADConnectProvisioningAgentSetup.exe** file. In the run box, after the executable, enter **ENVIRONMENTNAME=AzureUSGovernment** and select **Ok**.
64
+
65
+
[](media/how-to-install/new-install-12.png#lightbox)
110
66
111
67
## Password hash synchronization and FIPS with cloud sync
68
+
112
69
If your server has been locked down according to Federal Information Processing Standard (FIPS), then MD5 is disabled.
113
70
114
-
**To enable MD5 for password hash synchronization, perform the following steps:**
71
+
72
+
To enable MD5 for password hash synchronization, perform the following steps:
115
73
116
74
1. Go to %programfiles%\Microsoft Azure AD Connect Provisioning Agent.
117
75
2. Open AADConnectProvisioningAgent.exe.config.
@@ -121,12 +79,12 @@ If your server has been locked down according to Federal Information Processing
121
79
122
80
For reference, this snippet is what it should look like:
123
81
124
-
```
125
-
<configuration>
126
-
<runtime>
127
-
<enforceFIPSPolicy enabled="false"/>
128
-
</runtime>
129
-
</configuration>
82
+
```xml
83
+
<configuration>
84
+
<runtime>
85
+
<enforceFIPSPolicyenabled="false"/>
86
+
</runtime>
87
+
</configuration>
130
88
```
131
89
132
90
For information about security and FIPS, see [Azure AD password hash sync, encryption, and FIPS compliance](https://blogs.technet.microsoft.com/enterprisemobility/2014/06/28/aad-password-sync-encryption-and-fips-compliance/).
0 commit comments