You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-mfa-mfasettings.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,7 +33,7 @@ Some of these settings apply to MFA Server, Azure MFA, or both.
33
33
|[Block/unblock users](#block-and-unblock-users)| Used to block specific users from being able to receive Multi-Factor Authentication requests. Any authentication attempts for blocked users are automatically denied. Users remain blocked for 90 days from the time that they are blocked. |
34
34
|[Fraud alert](#fraud-alert)| Configure settings related to users ability to report fraudulent verification requests |
35
35
|[Notifications](#notifications)| Enable notifications of events from MFA Server. |
36
-
|[OATH tokens](concept-authentication-methods.md#oath-hardware-tokens-public-preview)| Used in cloud-based Azure MFA environments to manage OATH tokens for users. |
36
+
|[OATH tokens](concept-authentication-methods.md#oath-hardware-tokens)| Used in cloud-based Azure MFA environments to manage OATH tokens for users. |
37
37
|[Phone call settings](#phone-call-settings)| Configure settings related to phone calls and greetings for cloud and on-premises environments. |
38
38
| Providers | This will show any existing authentication providers that you may have associated with your account. New authentication providers may not be created as of September 1, 2018 |
title: 'Azure AD Connect: Hybrid identity considerations for Azure Government'
3
-
description: Special considerations for deploying Azure AD Connect with the government cloud.
2
+
title: 'Azure AD Connect: Hybrid identity considerations for Azure Government cloud'
3
+
description: Special considerations for deploying Azure AD Connect with the Azure Government cloud.
4
4
services: active-directory
5
5
author: billmath
6
6
manager: daveba
@@ -13,68 +13,89 @@ ms.author: billmath
13
13
ms.collection: M365-identity-device-management
14
14
---
15
15
16
-
# Hybrid identity considerations for Azure Government
17
-
The following document describes the considerations for implementing a hybrid environment with the Azure Government cloud. This information is provided as reference for administrators and architects who are working with the Azure Government cloud.
18
-
> [!NOTE]
19
-
> In order to integrate an on-premises AD environment with the Azure Governemnt cloud, you need to upgrade to the latest release of [Azure AD Connect](https://www.microsoft.com/download/details.aspx?id=47594).
16
+
# Hybrid identity considerations for the Azure Government cloud
20
17
21
-
> [!NOTE]
22
-
> For a full list of U.S. Government DoD Endpoints, refer to the [documentation](https://docs.microsoft.com/office365/enterprise/office-365-u-s-government-dod-endpoints)
18
+
This article describes considerations for integrating a hybrid environment with the Microsoft Azure Government cloud. This information is provided as a reference for administrators and architects who work with the Azure Government cloud.
23
19
24
-
## Pass-Through Authentication
25
-
The following information is provided for implementation of pass-through authentication (PTA) and the Azure Government cloud.
20
+
> [!NOTE]
21
+
> To integrate an on-premises Microsoft Azure Active Directory (Azure AD) environment with the Azure Government cloud, you need to upgrade to the latest release of [Azure AD Connect](https://www.microsoft.com/download/details.aspx?id=47594).
22
+
23
+
For a full list of United States government Department of Defense endpoints, refer to the [documentation](https://docs.microsoft.com/office365/enterprise/office-365-u-s-government-dod-endpoints).
24
+
25
+
## Azure AD Pass-through Authentication
26
+
27
+
The following information describes implementation of Pass-through Authentication and the Azure Government cloud.
28
+
29
+
### Allow access to URLs
30
+
31
+
Before you deploy the Pass-through Authentication agent, verify whether a firewall exists between your servers and Azure AD. If your firewall or proxy allows Domain Name System (DNS) blocked or safe programs, add the following connections.
26
32
27
-
### Allow access to URLs
28
-
Before deploying the pass-through authentication agent, verify if there is a firewall between your servers and Azure AD. If your firewall or proxy allows DNS whitelisting, add the following connections:
29
33
> [!NOTE]
30
-
> The following guidance also applies to installing the [Application Proxy connector](https://aka.ms/whyappproxy) for Azure Government environments.
34
+
> The following guidance also applies to installing the [Azure AD Application Proxy connector](https://aka.ms/whyappproxy) for Azure Government environments.
31
35
32
36
|URL |How it's used|
33
-
|-----|-----|
34
-
|*.msappproxy.us *.servicebus.usgovcloudapi.net|Communication between the agent and the Azure AD cloud service |
35
-
|mscrl.microsoft.us:80 crl.microsoft.us:80 </br>ocsp.msocsp.us:80 www.microsoft.us:80| The agent uses these URLs to verify certificates.|
36
-
|login.windows.us secure.aadcdn.microsoftonline-p.com *.microsoftonline.us </br>*.microsoftonline-p.us </br>*.msauth.net </br>*.msauthimages.net </br>*.msecnd.net</br>*.msftauth.net </br>*.msftauthimages.net</br>*.phonefactor.net </br>enterpriseregistration.windows.net</br>management.azure.com </br>policykeyservice.dc.ad.msft.net</br>ctdl.windowsupdate.us:80| The agent uses these URLs during the registration process.|
37
-
38
-
### Install the agent for the Azure Government cloud
39
-
In order to install the agent for the Azure Government cloud, you must follow these specific steps:
40
-
In the command line terminal, navigate to folder where the executable for installing the agent is located.
41
-
Run the following command which specifies the installation is for Azure Government.
Set up your Azure AD Connect server: If you use Pass-through Authentication as your sign-in method, no additional prerequisite check is required. If you use password hash synchronization as your sign-in method, and if there is a firewall between Azure AD Connect and Azure AD, ensure that:
55
-
- You use version 1.1.644.0 or later of Azure AD Connect.
56
-
- If your firewall or proxy allows DNS whitelisting, add the connections to the *.msapproxy.us URLs over port 443. If not, allow access to the Azure datacenter IP ranges, which are updated weekly. This prerequisite is applicable only when you enable the feature. It is not required for actual user sign-ins.
57
-
58
-
### Rolling out seamless SSO
59
-
You can gradually roll out Seamless SSO to your users using the instructions provided below. You start by adding the following Azure AD URL to all or selected users' Intranet zone settings by using Group Policy in Active Directory:
60
-
https://autologon.microsoft.us
61
-
62
-
In addition, you need to enable an Intranet zone policy setting called Allow updates to status bar via script through Group Policy.
63
-
Browser considerations
64
-
Mozilla Firefox (all platforms)
65
-
Mozilla Firefox doesn't automatically use Kerberos authentication. Each user must manually add the Azure AD URL to their Firefox settings by using the following steps:
66
-
1. Run Firefox and enter about:config in the address bar. Dismiss any notifications that you see.
67
-
2. Search for the network.negotiate-auth.trusted-uris preference. This preference lists Firefox's trusted sites for Kerberos authentication.
68
-
3. Right-click and select Modify.
69
-
4. Enter https://autologon.microsoft.us in the field.
70
-
5. Select OK and then reopen the browser.
71
-
72
-
### Microsoft Edge based on Chromium (all platforms)
73
-
If you have overridden the `AuthNegotiateDelegateAllowlist` or the `AuthServerAllowlist` policy settings in your environment, ensure that you add Azure AD's URL (https://autologon.microsoft.us) to them as well.
74
-
75
-
### Google Chrome (all platforms)
76
-
If you have overridden the `AuthNegotiateDelegateWhitelist` or the `AuthServerWhitelist` policy settings in your environment, ensure that you add Azure AD's URL (https://autologon.microsoft.us) to them as well.
37
+
|-----|-----|
38
+
|*.msappproxy.us</br>*.servicebus.usgovcloudapi.net|The agent uses these URLs to communicate with the Azure AD cloud service. |
39
+
|mscrl.microsoft.us:80 </br>crl.microsoft.us:80 </br>ocsp.msocsp.us:80 </br>www.microsoft.us:80| The agent uses these URLs to verify certificates.|
40
+
|login.windows.us </br>secure.aadcdn.microsoftonline-p.com </br>*.microsoftonline.us </br>*.microsoftonline-p.us </br>*.msauth.net </br>*.msauthimages.net </br>*.msecnd.net</br>*.msftauth.net </br>*.msftauthimages.net</br>*.phonefactor.net </br>enterpriseregistration.windows.net</br>management.azure.com </br>policykeyservice.dc.ad.msft.net</br>ctdl.windowsupdate.us:80| The agent uses these URLs during the registration process.
41
+
42
+
### Install the agent for the Azure Government cloud
43
+
44
+
Follow these steps to install the agent for the Azure Government cloud:
45
+
46
+
1. In the command-line terminal, go to the folder that contains the executable file that installs the agent.
47
+
1. Run the following commands, which specify that the installation is for Azure Government.
If you use Pass-through Authentication as your sign-on method, no additional prerequisite check is required. If you use password hash synchronization as your sign-on method and there is a firewall between Azure AD Connect and Azure AD, ensure that:
66
+
67
+
- You use Azure AD Connect version 1.1.644.0 or later.
68
+
- If your firewall or proxy allows DNS blocked or safe programs, add the connections to the *.msappproxy.us URLs over port 443.
69
+
70
+
If not, allow access to the Azure datacenter IP ranges, which are updated weekly. This prerequisite applies only when you enable the feature. It isn't required for actual user sign-ons.
71
+
72
+
### Roll out Seamless Single Sign-On
73
+
74
+
You can gradually roll out Azure AD Seamless Single Sign-On to your users by using the following instructions. You start by adding the Azure AD URL [https://autologon.microsoft.us](https://autologon.microsoft.us) to all or selected users' Intranet zone settings by using Group Policy in Active Directory.
75
+
76
+
You also need to enable the intranet zone policy setting **Allow updates to status bar via script through Group Policy**.
77
+
78
+
## Browser considerations
79
+
80
+
### Mozilla Firefox (all platforms)
81
+
82
+
Mozilla Firefox doesn't automatically use Kerberos authentication. Each user must manually add the Azure AD URL to their Firefox settings by following these steps:
83
+
84
+
1. Run Firefox and enter **about:config** in the address bar. Dismiss any notifications that you might see.
85
+
1. Search for the **network.negotiate-auth.trusted-uris** preference. This preference lists the sites trusted by Firefox for Kerberos authentication.
86
+
1. Right-click the preference name and then select **Modify**.
87
+
1. Enter [**https://autologon.microsoft.us**](https://autologon.microsoft.us**) in the box.
88
+
1. Select **OK** and then reopen the browser.
89
+
90
+
### Microsoft Edge based on Chromium (all platforms)
91
+
92
+
If you have overridden the `AuthNegotiateDelegateAllowlist` or `AuthServerAllowlist` policy settings in your environment, ensure that you add the Azure AD URL [https://autologon.microsoft.us](https://autologon.microsoft.us) to them.
93
+
94
+
### Google Chrome (all platforms)
95
+
96
+
If you have overridden the `AuthNegotiateDelegateWhitelist` or `AuthServerWhitelist` policy settings in your environment, ensure that you add the Azure AD URL [https://autologon.microsoft.us](https://autologon.microsoft.us) to them.
Copy file name to clipboardExpand all lines: articles/aks/configure-azure-cni.md
+5-2Lines changed: 5 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -63,7 +63,9 @@ The maximum number of pods per node in an AKS cluster is 250. The *default* maxi
63
63
64
64
### Configure maximum - new clusters
65
65
66
-
You're able to configure the maximum number of pods per node *only at cluster deployment time*. If you deploy with the Azure CLI or with a Resource Manager template, you can set the maximum pods per node value as high as 250.
66
+
You're able to configure the maximum number of pods per node at cluster deployment time or as you add new node pools. If you deploy with the Azure CLI or with a Resource Manager template, you can set the maximum pods per node value as high as 250.
67
+
68
+
If you don't specify maxPods when creating new node pools, you receive a default value of 30 for Azure CNI.
67
69
68
70
A minimum value for maximum pods per node is enforced to guarantee space for system pods critical to cluster health. The minimum value that can be set for maximum pods per node is 10 if and only if the configuration of each node pool has space for a minimum of 30 pods. For example, setting the maximum pods per node to the minimum of 10 requires each individual node pool to have a minimum of 3 nodes. This requirement applies for each new node pool created as well, so if 10 is defined as maximum pods per node each subsequent node pool added must have at least 3 nodes.
69
71
@@ -81,7 +83,7 @@ A minimum value for maximum pods per node is enforced to guarantee space for sys
81
83
82
84
### Configure maximum - existing clusters
83
85
84
-
You can't change the maximum pods per node on an existing AKS cluster. You can adjust the number only when you initially deploy the cluster.
86
+
The maxPod per node setting can be defined when you create a new node pool. If you need to increase the maxPod per node setting on an existing cluster, add a new node pool with the new desired maxPod count. After migrating your pods to the new pool, delete the older pool. To delete any older pool in a cluster, ensure you are setting node pool modes as defined in the [system node pool document[system-node-pools].
85
87
86
88
## Deployment parameters
87
89
@@ -208,3 +210,4 @@ Kubernetes clusters created with AKS Engine support both the [kubenet][kubenet]
Copy file name to clipboardExpand all lines: articles/aks/configure-kubenet.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.reviewer: nieberts, jomore
12
12
13
13
By default, AKS clusters use [kubenet][kubenet], and an Azure virtual network and subnet are created for you. With *kubenet*, nodes get an IP address from the Azure virtual network subnet. Pods receive an IP address from a logically different address space to the Azure virtual network subnet of the nodes. Network address translation (NAT) is then configured so that the pods can reach resources on the Azure virtual network. The source IP address of the traffic is NAT'd to the node's primary IP address. This approach greatly reduces the number of IP addresses that you need to reserve in your network space for pods to use.
14
14
15
-
With [Azure Container Networking Interface (CNI)][cni-networking], every pod gets an IP address from the subnet and can be accessed directly. These IP addresses must be unique across your network space, and must be planned in advance. Each node has a configuration parameter for the maximum number of pods that it supports. The equivalent number of IP addresses per node are then reserved up front for that node. This approach requires more planning, and often leads to IP address exhaustion or the need to rebuild clusters in a larger subnet as your application demands grow.
15
+
With [Azure Container Networking Interface (CNI)][cni-networking], every pod gets an IP address from the subnet and can be accessed directly. These IP addresses must be unique across your network space, and must be planned in advance. Each node has a configuration parameter for the maximum number of pods that it supports. The equivalent number of IP addresses per node are then reserved up front for that node. This approach requires more planning, and often leads to IP address exhaustion or the need to rebuild clusters in a larger subnet as your application demands grow. You can configure the maximum pods deployable to a node at cluster create time or when creating new node pools. If you don't specify maxPods when creating new node pools, you receive a default value of 110 for kubenet.
16
16
17
17
This article shows you how to use *kubenet* networking to create and use a virtual network subnet for an AKS cluster. For more information on network options and considerations, see [Network concepts for Kubernetes and AKS][aks-network-concepts].
Copy file name to clipboardExpand all lines: articles/aks/use-system-pools.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -46,6 +46,7 @@ You can do the following operations with node pools:
46
46
* Delete user node pools.
47
47
* You can delete system node pools, provided you have another system node pool to take its place in the AKS cluster.
48
48
* An AKS cluster may have multiple system node pools and requires at least one system node pool.
49
+
* If you want to change various immutable settings on existing node pools, you can create new node pools to replace them. One example is to add a new node pool with a new maxPods setting and delete the old node pool.
49
50
50
51
## Create a new AKS cluster with a system node pool
0 commit comments