Skip to content

Commit f728353

Browse files
authored
Merge pull request MicrosoftDocs#112335 from billmath/pta2
adding important note
2 parents 07e4781 + c6c88ea commit f728353

File tree

1 file changed

+3
-0
lines changed

1 file changed

+3
-0
lines changed

articles/active-directory/hybrid/how-to-connect-pta-quick-start.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -33,6 +33,9 @@ Follow these instructions to deploy Pass-through Authentication on your tenant:
3333

3434
Ensure that the following prerequisites are in place.
3535

36+
>[!IMPORTANT]
37+
>From a security standpoint, administrators should treat the server running the PTA agent as if it were a domain controller. The PTA agent servers should be hardened along the same lines as outlined in [Securing Domain Controllers Against Attack](https://docs.microsoft.com/windows-server/identity/ad-ds/plan/security-best-practices/securing-domain-controllers-against-attack)
38+
3639
### In the Azure Active Directory admin center
3740

3841
1. Create a cloud-only global administrator account on your Azure AD tenant. This way, you can manage the configuration of your tenant should your on-premises services fail or become unavailable. Learn about [adding a cloud-only global administrator account](../active-directory-users-create-azure-portal.md). Completing this step is critical to ensure that you don't get locked out of your tenant.

0 commit comments

Comments
 (0)