You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/hybrid/migrate-from-federation-to-cloud-authentication.md
+15-15Lines changed: 15 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: hybrid
8
8
ms.topic: conceptual
9
-
ms.date: 04/08/2022
9
+
ms.date: 04/15/2022
10
10
11
11
ms.author: baselden
12
12
author: BarbaraSelden
@@ -76,7 +76,7 @@ When technology projects fail, it’s typically because of mismatched expectatio
76
76
77
77
### Plan communications
78
78
79
-
After migrating to cloud authentication, the user signin experience for accessing Microsoft 365 and other resources that are authenticated through Azure AD changes. Users who are outside the network see only the Azure AD signin page.
79
+
After migrating to cloud authentication, the user sign-in experience for accessing Microsoft 365 and other resources that are authenticated through Azure AD changes. Users who are outside the network see only the Azure AD sign-in page.
80
80
81
81
Proactively communicate with your users how their experience will change, when it will change, and how to gain support if they experience issues.
82
82
@@ -107,13 +107,13 @@ Here are key migration considerations.
107
107
108
108
The onload.js file cannot be duplicated in Azure AD. If your AD FS instance is heavily customized and relies on specific customization settings in the onload.js file, verify if Azure AD can meet your current customization requirements and plan accordingly. Communicate these upcoming changes to your users.
109
109
110
-
#### Signin experience
110
+
#### Sign-in experience
111
111
112
-
You cannot customize Azure AD signin experience. No matter how your users signed-in earlier, you need a fully qualified domain name such as User Principal Name (UPN) or email to sign into Azure AD.
112
+
You cannot customize Azure AD sign-in experience. No matter how your users signed-in earlier, you need a fully qualified domain name such as User Principal Name (UPN) or email to sign into Azure AD.
113
113
114
114
#### Organization branding
115
115
116
-
You can [customize the Azure AD signin page](../fundamentals/customize-branding.md). Some visual changes from AD FS on signin pages should be expected after the conversion.
116
+
You can [customize the Azure AD sign-in page](../fundamentals/customize-branding.md). Some visual changes from AD FS on sign-in pages should be expected after the conversion.
117
117
118
118
>[!NOTE]
119
119
>Organization branding is not available in free Azure AD licenses unless you have a Microsoft 365 license.
@@ -167,7 +167,7 @@ For more information, see **[Migrate from Microsoft MFA Server to Azure Multi-fa
167
167
168
168
## Plan for implementation
169
169
170
-
This section includes pre-work before you switch your signin method and convert the domains.
170
+
This section includes pre-work before you switch your sign-in method and convert the domains.
171
171
172
172
### Create necessary groups for staged rollout
173
173
@@ -189,11 +189,11 @@ The version of SSO that you use is dependent on your device OS and join state.
189
189
190
190
### Pre-work for PHS and PTA
191
191
192
-
Depending on the choice of signin method, complete the [pre-work for PHS](how-to-connect-staged-rollout.md#pre-work-for-password-hash-sync) or [for PTA](how-to-connect-staged-rollout.md#pre-work-for-pass-through-authentication).
192
+
Depending on the choice of sign-in method, complete the [pre-work for PHS](how-to-connect-staged-rollout.md#pre-work-for-password-hash-sync) or [for PTA](how-to-connect-staged-rollout.md#pre-work-for-pass-through-authentication).
193
193
194
194
## Implement your solution
195
195
196
-
Finally, you switch the signin method to PHS or PTA, as planned and convert the domains from federation to cloud authentication.
196
+
Finally, you switch the sign-in method to PHS or PTA, as planned and convert the domains from federation to cloud authentication.
197
197
198
198
### Using staged rollout
199
199
@@ -240,7 +240,7 @@ Sign in to the [Azure AD portal](https://aad.portal.azure.com/), select **Azure
240
240
241
241
#### Option A
242
242
243
-
**Switch from federation to the new signin method by using Azure AD Connect**
243
+
**Switch from federation to the new sign-in method by using Azure AD Connect**
244
244
245
245
1. On your Azure AD Connect server, open **Azure AD Connect** and select **Configure**.
246
246
@@ -265,7 +265,7 @@ Sign in to the [Azure AD portal](https://aad.portal.azure.com/), select **Azure
265
265
Domain Administrator account credentials are required to enable seamless SSO. The process completes the following actions, which require these elevated permissions:
266
266
- A computer account named AZUREADSSO (which represents Azure AD) is created in your on-premises Active Directory instance.
267
267
- The computer account’s Kerberos decryption key is securely shared with Azure AD.
268
-
- Two Kerberos service principal names (SPNs) are created to represent two URLs that are used during Azure AD signin.
268
+
- Two Kerberos service principal names (SPNs) are created to represent two URLs that are used during Azure AD sign-in.
269
269
270
270
The domain administrator credentials are not stored in Azure AD Connect or Azure AD and get discarded when the process successfully finishes. They are used to turn ON this feature.
271
271
@@ -274,7 +274,7 @@ Sign in to the [Azure AD portal](https://aad.portal.azure.com/), select **Azure
274
274

275
275
276
276
> [!IMPORTANT]
277
-
> At this point, all your federated domains will change to managed authentication. Your selected User signin method is the new method of authentication.
277
+
> At this point, all your federated domains will change to managed authentication. Your selected User sign-in method is the new method of authentication.
278
278
279
279
1. In the Azure AD portal, select **Azure Active Directory**, and then select **Azure AD Connect**.
280
280
@@ -309,7 +309,7 @@ For most customers, two or three authentication agents are sufficient to provide
309
309
310
310
#### Option B
311
311
312
-
**Switch from federation to the new signin method by using Azure AD Connect and PowerShell**
312
+
**Switch from federation to the new sign-in method by using Azure AD Connect and PowerShell**
313
313
314
314
*Available if you didn’t initially configure your federated domains by using Azure AD Connect or if you're using third-party federation services.*
315
315
@@ -366,13 +366,13 @@ On your Azure AD Connect server, follow the steps 1- 5 in [Option A](#option-a).
366
366
367
367
Complete the following tasks to verify the sign-up method and to finish the conversion process.
368
368
369
-
### Test the new signin method
369
+
### Test the new sign-in method
370
370
371
-
When your tenant used federated identity, users were redirected from the Azure AD signin page to your AD FS environment. Now that the tenant is configured to use the new signin method instead of federated authentication, users aren’t redirected to AD FS.
371
+
When your tenant used federated identity, users were redirected from the Azure AD sign-in page to your AD FS environment. Now that the tenant is configured to use the new sign-in method instead of federated authentication, users aren’t redirected to AD FS.
372
372
373
373
**Instead, users sign in directly on the Azure AD sign-in page.**
374
374
375
-
Follow the steps in this link - [Validate signin with PHS/ PTA and seamless SSO](how-to-connect-staged-rollout.md#validation) (where required)
375
+
Follow the steps in this link - [Validate sign-in with PHS/ PTA and seamless SSO](how-to-connect-staged-rollout.md#validation) (where required)
0 commit comments