|
| 1 | +--- |
| 2 | +author: billmath |
| 3 | +ms.service: active-directory |
| 4 | +ms.subservice: cloud-provisioning |
| 5 | +ms.topic: include |
| 6 | +ms.date: 10/16/2019 |
| 7 | +ms.author: billmath |
| 8 | +# Used by articles that require an SSO workaround. |
| 9 | +--- |
| 10 | + |
| 11 | +## Steps to enable Single Sign-on |
| 12 | +Cloud provisioning works with Single Sign-on. Currently their is not an option to enable SSO when the agent is installed, however you can use the steps below to enable SSO and use it. |
| 13 | + |
| 14 | +### Step 1: Import the Seamless SSO PowerShell module |
| 15 | + |
| 16 | +1. First, download, and install [Azure AD PowerShell](https://docs.microsoft.com/powershell/azure/active-directory/overview). |
| 17 | +2. Browse to the `%programfiles%\Microsoft Azure Active Directory Connect` folder. |
| 18 | +3. Import the Seamless SSO PowerShell module by using this command: `Import-Module .\AzureADSSO.psd1`. |
| 19 | + |
| 20 | +### Step 2: Get the list of Active Directory forests on which Seamless SSO has been enabled |
| 21 | + |
| 22 | +1. Run PowerShell as an administrator. In PowerShell, call `New-AzureADSSOAuthenticationContext`. When prompted, enter your tenant's global administrator credentials. |
| 23 | +2. Call `Get-AzureADSSOStatus`. This command provides you with the list of Active Directory forests (look at the "Domains" list) on which this feature has been enabled. |
| 24 | + |
| 25 | +### Step 3: Disable Seamless SSO for each Active Directory forest where you've set up the feature |
| 26 | + |
| 27 | +1. Call `$creds = Get-Credential`. When prompted, enter the domain administrator credentials for the intended Active Directory forest. |
| 28 | + |
| 29 | + > [!NOTE] |
| 30 | + >The domain administrator credentials username must be entered in the SAM account name format (contoso\johndoe or contoso.com\johndoe). We use the domain portion of the username to locate the Domain Controller of the Domain Administrator using DNS. |
| 31 | +
|
| 32 | + >[!NOTE] |
| 33 | + >The domain administrator account used must not be a member of the Protected Users group. If so, the operation will fail. |
| 34 | +
|
| 35 | +2. Call `Disable-AzureADSSOForest -OnPremCredentials $creds`. This command removes the `AZUREADSSOACC` computer account from the on-premises domain controller for this specific Active Directory forest. |
| 36 | +3. Repeat the preceding steps for each Active Directory forest where you’ve set up the feature. |
| 37 | + |
| 38 | +### Step 4: Enable Seamless SSO for each Active Directory forest |
| 39 | + |
| 40 | +1. Call `Enable-AzureADSSOForest`. When prompted, enter the domain administrator credentials for the intended Active Directory forest. |
| 41 | + |
| 42 | + > [!NOTE] |
| 43 | + >The domain administrator credentials username must be entered in the SAM account name format (contoso\johndoe or contoso.com\johndoe). We use the domain portion of the username to locate the Domain Controller of the Domain Administrator using DNS. |
| 44 | +
|
| 45 | + >[!NOTE] |
| 46 | + >The domain administrator account used must not be a member of the Protected Users group. If so, the operation will fail. |
| 47 | +
|
| 48 | +2. Repeat the preceding step for each Active Directory forest where you want to set up the feature. |
| 49 | + |
| 50 | +### Step 5. Enable the feature on your tenant |
| 51 | + |
| 52 | +To turn on the feature on your tenant, call `Enable-AzureADSSO -Enable $true`. |
0 commit comments