Skip to content

Commit 6c01e4f

Browse files
authored
Merge pull request MicrosoftDocs#97818 from MicrosoftDocs/master
12/04 AM Publish
2 parents 5aefc96 + feb1682 commit 6c01e4f

File tree

214 files changed

+2137
-547
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

214 files changed

+2137
-547
lines changed

articles/active-directory/authentication/howto-mfa-nps-extension-rdg.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -230,7 +230,7 @@ To ensure there is time to validate users’ credentials, perform two-step verif
230230

231231
### Verify Connection Request Policies
232232

233-
By default, when you configure the RD Gateway to use a central policy store for connection authorization policies, the RD Gateway is configured to forward CAP requests to the NPS server. The NPS server with the Azure MFA extension installed, processes the RADIUS access request. The following steps show you how to verify the default connection request policy.
233+
By default, when you configure the RD Gateway to use a central policy store for connection authorization policies, the RD Gateway is configured to forward CAP requests to the NPS server. The NPS server with the Azure MFA extension installed, processes the RADIUS access request. The following steps show you how to verify the default connection request policy.
234234

235235
1. On the RD Gateway, in the NPS (Local) console, expand **Policies**, and select **Connection Request Policies**.
236236
1. Double-click **TS GATEWAY AUTHORIZATION POLICY**.
@@ -241,6 +241,9 @@ By default, when you configure the RD Gateway to use a central policy store for
241241

242242
1. Click **Cancel**.
243243

244+
>[!NOTE]
245+
> For more information about creating a connection request policy see the article, [Configure connection request policies](https://docs.microsoft.com/windows-server/networking/technologies/nps/nps-crp-configure#add-a-connection-request-policy) documentation for the same.
246+
244247
## Configure NPS on the server where the NPS extension is installed
245248

246249
The NPS server where the NPS extension is installed needs to be able to exchange RADIUS messages with the NPS server on the Remote Desktop Gateway. To enable this message exchange, you need to configure the NPS components on the server where the NPS extension service is installed.

articles/active-directory/cloud-provisioning/tutorial-existing-forest.md

Lines changed: 12 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -48,22 +48,25 @@ In this scenario, there is an existing forest synced using Azure AD Connect sync
4848
- For certificate validation, unblock the following URLs: **mscrl.microsoft.com:80**, **crl.microsoft.com:80**, **ocsp.msocsp.com:80**, and **www\.microsoft.com:80**. Since these URLs are used for certificate validation with other Microsoft products you may already have these URLs unblocked.
4949

5050
## Install the Azure AD Connect provisioning agent
51-
1. Sign in to the server you will use with enterprise admin permissions. If you are using the [Basic AD and Azure environment](tutorial-basic-ad-azure.md) tutorial, it would be DC1.
52-
2. Download the Azure AD Connect provisioning agent [here](https://go.microsoft.com/fwlink/?linkid=2109037).
53-
3. Run the Azure AD Connect provisioning agent (AADConnectProvisioningAgent.Installer)
54-
3. On the splash screen, **Accept** the licensing terms and click **Install**.</br>
51+
1. Sign in to the domain joined server. If you are using the [Basic AD and Azure environment](tutorial-basic-ad-azure.md) tutorial, it would be DC1.
52+
2. Sign in to the Azure portal using cloud-only global admin credentials.
53+
3. On the left, select **Azure Active Directory**, click **Azure AD Connect** and in the center select **Manage provisioning (preview)**.</br>
54+
![Azure portal](media/how-to-install/install6.png)</br>
55+
4. Click on "Download agent"
56+
5. Run the Azure AD Connect provisioning agent
57+
6. On the splash screen, **Accept** the licensing terms and click **Install**.</br>
5558
![Welcome screen](media/how-to-install/install1.png)</br>
5659

57-
4. Once this operation completes, the configuration wizard will launch. Sign in with your Azure AD global administrator account. Note that if you have IE enhanced security enabled this will block the sign-in. If this is the case, close the installation, disable IE enhanced security in Server Manager, and click the **AAD Connect Provisioning Agent Wizard** to restart the installation.
58-
5. On the **Connect Active Directory** screen, click **Add directory** and then sign in with your Active Directory domain administrator account. NOTE: The domain administrator account should not have password change requirements. In case the password expires or changes, you will need to re-configure the agent with the new credentials. This operation will add your on-premises directory. Click **Next**.</br>
60+
7. Once this operation completes, the configuration wizard will launch. Sign in with your Azure AD global administrator account. Note that if you have IE enhanced security enabled this will block the sign-in. If this is the case, close the installation, disable IE enhanced security in Server Manager, and click the **AAD Connect Provisioning Agent Wizard** to restart the installation.
61+
8. On the **Connect Active Directory** screen, click **Add directory** and then sign in with your Active Directory domain administrator account. NOTE: The domain administrator account should not have password change requirements. In case the password expires or changes, you will need to re-configure the agent with the new credentials. This operation will add your on-premises directory. Click **Next**.</br>
5962
![Welcome screen](media/how-to-install/install3.png)</br>
6063

61-
6. On the **Configuration complete** screen, click **Confirm**. This operation will register and restart the agent.</br>
64+
9. On the **Configuration complete** screen, click **Confirm**. This operation will register and restart the agent.</br>
6265
![Welcome screen](media/how-to-install/install4.png)</br>
6366

64-
7. Once this operation completes you should see a notice: **Your agent configuration was successfully verified.** You can click **Exit**.</br>
67+
10. Once this operation completes you should see a notice: **Your agent configuration was successfully verified.** You can click **Exit**.</br>
6568
![Welcome screen](media/how-to-install/install5.png)</br>
66-
8. If you still see the initial splash screen, click **Close**.
69+
11. If you still see the initial splash screen, click **Close**.
6770

6871

6972
## Verify agent installation

articles/active-directory/cloud-provisioning/tutorial-pilot-aadc-aadccp.md

Lines changed: 12 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -128,37 +128,25 @@ Azure AD Connect sync synchronizes changes occurring in your on-premises directo
128128
3. Run `Start-ADSyncSyncCycle`. Hit Enter.
129129

130130
## Install the Azure AD Connect provisioning agent
131-
1. Sign in to the server you will use with enterprise admin permissions. If you are using the [Basic AD and Azure environment](tutorial-basic-ad-azure.md) tutorial it would be CP1.
132-
2. Download the Azure AD Connect cloud provisioning agent [here](https://go.microsoft.com/fwlink/?linkid=2109037).
133-
3. Run the Azure AD Connect cloud provisioning (AADConnectProvisioningAgent.Installer)
134-
3. On the splash screen, **Accept** the licensing terms and click **Install**.</br>
135-
![Welcome screen](media/how-to-install/install1.png)</br>
136-
137-
4. Once this operation completes, the configuration wizard will launch. Sign in with your Azure AD global administrator account.
138-
5. On the **Connect Active Directory** screen, click **Add directory** and then sign in with your Active Directory administrator account. This operation will add your on-premises directory. Click **Next**.</br>
139-
![Welcome screen](media/how-to-install/install3.png)</br>
140-
141-
6. On the **Configuration complete** screen, click **Confirm**. This operation will register and restart the agent.</br>
142-
![Welcome screen](media/how-to-install/install4.png)</br>
143-
144-
7. Once this operation completes you should see a notice **Your was successfully verified.** You can click **Exit**.</br>
145-
![Welcome screen](media/how-to-install/install5.png)</br>
146-
8. If you still see the initial splash screen, click **Close**.1. Sign in to the server you will use with enterprise admin permissions.
147-
2. Download the Azure AD Connect cloud provisioning agent [here](https://go.microsoft.com/fwlink/?linkid=2109037).
148-
3. Run the Azure AD Connect cloud provisioning (AADConnectProvisioningAgent.Installer)
149-
3. On the splash screen, **Accept** the licensing terms and click **Install**.</br>
131+
1. Sign in to the domain joined server. If you are using the [Basic AD and Azure environment](tutorial-basic-ad-azure.md) tutorial, it would be DC1.
132+
2. Sign in to the Azure portal using cloud-only global admin credentials.
133+
3. On the left, select **Azure Active Directory**, click **Azure AD Connect** and in the center select **Manage provisioning (preview)**.</br>
134+
![Azure portal](media/how-to-install/install6.png)</br>
135+
4. Click on "Download agent"
136+
5. Run the Azure AD Connect provisioning agent
137+
6. On the splash screen, **Accept** the licensing terms and click **Install**.</br>
150138
![Welcome screen](media/how-to-install/install1.png)</br>
151139

152-
4. Once this operation completes, the configuration wizard will launch. Sign in with your Azure AD global administrator account.
153-
5. On the **Connect Active Directory** screen, click **Add directory** and then sign in with your Active Directory administrator account. This operation will add your on-premises directory. Click **Next**.</br>
140+
7. Once this operation completes, the configuration wizard will launch. Sign in with your Azure AD global administrator account. Note that if you have IE enhanced security enabled this will block the sign-in. If this is the case, close the installation, disable IE enhanced security in Server Manager, and click the **AAD Connect Provisioning Agent Wizard** to restart the installation.
141+
8. On the **Connect Active Directory** screen, click **Add directory** and then sign in with your Active Directory domain administrator account. NOTE: The domain administrator account should not have password change requirements. In case the password expires or changes, you will need to re-configure the agent with the new credentials. This operation will add your on-premises directory. Click **Next**.</br>
154142
![Welcome screen](media/how-to-install/install3.png)</br>
155143

156-
6. On the **Configuration complete** screen, click **Confirm**. This operation will register and restart the agent.</br>
144+
9. On the **Configuration complete** screen, click **Confirm**. This operation will register and restart the agent.</br>
157145
![Welcome screen](media/how-to-install/install4.png)</br>
158146

159-
7. Once this operation completes you should see a notice **Your was successfully verified.** You can click **Exit**.</br>
147+
10. Once this operation completes you should see a notice: **Your agent configuration was successfully verified.** You can click **Exit**.</br>
160148
![Welcome screen](media/how-to-install/install5.png)</br>
161-
8. If you still see the initial splash screen, click **Close**.
149+
11. If you still see the initial splash screen, click **Close**.
162150

163151
## Verify agent installation
164152
Agent verification occurs in the Azure portal and on the local server that is running the agent.

articles/active-directory/cloud-provisioning/tutorial-single-forest.md

Lines changed: 20 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -46,23 +46,30 @@ You can use the environment you create in this tutorial for testing or for getti
4646
- For certificate validation, unblock the following URLs: **mscrl.microsoft.com:80**, **crl.microsoft.com:80**, **ocsp.msocsp.com:80**, and **www\.microsoft.com:80**. Since these URLs are used for certificate validation with other Microsoft products you may already have these URLs unblocked.
4747

4848
## Install the Azure AD Connect provisioning agent
49-
1. Sign in to the server you will use with enterprise admin permissions. If you are using the [Basic AD and Azure environment](tutorial-basic-ad-azure.md) tutorial, it would be DC1.
50-
2. Download the Azure AD Connect provisioning agent [here](https://go.microsoft.com/fwlink/?linkid=2109037).
51-
3. Run the Azure AD Connect provisioning agent (AADConnectProvisionin
52-
4. gAgent.Installer)
53-
3. On the splash screen, **Accept** the licensing terms and click **Install**.</br>
54-
![Welcome screen](media/how-to-install/install1.png)</br>
49+
1. Sign in to the domain joined server. If you are using the [Basic AD and Azure environment](tutorial-basic-ad-azure.md) tutorial, it would be DC1.
50+
2. Sign in to the Azure portal using cloud-only global admin credentials.
51+
3. On the left, select **Azure Active Directory**, click **Azure AD Connect**, and in the center select **Manage provisioning (preview)**.
5552

56-
4. Once this operation completes, the configuration wizard will launch. Sign in with your Azure AD global administrator account. Note that if you have IE enhanced security enabled this will block the sign-in. If this is the case, close the installation, disable IE enhanced security in Server Manager, and click the **AAD Connect Provisioning Agent Wizard** to restart the installation.
57-
5. On the **Connect Active Directory** screen, click **Add directory** and then sign in with your Active Directory domain administrator account. NOTE: The domain administrator account should not have password change requirements. In case the password expires or changes, you will need to re-configure the agent with the new credentials. This operation will add your on-premises directory. Click **Next**.</br>
58-
![Welcome screen](media/how-to-install/install3.png)</br>
53+
![Azure portal](media/how-to-install/install6.png)
5954

60-
6. On the **Configuration complete** screen, click **Confirm**. This operation will register and restart the agent.</br>
61-
![Welcome screen](media/how-to-install/install4.png)</br>
55+
4. Click **Download agent**.
56+
5. Run the Azure AD Connect provisioning agent.
57+
6. On the splash screen, **Accept** the licensing terms and click **Install**.
6258

63-
7. Once this operation completes you should see a notice: **Your agent configuration was successfully verified.** You can click **Exit**.</br>
59+
![Welcome screen](media/how-to-install/install1.png)
60+
61+
7. Once this operation completes, the configuration wizard will launch. Sign in with your Azure AD global administrator account. Note that if you have IE enhanced security enabled this will block the sign-in. If this is the case, close the installation, disable IE enhanced security in Server Manager, and click the **AAD Connect Provisioning Agent Wizard** to restart the installation.
62+
8. On the **Connect Active Directory** screen, click **Add directory** and then sign in with your Active Directory domain administrator account. NOTE: The domain administrator account should not have password change requirements. In case the password expires or changes, you will need to re-configure the agent with the new credentials. This operation will add your on-premises directory. Click **Next**.
63+
64+
![Welcome screen](media/how-to-install/install3.png)
65+
66+
9. On the **Configuration complete** screen, click **Confirm**. This operation will register and restart the agent.
67+
68+
![Welcome screen](media/how-to-install/install4.png)
69+
70+
10. Once this operation completes you should see a notice: **Your agent configuration was successfully verified.** You can click **Exit**.</br>
6471
![Welcome screen](media/how-to-install/install5.png)</br>
65-
8. If you still see the initial splash screen, click **Close**.
72+
11. If you still see the initial splash screen, click **Close**.
6673

6774

6875
## Verify agent installation

articles/active-directory/hybrid/how-to-connect-password-hash-synchronization.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -122,13 +122,14 @@ To support temporary passwords in Azure AD for synchronized users, you can enabl
122122

123123
`Set-ADSyncAADCompanyFeature  -ForcePasswordResetOnLogonFeature $true`
124124

125-
Caveat: Forcing a user to change their password on next logon requires a password change at the same time. AD Connect will not pick up the force password change flag by itself, it is supplemental to the detected password change that occurs during password hash sync.
125+
> [!NOTE]
126+
> Forcing a user to change their password on next logon requires a password change at the same time. AD Connect will not pick up the force password change flag by itself; it is supplemental to the detected password change that occurs during password hash sync.
126127
127128
> [!CAUTION]
128129
> If you do not enable Self-service Password Reset (SSPR) in Azure AD users will have a confusing experience when they reset their password in Azure AD and then attempt to sign in in Active Directory with the new password, as the new password isn’t valid in Active Directory. You should only use this feature when SSPR and Password Writeback is enabled on the tenant.
129130
130131
> [!NOTE]
131-
> This feature is in Public Preview right now.
132+
> This feature is in public preview right now.
132133
133134
#### Account expiration
134135

0 commit comments

Comments
 (0)