Skip to content

Commit f8b28db

Browse files
committed
Update migrate-from-federation-to-cloud-authentication.md
1 parent 00df589 commit f8b28db

File tree

1 file changed

+15
-15
lines changed

1 file changed

+15
-15
lines changed

articles/active-directory/hybrid/migrate-from-federation-to-cloud-authentication.md

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: hybrid
88
ms.topic: conceptual
9-
ms.date: 04/08/2022
9+
ms.date: 04/15/2022
1010

1111
ms.author: baselden
1212
author: BarbaraSelden
@@ -76,7 +76,7 @@ When technology projects fail, it’s typically because of mismatched expectatio
7676
7777
### Plan communications
7878
79-
After migrating to cloud authentication, the user sign in experience for accessing Microsoft 365 and other resources that are authenticated through Azure AD changes. Users who are outside the network see only the Azure AD sign in page.
79+
After migrating to cloud authentication, the user sign-in experience for accessing Microsoft 365 and other resources that are authenticated through Azure AD changes. Users who are outside the network see only the Azure AD sign-in page.
8080
8181
Proactively communicate with your users how their experience will change, when it will change, and how to gain support if they experience issues.
8282
@@ -107,13 +107,13 @@ Here are key migration considerations.
107107
108108
The onload.js file cannot be duplicated in Azure AD. If your AD FS instance is heavily customized and relies on specific customization settings in the onload.js file, verify if Azure AD can meet your current customization requirements and plan accordingly. Communicate these upcoming changes to your users.
109109
110-
#### Sign in experience
110+
#### Sign-in experience
111111
112-
You cannot customize Azure AD sign in experience. No matter how your users signed-in earlier, you need a fully qualified domain name such as User Principal Name (UPN) or email to sign into Azure AD.
112+
You cannot customize Azure AD sign-in experience. No matter how your users signed-in earlier, you need a fully qualified domain name such as User Principal Name (UPN) or email to sign into Azure AD.
113113
114114
#### Organization branding
115115
116-
You can [customize the Azure AD sign in page](../fundamentals/customize-branding.md). Some visual changes from AD FS on sign in pages should be expected after the conversion.
116+
You can [customize the Azure AD sign-in page](../fundamentals/customize-branding.md). Some visual changes from AD FS on sign-in pages should be expected after the conversion.
117117
118118
>[!NOTE]
119119
>Organization branding is not available in free Azure AD licenses unless you have a Microsoft 365 license.
@@ -167,7 +167,7 @@ For more information, see **[Migrate from Microsoft MFA Server to Azure Multi-fa
167167
168168
## Plan for implementation
169169

170-
This section includes pre-work before you switch your sign in method and convert the domains.
170+
This section includes pre-work before you switch your sign-in method and convert the domains.
171171

172172
### Create necessary groups for staged rollout
173173

@@ -189,11 +189,11 @@ The version of SSO that you use is dependent on your device OS and join state.
189189

190190
### Pre-work for PHS and PTA
191191

192-
Depending on the choice of sign in method, complete the [pre-work for PHS](how-to-connect-staged-rollout.md#pre-work-for-password-hash-sync) or [for PTA](how-to-connect-staged-rollout.md#pre-work-for-pass-through-authentication).
192+
Depending on the choice of sign-in method, complete the [pre-work for PHS](how-to-connect-staged-rollout.md#pre-work-for-password-hash-sync) or [for PTA](how-to-connect-staged-rollout.md#pre-work-for-pass-through-authentication).
193193

194194
## Implement your solution
195195

196-
Finally, you switch the sign in method to PHS or PTA, as planned and convert the domains from federation to cloud authentication.
196+
Finally, you switch the sign-in method to PHS or PTA, as planned and convert the domains from federation to cloud authentication.
197197

198198
### Using staged rollout
199199

@@ -240,7 +240,7 @@ Sign in to the [Azure AD portal](https://aad.portal.azure.com/), select **Azure
240240

241241
#### Option A
242242

243-
**Switch from federation to the new sign in method by using Azure AD Connect**
243+
**Switch from federation to the new sign-in method by using Azure AD Connect**
244244

245245
1. On your Azure AD Connect server, open **Azure AD Connect** and select **Configure**.
246246

@@ -265,7 +265,7 @@ Sign in to the [Azure AD portal](https://aad.portal.azure.com/), select **Azure
265265
Domain Administrator account credentials are required to enable seamless SSO. The process completes the following actions, which require these elevated permissions:
266266
- A computer account named AZUREADSSO (which represents Azure AD) is created in your on-premises Active Directory instance.
267267
- The computer account’s Kerberos decryption key is securely shared with Azure AD.
268-
- Two Kerberos service principal names (SPNs) are created to represent two URLs that are used during Azure AD sign in.
268+
- Two Kerberos service principal names (SPNs) are created to represent two URLs that are used during Azure AD sign-in.
269269

270270
The domain administrator credentials are not stored in Azure AD Connect or Azure AD and get discarded when the process successfully finishes. They are used to turn ON this feature.
271271

@@ -274,7 +274,7 @@ Sign in to the [Azure AD portal](https://aad.portal.azure.com/), select **Azure
274274
![Ready to configure page](media/deploy-cloud-user-authentication/ready-to-configure.png)
275275

276276
> [!IMPORTANT]
277-
> At this point, all your federated domains will change to managed authentication. Your selected User sign in method is the new method of authentication.
277+
> At this point, all your federated domains will change to managed authentication. Your selected User sign-in method is the new method of authentication.
278278
279279
1. In the Azure AD portal, select **Azure Active Directory**, and then select **Azure AD Connect**.
280280

@@ -309,7 +309,7 @@ For most customers, two or three authentication agents are sufficient to provide
309309

310310
#### Option B
311311

312-
**Switch from federation to the new sign in method by using Azure AD Connect and PowerShell**
312+
**Switch from federation to the new sign-in method by using Azure AD Connect and PowerShell**
313313

314314
*Available if you didn’t initially configure your federated domains by using Azure AD Connect or if you're using third-party federation services.*
315315

@@ -366,13 +366,13 @@ On your Azure AD Connect server, follow the steps 1- 5 in [Option A](#option-a).
366366
367367
Complete the following tasks to verify the sign-up method and to finish the conversion process.
368368
369-
### Test the new sign in method
369+
### Test the new sign-in method
370370
371-
When your tenant used federated identity, users were redirected from the Azure AD sign in page to your AD FS environment. Now that the tenant is configured to use the new sign in method instead of federated authentication, users aren’t redirected to AD FS.
371+
When your tenant used federated identity, users were redirected from the Azure AD sign-in page to your AD FS environment. Now that the tenant is configured to use the new sign-in method instead of federated authentication, users aren’t redirected to AD FS.
372372
373373
**Instead, users sign in directly on the Azure AD sign-in page.**
374374
375-
Follow the steps in this link - [Validate sign in with PHS/ PTA and seamless SSO](how-to-connect-staged-rollout.md#validation) (where required)
375+
Follow the steps in this link - [Validate sign-in with PHS/ PTA and seamless SSO](how-to-connect-staged-rollout.md#validation) (where required)
376376
377377
### Remove a user from staged rollout
378378

0 commit comments

Comments
 (0)