You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/active-directory-b2c-reference-ui-customization-helper-tool.md
-8Lines changed: 0 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -61,14 +61,6 @@ If you would like to use Azure Blob Storage to host your page content, you can c
61
61
6. Provide a **Name** for the container (for example, "b2c") and select **Blob** as the **Access type**. Click **OK**.
62
62
7. The container that you created will appear in the list on the **Blobs** blade. Write down the URL of the container; for example, it should look similar to `https://contoso.blob.core.windows.net/b2c`. Close the **Blobs** blade.
63
63
8. On the storage account blade, click **Keys** and write down the values of the **Storage Account Name** and **Primary Access Key** fields.
64
-
9. Sign in to the [Azure portal](https://portal.azure.com/).
65
-
10. Click **+ New** > **Data + Storage** > **Storage account**. You will need an Azure subscription to create an Azure Blob Storage account. You can sign up a free trial at the [Azure website](https://azure.microsoft.com/pricing/free-trial/).
66
-
11. Select **Blob Storage** under **Account Kind**, and leave the other values as default. You can edit the Resource Group & Location if you wish. Click **Create**.
67
-
12. Go back to the Startboard and click the storage account that you just created.
68
-
13. In the **Summary** section, click **+Container**.
69
-
14. Provide a **Name** for the container (for example, "b2c") and select **Blob** as the **Access type**. Click **OK**.
70
-
15. Open the container **properties**, and Write down the URL of the container; for example, it should look similar to `https://contoso.blob.core.windows.net/b2c`. Close the container blade.
71
-
16. On the storage account blade, click on the **Key Icon** and write down the values of the **Storage Account Name** and **Primary Access Key** fields.
72
64
73
65
> [!NOTE]
74
66
> **Primary Access Key** is an important security credential.
Copy file name to clipboardExpand all lines: articles/active-directory/active-directory-aadconnect-sso.md
+23-23Lines changed: 23 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,25 +18,25 @@ ms.author: billmath
18
18
---
19
19
20
20
# What is Single Sign On (SSO) (preview)
21
-
Single sign on is an option that can be enabled in Azure Active Directory Connect with either [password hash synchronization](active-directory-aadconnectsync-implement-password-synchronization.md) or [pass-through authentication](active-directory-aadconnect-pass-through-authentication.md). When enabled, users need not type their password to sign in to Azure Active Directory (Azure AD) or other cloud services when they are on their corporate machines and connected on the corporate network.
21
+
Single sign on is an option that can be enabled in Azure Active Directory Connect with either [Password hash synchronization](active-directory-aadconnectsync-implement-password-synchronization.md) or [Pass-through authentication](active-directory-aadconnect-pass-through-authentication.md). When enabled, users need not type their password to sign in to Azure Active Directory (Azure AD) or other cloud services when they are on their corporate machines and connected on the corporate network.
22
22
23
23
By enabling single sign-on, when your users access resources connected to Azure Active Directory services (such as Office 365, Microsoft Intune, CRM Online, and SaaS services), user don’t need to type their password but instead use a Kerberos ticket acquired automatically from your on-premises Active Directory.
By providing your end users with SSO, access to cloud based services is more familiar and provides the organization with a secure and simple process that doesn’t require any additional on-premises components.
28
28
29
-
SSO is a feature that is enabled through AAD Connect and works with password hash sync or pass-through authentication and your on-premises Active Directory. For your end users to use single sign on in your environment, you need to ensure that users are:
29
+
SSO is a feature that is enabled through AAD Connect and works with Password hash sync or Pass-through authentication and your on-premises Active Directory. For your end users to use single sign on in your environment, you need to ensure that users are:
30
30
31
31
32
32
- On a domain joined machine
33
33
- Have a direct connection to a domain controller, for example on the corporate wired or wireless network or via a remote access connection such as a VPN connection.
34
-
- Define the Kerberos end-points in the cloud as part of the intranet zone.
34
+
- Define the Kerberos end-points in the cloud as part of the Intranet zone.
35
35
36
-
If any of the above items are missing, for example the machine is off the corporate network, Active Directory is not available then the user will simply be prompted to enter their password as they would without single sign on.
36
+
If any of the above items are missing, such as the machine is off the corporate network and Active Directory is not available, then the user will simply be prompted to enter their password as they would without single sign on.
37
37
38
38
## Supported Clients
39
-
Single sign on is supported via web browser based clients and Office clients that support modern authentication, on machines that are capable of Kerberos authentication such as (Windows desktops). The matrix below provides details of the browser based clients on various operating systems.
39
+
Single sign on is supported via web browser based clients and Office clients that support modern authentication on machines that are capable of Kerberos authentication, such as Windows. The matrix below provides details of the browser based clients on various operating systems.
@@ -49,43 +49,43 @@ Single sign on is supported via web browser based clients and Office clients tha
49
49
*Requires separate configuration.
50
50
51
51
>[!NOTE]
52
-
>For Windows 10 based clients the recommendation is to use [Azure AD join](active-directory-azureadjoin-overview.md) for the best experience with Azure AD.
52
+
>For Windows 10 based clients, the recommendation is to use [Azure AD join](active-directory-azureadjoin-overview.md) for the best experience with Azure AD.
53
53
54
54
## How single sign on works
55
55
56
-
When you enable single sign on in Azure AD Connect, a computer account named AZUREADSSOACCT is created in the on-premises Active Directory and the Kerberos key decryption key is shared with Azure AD. In addition, two Kerberos service principal names (SPNs) are created to represent the cloud URLs that are used in communications with the client.
56
+
When you enable single sign on in Azure AD Connect, a computer account named AZUREADSSOACCT is created in the on-premises Active Directory and the Kerberos decryption key is shared securely with Azure AD. In addition, two Kerberos service principal names (SPNs) are created to represent the cloud URLs that are used during authentication between the client and Azure AD.
57
57
58
-
Once this setup is complete, the process of authentication is the same as any other Integrated Windows Authentication (IWA) based application. If you are familiar with how IWA works, then you already know how single sign on works with Azure AD. If you’re not familiar, the process for IWA is as follows.
58
+
Once this setup is complete, the process of authentication is the same as any other Integrated Windows Authentication (IWA) based application. If you are familiar with how IWA works, then you already know how single sign on works with Azure AD. If you’re not familiar, the process for IWA is as follows:
First the user attempts to access a resource. A resource and be either a machine or a URL. In the case of Azure AD, it is URL for a service such as SharePoint online, described below as the “Azure AD resource”.
62
+
First the user attempts to access a resource. A resource can be either a machine or a URL. In the case of Azure AD, it is a URL for a service, such as SharePoint online, described below as the “Azure AD resource”.
63
63
64
-
1. The Azure AD resource challenges the client, via a 401, to provide a Kerberos ticket.
64
+
1. The Azure AD resource challenges the client, via a 401 Unauthorized response, to provide a Kerberos ticket.
65
65
2. The client requests a ticket from Active Directory for the Azure AD resource.
66
-
3. Active Directory locates the machine account associated with the Azure AD resource and returns a Kerberos ticket to the client, encrypted with the machines secret. The ticket includes the identity of the user currently signed into the computer.
66
+
3. Active Directory locates the machine account associated with the Azure AD resource and returns a Kerberos ticket to the client, encrypted with the machine account's secret. The ticket includes the identity of the user currently signed in to the computer.
67
67
4. The client sends the Kerberos ticket it acquired from Active Directory to the Azure AD.
68
+
5. Azure AD decrypts the Kerberos ticket using the previously shared key, and then either returns a token to the user or asks the user to provide additional proofs such as multi-factor authentication as required by the resource.
68
69
69
-
Azure AD decrypts the Kerberos ticket using the previously shared key, and then either returns a token to the user or asks the user to provide additional proofs such as multi-factor authentication as required by the resource.
70
-
Single sign on is an opportunistic feature, meaning that should if fail for some reason the user simply need only enter their password in the login page.
70
+
Single sign on is an opportunistic feature, which means that if it fails for some reason, the user simply need only enter their password on the login page as usual.
71
71
72
-
## Enabling SSO with PTA or PHS
73
-
Azure AD Connect provides a simple process to enable single sign on with pass-through authentication or Password hash sync. You will need to ensure that you have domain administrator rights to one of the domains within each forest you synchronize allow the configuration of the Kerberos service principal names (SPNs) on the machine account. The username and password are not stored in Azure AD Connect or Azure AD and are used only for this operation.
72
+
## Enabling SSO with Pass-through Authentication or Password Hash Sync
73
+
Azure AD Connect provides a simple process to enable single sign on with Pass-through authentication or Password hash sync. You will need to ensure that you have domain administrator rights to one of the domains within each forest you synchronize to allow the configuration of the Kerberos service principal names (SPNs) on the machine account. The username and password are not stored in Azure AD Connect or Azure AD and are used only for this operation.
74
74
75
-
When installing Azure AD Connect select a custom installation so that you are able to configure single sign on, on the user sign-in page. For more details, see [Custom installation of Azure AD Connect](connect\active-directory-aadconnect-get-started-custom.md).
75
+
When installing Azure AD Connect select a custom installation so that you are able to configure single sign on on the user sign-in page. For more details, see [Custom installation of Azure AD Connect](connect\active-directory-aadconnect-get-started-custom.md).
For each forest listed provide the appropriate account details and single sign on will be enabled for your Azure directory.
83
+
For each forest listed, provide the appropriate account details and single sign on will be enabled for your Azure directory.
84
84
85
85
## Ensuring Clients sign-in automatically
86
-
By default, browsers do not attempt to send credentials to web servers unless the URL is defined as being in the intranet zone. Generally, the browser can calculate the right zone by looking at the URL. For example if the URL is http://intranet/ the browser will automatically send credentials as it will map the URL to the intranet zone. However, if the URL contains a period for example http://intranet.contoso.com/ the server will not automatically send credentials and will treat the URL as it would any internet site.
86
+
By default, browsers do not attempt to send credentials to web servers unless the URL is defined as being in the Intranet zone. Generally, the browser can calculate the right zone by looking at the URL. For example if the URL is http://intranet/ the browser will automatically send credentials as it will map the URL to the intranet zone. However, if the URL contains a period for example http://intranet.contoso.com/ the server will not automatically send credentials and will treat the URL as it would any internet site.
87
87
88
-
Because the URLs used for single sign on in Azure AD contain a period, they need to be the intranet zone, so that the browser will automatically send the currently logged in users credential in the form of a Kerberos ticket to Azure AD. The easiest way to add the required URLs to the intranet zone is to simply create a group policy in Active Directory.
88
+
Because the URLs used for single sign on in Azure AD contain a period because they are globally routable hostnames, they need to be explicitly added to the machine's Intranet zone, so that the browser will automatically send the currently logged in user's credentials in the form of a Kerberos ticket to Azure AD. The easiest way to add the required URLs to the Intranet zone is to simply create a group policy in Active Directory.
89
89
90
90
1. Open the Group Policy Management tools
91
91
2. Edit the Group policy that will be applied to all users. For example, the Default Domain Policy.
@@ -100,7 +100,7 @@ Because the URLs used for single sign on in Azure AD contain a period, they need
@@ -114,9 +114,9 @@ It is important to make sure the client is correctly configured for single sign
114
114
2. Ensure the workstation is joined to the domain.
115
115
3. Ensure the user is logged on with a domain account.
116
116
4. Ensure the machine is connected to the corporate network
117
-
5. Ensure that the machines time is synchronized with the active directory and the domain controllers time is within 5 minutes of the correct time.
117
+
5. Ensure that the machine's time is synchronized with the Active Directory and the domain controllers time is within 5 minutes of the correct time.
118
118
119
-
If you have been able to confirm the above requirements you can review the console logs of the browser for additional information. The console logs can be found under developer tools. This will help you determine the potential problem.
119
+
If you have been able to confirm the above requirements, you can review the console logs of the browser for additional information. The console logs can be found under developer tools. This will help you determine the potential problem.
120
120
121
121
## Event log entries
122
122
Every time a user logs in with single sign on an entry is recorded in the event log of the domain controller, if success auditing is enabled. To find these events, you can review the Event logs for the security Event 4769 associated with computer account AzureADSSOAcc$. The filter below finds all security events associated with the computer account:
0 commit comments