Skip to content

Commit 59b53b6

Browse files
authored
Merge pull request MicrosoftDocs#2573 from Microsoft/FromPublicRepo
From public repo
2 parents f598535 + 2d41357 commit 59b53b6

File tree

6 files changed

+49
-41
lines changed

6 files changed

+49
-41
lines changed

articles/active-directory-b2c/active-directory-b2c-reference-ui-customization-helper-tool.md

Lines changed: 0 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -61,14 +61,6 @@ If you would like to use Azure Blob Storage to host your page content, you can c
6161
6. Provide a **Name** for the container (for example, "b2c") and select **Blob** as the **Access type**. Click **OK**.
6262
7. The container that you created will appear in the list on the **Blobs** blade. Write down the URL of the container; for example, it should look similar to `https://contoso.blob.core.windows.net/b2c`. Close the **Blobs** blade.
6363
8. On the storage account blade, click **Keys** and write down the values of the **Storage Account Name** and **Primary Access Key** fields.
64-
9. Sign in to the [Azure portal](https://portal.azure.com/).
65-
10. Click **+ New** > **Data + Storage** > **Storage account**. You will need an Azure subscription to create an Azure Blob Storage account. You can sign up a free trial at the [Azure website](https://azure.microsoft.com/pricing/free-trial/).
66-
11. Select **Blob Storage** under **Account Kind**, and leave the other values as default. You can edit the Resource Group & Location if you wish. Click **Create**.
67-
12. Go back to the Startboard and click the storage account that you just created.
68-
13. In the **Summary** section, click **+Container**.
69-
14. Provide a **Name** for the container (for example, "b2c") and select **Blob** as the **Access type**. Click **OK**.
70-
15. Open the container **properties**, and Write down the URL of the container; for example, it should look similar to `https://contoso.blob.core.windows.net/b2c`. Close the container blade.
71-
16. On the storage account blade, click on the **Key Icon** and write down the values of the **Storage Account Name** and **Primary Access Key** fields.
7264

7365
> [!NOTE]
7466
> **Primary Access Key** is an important security credential.

articles/active-directory/active-directory-aadconnect-sso.md

Lines changed: 23 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -18,25 +18,25 @@ ms.author: billmath
1818
---
1919

2020
# What is Single Sign On (SSO) (preview)
21-
Single sign on is an option that can be enabled in Azure Active Directory Connect with either [password hash synchronization](active-directory-aadconnectsync-implement-password-synchronization.md) or [pass-through authentication](active-directory-aadconnect-pass-through-authentication.md). When enabled, users need not type their password to sign in to Azure Active Directory (Azure AD) or other cloud services when they are on their corporate machines and connected on the corporate network.
21+
Single sign on is an option that can be enabled in Azure Active Directory Connect with either [Password hash synchronization](active-directory-aadconnectsync-implement-password-synchronization.md) or [Pass-through authentication](active-directory-aadconnect-pass-through-authentication.md). When enabled, users need not type their password to sign in to Azure Active Directory (Azure AD) or other cloud services when they are on their corporate machines and connected on the corporate network.
2222

2323
By enabling single sign-on, when your users access resources connected to Azure Active Directory services (such as Office 365, Microsoft Intune, CRM Online, and SaaS services), user don’t need to type their password but instead use a Kerberos ticket acquired automatically from your on-premises Active Directory.
2424

2525
![Single sign-on](./media/active-directory-aadconnect-sso/sso1.png)
2626

2727
By providing your end users with SSO, access to cloud based services is more familiar and provides the organization with a secure and simple process that doesn’t require any additional on-premises components.
2828

29-
SSO is a feature that is enabled through AAD Connect and works with password hash sync or pass-through authentication and your on-premises Active Directory. For your end users to use single sign on in your environment, you need to ensure that users are:
29+
SSO is a feature that is enabled through AAD Connect and works with Password hash sync or Pass-through authentication and your on-premises Active Directory. For your end users to use single sign on in your environment, you need to ensure that users are:
3030

3131

3232
- On a domain joined machine
3333
- Have a direct connection to a domain controller, for example on the corporate wired or wireless network or via a remote access connection such as a VPN connection.
34-
- Define the Kerberos end-points in the cloud as part of the intranet zone.
34+
- Define the Kerberos end-points in the cloud as part of the Intranet zone.
3535

36-
If any of the above items are missing, for example the machine is off the corporate network, Active Directory is not available then the user will simply be prompted to enter their password as they would without single sign on.
36+
If any of the above items are missing, such as the machine is off the corporate network and Active Directory is not available, then the user will simply be prompted to enter their password as they would without single sign on.
3737

3838
## Supported Clients
39-
Single sign on is supported via web browser based clients and Office clients that support modern authentication, on machines that are capable of Kerberos authentication such as (Windows desktops). The matrix below provides details of the browser based clients on various operating systems.
39+
Single sign on is supported via web browser based clients and Office clients that support modern authentication on machines that are capable of Kerberos authentication, such as Windows. The matrix below provides details of the browser based clients on various operating systems.
4040

4141
| OS\Browser |Internet Explorer|Chrome|Firefox|Edge
4242
| --- | --- |--- | --- |--- |
@@ -49,43 +49,43 @@ Single sign on is supported via web browser based clients and Office clients tha
4949
*Requires separate configuration.
5050

5151
>[!NOTE]
52-
>For Windows 10 based clients the recommendation is to use [Azure AD join](active-directory-azureadjoin-overview.md) for the best experience with Azure AD.
52+
>For Windows 10 based clients, the recommendation is to use [Azure AD join](active-directory-azureadjoin-overview.md) for the best experience with Azure AD.
5353
5454
## How single sign on works
5555

56-
When you enable single sign on in Azure AD Connect, a computer account named AZUREADSSOACCT is created in the on-premises Active Directory and the Kerberos key decryption key is shared with Azure AD. In addition, two Kerberos service principal names (SPNs) are created to represent the cloud URLs that are used in communications with the client.
56+
When you enable single sign on in Azure AD Connect, a computer account named AZUREADSSOACCT is created in the on-premises Active Directory and the Kerberos decryption key is shared securely with Azure AD. In addition, two Kerberos service principal names (SPNs) are created to represent the cloud URLs that are used during authentication between the client and Azure AD.
5757

58-
Once this setup is complete, the process of authentication is the same as any other Integrated Windows Authentication (IWA) based application. If you are familiar with how IWA works, then you already know how single sign on works with Azure AD. If you’re not familiar, the process for IWA is as follows.
58+
Once this setup is complete, the process of authentication is the same as any other Integrated Windows Authentication (IWA) based application. If you are familiar with how IWA works, then you already know how single sign on works with Azure AD. If you’re not familiar, the process for IWA is as follows:
5959

6060
![Single sign-on](./media/active-directory-aadconnect-sso/sso2.png)
6161

62-
First the user attempts to access a resource. A resource and be either a machine or a URL. In the case of Azure AD, it is URL for a service such as SharePoint online, described below as the “Azure AD resource”.
62+
First the user attempts to access a resource. A resource can be either a machine or a URL. In the case of Azure AD, it is a URL for a service, such as SharePoint online, described below as the “Azure AD resource”.
6363

64-
1. The Azure AD resource challenges the client, via a 401, to provide a Kerberos ticket.
64+
1. The Azure AD resource challenges the client, via a 401 Unauthorized response, to provide a Kerberos ticket.
6565
2. The client requests a ticket from Active Directory for the Azure AD resource.
66-
3. Active Directory locates the machine account associated with the Azure AD resource and returns a Kerberos ticket to the client, encrypted with the machines secret. The ticket includes the identity of the user currently signed into the computer.
66+
3. Active Directory locates the machine account associated with the Azure AD resource and returns a Kerberos ticket to the client, encrypted with the machine account's secret. The ticket includes the identity of the user currently signed in to the computer.
6767
4. The client sends the Kerberos ticket it acquired from Active Directory to the Azure AD.
68+
5. Azure AD decrypts the Kerberos ticket using the previously shared key, and then either returns a token to the user or asks the user to provide additional proofs such as multi-factor authentication as required by the resource.
6869

69-
Azure AD decrypts the Kerberos ticket using the previously shared key, and then either returns a token to the user or asks the user to provide additional proofs such as multi-factor authentication as required by the resource.
70-
Single sign on is an opportunistic feature, meaning that should if fail for some reason the user simply need only enter their password in the login page.
70+
Single sign on is an opportunistic feature, which means that if it fails for some reason, the user simply need only enter their password on the login page as usual.
7171

72-
## Enabling SSO with PTA or PHS
73-
Azure AD Connect provides a simple process to enable single sign on with pass-through authentication or Password hash sync. You will need to ensure that you have domain administrator rights to one of the domains within each forest you synchronize allow the configuration of the Kerberos service principal names (SPNs) on the machine account. The username and password are not stored in Azure AD Connect or Azure AD and are used only for this operation.
72+
## Enabling SSO with Pass-through Authentication or Password Hash Sync
73+
Azure AD Connect provides a simple process to enable single sign on with Pass-through authentication or Password hash sync. You will need to ensure that you have domain administrator rights to one of the domains within each forest you synchronize to allow the configuration of the Kerberos service principal names (SPNs) on the machine account. The username and password are not stored in Azure AD Connect or Azure AD and are used only for this operation.
7474

75-
When installing Azure AD Connect select a custom installation so that you are able to configure single sign on, on the user sign-in page. For more details, see [Custom installation of Azure AD Connect](connect\active-directory-aadconnect-get-started-custom.md).
75+
When installing Azure AD Connect select a custom installation so that you are able to configure single sign on on the user sign-in page. For more details, see [Custom installation of Azure AD Connect](connect\active-directory-aadconnect-get-started-custom.md).
7676

7777
![Single sign-on](./media/active-directory-aadconnect-sso/sso3.png)
7878

79-
Once single sign on is enabled you can continue through the wizard until you get to the Single sign on page.
79+
Once single sign on is enabled, you can continue through the wizard until you get to the Single sign on page.
8080

8181
![Single sign-on](./media/active-directory-aadconnect-sso/sso4.png)
8282

83-
For each forest listed provide the appropriate account details and single sign on will be enabled for your Azure directory.
83+
For each forest listed, provide the appropriate account details and single sign on will be enabled for your Azure directory.
8484

8585
## Ensuring Clients sign-in automatically
86-
By default, browsers do not attempt to send credentials to web servers unless the URL is defined as being in the intranet zone. Generally, the browser can calculate the right zone by looking at the URL. For example if the URL is http://intranet/ the browser will automatically send credentials as it will map the URL to the intranet zone. However, if the URL contains a period for example http://intranet.contoso.com/ the server will not automatically send credentials and will treat the URL as it would any internet site.
86+
By default, browsers do not attempt to send credentials to web servers unless the URL is defined as being in the Intranet zone. Generally, the browser can calculate the right zone by looking at the URL. For example if the URL is http://intranet/ the browser will automatically send credentials as it will map the URL to the intranet zone. However, if the URL contains a period for example http://intranet.contoso.com/ the server will not automatically send credentials and will treat the URL as it would any internet site.
8787

88-
Because the URLs used for single sign on in Azure AD contain a period, they need to be the intranet zone, so that the browser will automatically send the currently logged in users credential in the form of a Kerberos ticket to Azure AD. The easiest way to add the required URLs to the intranet zone is to simply create a group policy in Active Directory.
88+
Because the URLs used for single sign on in Azure AD contain a period because they are globally routable hostnames, they need to be explicitly added to the machine's Intranet zone, so that the browser will automatically send the currently logged in user's credentials in the form of a Kerberos ticket to Azure AD. The easiest way to add the required URLs to the Intranet zone is to simply create a group policy in Active Directory.
8989

9090
1. Open the Group Policy Management tools
9191
2. Edit the Group policy that will be applied to all users. For example, the Default Domain Policy.
@@ -100,7 +100,7 @@ Because the URLs used for single sign on in Azure AD contain a period, they need
100100
5. It should look similar to the following:
101101
![Single sign-on](./media/active-directory-aadconnect-sso/sso7.png)
102102

103-
6. Click Ok and Ok again.
103+
6. Click OK and OK again.
104104

105105
Your users are now ready for single sign on.
106106

@@ -114,9 +114,9 @@ It is important to make sure the client is correctly configured for single sign
114114
2. Ensure the workstation is joined to the domain.
115115
3. Ensure the user is logged on with a domain account.
116116
4. Ensure the machine is connected to the corporate network
117-
5. Ensure that the machines time is synchronized with the active directory and the domain controllers time is within 5 minutes of the correct time.
117+
5. Ensure that the machine's time is synchronized with the Active Directory and the domain controllers time is within 5 minutes of the correct time.
118118

119-
If you have been able to confirm the above requirements you can review the console logs of the browser for additional information. The console logs can be found under developer tools. This will help you determine the potential problem.
119+
If you have been able to confirm the above requirements, you can review the console logs of the browser for additional information. The console logs can be found under developer tools. This will help you determine the potential problem.
120120

121121
## Event log entries
122122
Every time a user logs in with single sign on an entry is recorded in the event log of the domain controller, if success auditing is enabled. To find these events, you can review the Event logs for the security Event 4769 associated with computer account AzureADSSOAcc$. The filter below finds all security events associated with the computer account:

0 commit comments

Comments
 (0)