Skip to content

Commit fa11722

Browse files
authored
Merge pull request #217899 from yoelhor/patch-313
[AzureAD] Updates according to the UI
2 parents b344f3d + 9d0686f commit fa11722

File tree

5 files changed

+91
-50
lines changed

5 files changed

+91
-50
lines changed
20.9 KB
Loading
94.9 KB
Loading
-78.3 KB
Loading
67.3 KB
Loading

articles/active-directory/cloud-sync/tutorial-single-forest.md

Lines changed: 91 additions & 50 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: amycolannino
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: tutorial
10-
ms.date: 12/05/2019
10+
ms.date: 11/10/2022
1111
ms.subservice: hybrid
1212
ms.author: billmath
1313
ms.collection: M365-identity-device-management
@@ -17,21 +17,22 @@ ms.collection: M365-identity-device-management
1717

1818
This tutorial walks you through creating a hybrid identity environment using Azure Active Directory (Azure AD) Connect cloud sync.
1919

20-
![Create](media/tutorial-single-forest/diagram-2.png)
20+
![Diagram that shows the Azure AD Connect cloud sync flow](media/tutorial-single-forest/diagram-2.png)
2121

2222
You can use the environment you create in this tutorial for testing or for getting more familiar with cloud sync.
2323

2424
## Prerequisites
25+
2526
### In the Azure Active Directory admin center
2627

2728
1. Create a cloud-only global administrator account on your Azure AD tenant. This way, you can manage the configuration of your tenant should your on-premises services fail or become unavailable. Learn about [adding a cloud-only global administrator account](../fundamentals/add-users-azure-active-directory.md). Completing this step is critical to ensure that you don't get locked out of your tenant.
2829
2. Add one or more [custom domain names](../fundamentals/add-custom-domain.md) to your Azure AD tenant. Your users can sign in with one of these domain names.
2930

3031
### In your on-premises environment
3132

32-
1. Identify a domain-joined host server running Windows Server 2016 or greater with minimum of 4 GB RAM and .NET 4.7.1+ runtime
33+
1. Identify a domain-joined host server running Windows Server 2016 or greater with minimum of 4-GB RAM and .NET 4.7.1+ runtime
3334

34-
2. If there is a firewall between your servers and Azure AD, configure the following items:
35+
2. If there's a firewall between your servers and Azure AD, configure the following items:
3536
- Ensure that agents can make *outbound* requests to Azure AD over the following ports:
3637

3738
| Port number | How it's used |
@@ -43,91 +44,131 @@ You can use the environment you create in this tutorial for testing or for getti
4344
If your firewall enforces rules according to the originating users, open these ports for traffic from Windows services that run as a network service.
4445
- If your firewall or proxy allows you to specify safe suffixes, then add connections t to **\*.msappproxy.net** and **\*.servicebus.windows.net**. If not, allow access to the [Azure datacenter IP ranges](https://www.microsoft.com/download/details.aspx?id=41653), which are updated weekly.
4546
- Your agents need access to **login.windows.net** and **login.microsoftonline.com** for initial registration. Open your firewall for those URLs as well.
46-
- For certificate validation, unblock the following URLs: **mscrl.microsoft.com:80**, **crl.microsoft.com:80**, **ocsp.msocsp.com:80**, and **www\.microsoft.com:80**. Since these URLs are used for certificate validation with other Microsoft products you may already have these URLs unblocked.
47+
- For certificate validation, unblock the following URLs: **mscrl.microsoft.com:80**, **crl.microsoft.com:80**, **ocsp.msocsp.com:80**, and **www\.microsoft.com:80**. Since these URLs are used for certificate validation with other Microsoft products, you may already have these URLs unblocked.
4748

4849
## Install the Azure AD Connect provisioning agent
49-
1. Sign in to the domain joined server. If you are using the [Basic A D and Azure environment](tutorial-basic-ad-azure.md) tutorial, it would be DC1.
50-
2. Sign in to the Azure portal using cloud-only global admin credentials.
51-
3. On the left, select **Azure Active Directory**, click **Azure AD Connect**, and in the center select **Manage cloud sync**.
5250

53-
![Azure portal](media/how-to-install/install-6.png)
51+
1. Sign in to the domain joined server. If you're using the [Basic AD and Azure environment](tutorial-basic-ad-azure.md) tutorial, it would be DC1.
52+
53+
1. Sign in to the Azure portal using cloud-only global admin credentials.
54+
55+
1. On the left, select **Azure Active Directory**.
56+
57+
1. Select **Azure AD Connect**, and in the center select **Manage Azure AD cloud sync**.
58+
59+
![Screenshot that shows how to download the Azure AD cloud sync.](media/how-to-install/install-6.png)
60+
61+
1. Select **Download agent**, and select **Accept terms & download**.
62+
63+
[![Screenshot that shows how to accept the terms and start the download of Azure AD cloud sync.](media/how-to-install/install-6a.png)](media/how-to-install/install-6a.png#lightbox)
64+
65+
1. Run the **Azure AD Connect Provisioning Agent Package** AADConnectProvisioningAgentSetup.exe in your downloads folder.
66+
67+
1. On the splash screen, select **I agree to the license and conditions**, and select **Install**.
5468

55-
4. Click **Download agent**.
56-
5. Run the Azure AD Connect provisioning agent.
57-
6. On the splash screen, **Accept** the licensing terms and click **Install**.
69+
![Screenshot that shows the "Microsoft Azure AD Connect Provisioning Agent Package" splash screen.](media/how-to-install/install-1.png)
5870

59-
![Screenshot that shows the "Microsoft Azure A D Connect Provisioning Agent Package" splash screen.](media/how-to-install/install-1.png)
71+
1. Once this operation completes, the configuration wizard will launch. Sign in with your Azure AD global administrator account. If you have Internet Explorer enhanced security enabled, it will block the sign-in. If so, close the installation, [disable Internet Explorer enhanced security](/troubleshoot/developer/browsers/security-privacy/enhanced-security-configuration-faq), and restart the **Azure AD Connect Provisioning Agent Package** installation.
6072

61-
7. Once this operation completes, the configuration wizard will launch. Sign in with your Azure AD global administrator account. Note that if you have IE enhanced security enabled this will block the sign-in. If this is the case, close the installation, disable IE enhanced security in Server Manager, and click the **AAD Connect Provisioning Agent Wizard** to restart the installation.
62-
8. On the **Connect Active Directory** screen, click **Add directory** and then sign in with your Active Directory domain administrator account. NOTE: The domain administrator account should not have password change requirements. If the password expires or changes, you will need to re-configure the agent with the new credentials. This operation will add your on-premises directory. Click **Next**.
73+
1. On the **Connect Active Directory** screen, select **Authenticate** and then sign in with your Active Directory domain administrator account. NOTE: The domain administrator account shouldn't have password change requirements. If the password expires or changes, you'll need to reconfigure the agent with the new credentials.
6374

64-
![Screenshot of the "Connect Active Directory" screen.](media/how-to-install/install-3a.png)
75+
![Screenshot of the "Connect Active Directory" screen.](media/how-to-install/install-3.png)
6576

66-
9. On the **Configuration complete** screen, click **Confirm**. This operation will register and restart the agent.
77+
1. On the **Configure Service Account screen**, select **Create gMSA** and enter the Active Directory domain administrator credentials to create the group Managed Service Account. This account will be used to run the agent service. To continue, select **Next**.
78+
79+
[![Screenshot that shows create service account.](media/how-to-install/new-install-7.png)](media/how-to-install/new-install-7.png#lightbox)
80+
81+
1. On the **Connect Active Directory** screen, select **Next**. Your current domain has been added automatically.
82+
83+
[![Screenshot that shows connecting to the Active Directory.](media/how-to-install/new-install-8.png)](media/how-to-install/new-install-8.png#lightbox)
84+
85+
1. On the **Configuration complete** screen, select **Confirm**. This operation will register and restart the agent.
6786

6887
![Screenshot that shows the "Configuration complete" screen.](media/how-to-install/install-4a.png)
6988

70-
10. Once this operation completes you should see a notice: **Your agent configuration was successfully verified.** You can click **Exit**.</br>
71-
![Welcome screen](media/how-to-install/install-5.png)</br>
72-
11. If you still see the initial splash screen, click **Close**.
89+
1. Once this operation completes, you should see a notice: **Your agent configuration was successfully verified.** You can select **Exit**.
90+
91+
![Screenshot that shows the "configuration complete" screen.](media/how-to-install/install-5.png)
92+
93+
1. If you still get the initial splash screen, select **Close**.
7394

7495

7596
## Verify agent installation
97+
7698
Agent verification occurs in the Azure portal and on the local server that is running the agent.
7799

78100
### Azure portal agent verification
79-
To verify the agent is being seen by Azure follow these steps:
101+
102+
To verify the agent is being registered by Azure AD, follow these steps:
80103

81104
1. Sign in to the Azure portal.
82-
2. On the left, select **Azure Active Directory**, click **Azure AD Connect** and in the center select **Manage cloud sync**.</br>
83-
![Azure portal](media/how-to-install/install-6.png)</br>
105+
1. On the left, select **Azure Active Directory**, select **Azure AD Connect** and in the center select **Manage Azure AD cloud sync**.
84106

85-
3. On the **Azure AD Connect cloud sync** screen click **Review all agents**.
86-
![Azure A D Provisioning](media/how-to-install/install-7.png)</br>
107+
![Screenshot that shows how to manage the Azure AD could sync.](media/how-to-install/install-6.png)
108+
109+
1. On the **Azure AD Connect cloud sync** screen, select
110+
**Review all agents**.
111+
112+
[![Screenshot that shows the Azure AD provisioning agents.](media/how-to-install/install-7.png)](media/how-to-install/install-7.png#lightbox)
87113

88-
4. On the **On-premises provisioning agents screen** you will see the agents you have installed. Verify that the agent in question is there and is marked **active**.
89-
![Provisioning agents](media/how-to-install/verify-1.png)</br>
114+
1. On the **On-premises provisioning agents screen**, you'll see the agents you've installed. Verify that the agent in question is there and is marked **active**.
115+
116+
[![Screenshot that shows the status of a provisioning agent.](media/how-to-install/verify-1.png)](media/how-to-install/verify-1.png#lightbox)
90117

91118
### On the local server
92-
To verify that the agent is running follow these steps:
93119

94-
1. Log on to the server with an administrator account
95-
2. Open **Services** by either navigating to it or by going to Start/Run/Services.msc.
96-
3. Under **Services**, make sure **Microsoft Azure AD Connect Agent Updater** and **Microsoft Azure AD Connect Provisioning Agent** are present and the status is **Running**.
97-
![Services](media/how-to-install/troubleshoot-1.png)
120+
To verify that the agent is running, follow these steps:
121+
122+
1. Log on to the server with an administrator account
123+
124+
1. Open **Services** by either navigating to it or by going to Start/Run/Services.msc.
125+
126+
1. Under **Services**, make sure **Microsoft Azure AD Connect Agent Updater** and **Microsoft Azure AD Connect Provisioning Agent** are present and the status is **Running**.
127+
128+
[![Screenshot that shows the Windows services.](media/how-to-install/troubleshoot-1.png)](media/how-to-install/troubleshoot-1.png#lightbox)
98129

99130
## Configure Azure AD Connect cloud sync
100-
Use the following steps to configure provisioning
101-
102-
1. Sign in to the Azure AD portal.
103-
2. Click **Azure Active Directory**
104-
3. Click **Azure AD Connect**
105-
4. Select **Manage cloud sync**
106-
![Screenshot showing "Manage cloud sync" link.](media/how-to-configure/manage-1.png)
107-
5. Click **New Configuration**
108-
![Screenshot of Azure A D Connect cloud sync screen with "New configuration" link highlighted.](media/tutorial-single-forest/configure-1.png)
109-
7. On the configuration screen, enter a **Notification email**, move the selector to **Enable** and click **Save**.
110-
![Screenshot of Configure screen with Notification email filled in and Enable selected.](media/how-to-configure/configure-2.png)
111-
1. The configuration status should now be **Healthy**.
112-
![Screenshot of Azure A D Connect cloud sync screen showing Healthy status.](media/how-to-configure/manage-4.png)
131+
132+
Use the following steps to configure and start the provisioning:
133+
134+
1. Sign in to the Azure AD portal.
135+
1. Select **Azure Active Directory**
136+
1. Select **Azure AD Connect**
137+
1. Select **Manage cloud sync**
138+
139+
![Screenshot showing "Manage cloud sync" link.](media/how-to-configure/manage-1.png)
140+
141+
1. Select **New Configuration**
142+
143+
[![Screenshot of Azure AD Connect cloud sync screen with "New configuration" link highlighted.](media/tutorial-single-forest/configure-1.png)](media/tutorial-single-forest/configure-1.png#lightbox)
144+
145+
1. On the configuration screen, enter a **Notification email**, move the selector to **Enable** and select **Save**.
146+
147+
[![Screenshot of Configure screen with Notification email filled in and Enable selected.](media/how-to-configure/configure-2.png)](media/how-to-configure/configure-2.png#lightbox)
148+
149+
1. The configuration status should now be **Healthy**.
150+
151+
[![Screenshot of Azure AD Connect cloud sync screen showing Healthy status.](media/how-to-configure/manage-4.png)](media/how-to-configure/manage-4.png#lightbox)
113152

114153
## Verify users are created and synchronization is occurring
115-
You will now verify that the users that you had in your on-premises directory have been synchronized and now exist in your Azure AD tenant. Be aware that this may take a few hours to complete. To verify users are synchronized do the following.
154+
155+
You'll now verify that the users that you had in your on-premises directory have been synchronized and now exist in your Azure AD tenant. The sync operation may take a few hours to complete. To verify users are synchronized, follow these steps:
116156

117157

118158
1. Browse to the [Azure portal](https://portal.azure.com) and sign in with an account that has an Azure subscription.
119159
2. On the left, select **Azure Active Directory**
120160
3. Under **Manage**, select **Users**.
121-
4. Verify that you see the new users in your tenant</br>
161+
4. Verify that the new users appear in your tenant
122162

123163
## Test signing in with one of your users
124164

125165
1. Browse to [https://myapps.microsoft.com](https://myapps.microsoft.com)
126-
2. Sign in with a user account that was created in your tenant. You will need to sign in using the following format: ([email protected]). Use the same password that the user uses to sign in on-premises.</br>
127-
![Verify](media/tutorial-single-forest/verify-1.png)</br>
128166

129-
You have now successfully configured a hybrid identity environment using Azure AD Connect cloud sync.
167+
1. Sign in with a user account that was created in your tenant. You'll need to sign in using the following format: ([email protected]). Use the same password that the user uses to sign in on-premises.
168+
169+
![Screenshot that shows the my apps portal with a signed in users.](media/tutorial-single-forest/verify-1.png)
130170

171+
You've now successfully configured a hybrid identity environment using Azure AD Connect cloud sync.
131172

132173
## Next steps
133174

0 commit comments

Comments
 (0)