Migrating From Federated Authentication To Pass-Through Authentication
Migrating From Federated Authentication To Pass-Through Authentication
Authentication in a four-step process. The links below take you to each of those steps.
1 2 3 4
Include Plan Implement Manage
Stakeholders Your project Your solution Your implementation
Note:
Throughout this document, you will see items marked as
Microsoft Recommends
These are general recommendations, and you should only implement if they apply to your
specific enterprise needs.
Purpose of document........................................................................................................................3
What is Managed Authentication?....................................................................................................3
What is Managed Authentication with Pass-through Authentication?..............................................3
What is Seamless Single Sign-on?......................................................................................................3
Current state of Authentication.........................................................................................................3
Goals for Pass-through Authentication with Seamless Single Sign-on...............................................4
Stakeholders and Sign-off..................................................................................................................5
PROJECT SCOPE.......................................................................................................................................................
Prerequisites......................................................................................................................................6
In scope.............................................................................................................................................6
Out of scope......................................................................................................................................6
Unsupported Scenarios.................................................................................................................7
PLANNING YOUR DEPLOYMENT...............................................................................................................................
General Planning...............................................................................................................................8
Environments and project stages..................................................................................................8
Licensing Considerations...............................................................................................................8
Understanding Pass-through Authentication....................................................................................8
Planning for Pass-through Authentication.......................................................................................10
Update Azure AD Connect...........................................................................................................10
Plan Authentication Agent Number and Placement....................................................................10
Plan Migration Method...............................................................................................................11
Document Current Federation Settings.......................................................................................13
Deployment Considerations and AD FS Usage.................................................................................15
Validate Your Current AD FS Usage.............................................................................................15
Considerations for Common AD FS Customizations....................................................................15
Planning for Smart Lockout.............................................................................................................16
Plan for Modern Authentication......................................................................................................17
Plan Seamless SSO...........................................................................................................................17
1
Plan Logging and Auditing...............................................................................................................18
Planning Deployment and Support..................................................................................................18
Plan the Maintenance Window...................................................................................................18
Plan for Rollback..........................................................................................................................19
Plan Change Communications.....................................................................................................19
Test Planning...............................................................................................................................21
IMPLEMENTING YOUR SOLUTION..........................................................................................................................
Solution Components......................................................................................................................21
Step 1 – Prepare for Seamless SSO..................................................................................................21
Step 2 – Change sign-in method to Pass-through Authentication and enable Seamless SSO..........22
Option A: Configuring Pass-through Authentication by using Azure AD Connect........................22
Option B - Switch from Federation to PTA using Azure AD Connect and PowerShell..................26
Testing and Next Steps....................................................................................................................33
Test Pass-through Authentication...............................................................................................33
Test Seamless single sign on........................................................................................................35
Removal of the Relying Party Trust..............................................................................................36
Rollback.......................................................................................................................................36
Enable synchronization of userPrincipalName updates...............................................................36
Support Planning.........................................................................................................................36
MANAGE YOUR SOLUTION....................................................................................................................................
2
Introduction
Purpose of document
This document describes the key considerations and processes involved to deploy Pass-through
Authentication and Seamless Single Sign-On as a replacement of Federated Authentication with
Azure Active Directory.
While PHS is not addressed in this document, it can be combined with PTA to obtain specific
benefits.
For more information on selecting an authentication model, refer to the following document:
https://aka.ms/auth-options.
Pass-through Authentication uses lightweight agents deployed in the on-premises environment. The
agents listen for password validation requests sent from Azure AD and don’t require any inbound
ports to be open to the Internet to function. Passwords don’t need to be present in Azure AD in any
form.
For a deeper technical and security explanation, see the Security deep dive article.
<< Insert your summary text here. Eg: By moving to PTA, we will save XX dollars in Federation
running costs.>>
-
3
Goals for Pass-through Authentication with Seamless Single Sign-on
Moving from federation to PTA and Seamless Single Sign-on will benefit our business in the following
ways:
MANAGE COST
Enabling PTA with Seamless SSO removes the requirement to maintain an on-
premises highly available and redundant AD FS farm, including the servers and
internal/external load balancers. It also removes certificate management
administration and overhead costs, while simplifying monitoring, administration,
and ongoing maintenance costs of the AD FS Solution.
4
Stakeholders and Sign-off
The following roles will be involved in delivering this project. To see a full list of responsibilities and
delivery items, see Implementation Steps and Stakeholders.
Action Required:
o SO = Sign-off on this project
o R = Review this project and provide input
o I = Informed of this project
5
Project Scope
Prerequisites
The following are presumed to be in place prior to the commencement of this project.
The latest build of AAD Connect is installed. For more information see the Update Azure AD
Connect section.
Port 80/443/8080 outbound is allowed from the AAD Connect server and any other servers
where you plan to install the PTA agent. Authentication Agents report their status every ten
minutes over port 8080, if port 443 is unavailable. This status is displayed on the Azure AD
portal. Port 8080 is not used for user sign-ins.
Specific public target FQDN’s are whitelisted on your firewall/proxy, and are resolvable for
the PTA agents to install, register, and communicate successfully with Azure AD. Specific
network requirements for the PTA agents are detailed here.
The servers where you will install the PTA agents on are running Windows Server 2012R2 or
Windows Server 2016.
An Azure Global Administrator account is available to configure PTA in your tenant and
migrate from federated to managed.
A Domain Administrator account is available to configure Seamless SSO in the on-premises
Active Directory.
Modern Authentication is enabled in your Office 365 tenant for both Exchange Online and
Skype for Business Online. Please refer to this article for steps on enabling Modern
Authentication.
Modern Authentication is enabled for any Office 2013 clients.
In scope
The following are in scope for this project:
Out of scope
The following are out of scope of this project:
6
Migrating any AD FS custom claims authorization rules to conditional access policies
Configuring Multi-factor authentication (Azure MFA)
Assigning licenses to users
Providing detailed backup and restoration steps for AD FS
Configuring Hybrid Azure AD join
Unsupported Scenarios
Detection of users with leaked credentials.
Azure AD Domain Services needs Password Hash Synchronization to be enabled on the
tenant. Therefore, tenants that use Pass-through Authentication only don't work for
scenarios that need Azure AD Domain Services.
Pass-through Authentication is not integrated with Azure AD Connect Health.
7
Planning your Deployment
General Planning
Environments and project stages
Project stages are dependent on the environments that you have available. If you have a non-
production Azure tenant, you can complete a proof of concept (POC) outside of your production
environment if desired.
In the table below, document the Azure AD and AD environments and stages of your project.
Licensing Considerations
While many features are included with Azure AD Free and Azure AD Basic, some features require
Azure AD Premium (P1 or P2). Both Pass-through Authentication and Seamless SSO do not require
Azure AD Premium and are free to use and deploy, however, there may be associated Azure AD
Premium features that you need to use that require a license assigned to be compliant, or to gain
access to the feature.
The following table describes common Azure AD scenarios and recommended security features. For
a full list of license options and features, see here.
If you have an existing Enterprise Agreement or Server and Cloud Enrollment, you may already have
Azure Premium. Check the details of your agreement.
EMS E3 includes P1
EMS E5 includes P2
8
When a user tries to sign in to an application secured by Azure AD, and if Pass-through
Authentication is enabled on the tenant, the following steps occur:
1. The user tries to access an application, for example, Outlook Web App.
2. If the user is not already signed in, the user is redirected to the Azure AD User Sign-in page.
3. The user enters their credentials into the Azure AD sign in page, and then selects the Sign in
button.
4. Azure AD, on receiving the request to sign in, places the username and password (encrypted
by using a public key) in a queue.
5. An on-premises Authentication Agent retrieves the username and encrypted password from
the queue. Note that the Agent retrieves requests over a pre-established persistent
connection.
6. The agent decrypts the password by using its private key.
7. The agent validates the username and password against on-premises Active Directory by
using standard Windows APIs, which is a similar mechanism to what Active Directory
Federation Services (AD FS) uses. The username can be either the on-premises default
username, usually userPrincipalName, or another attribute configured in Azure AD Connect
(known as Alternate ID).
8. The on-premises Active Directory domain controller (DC) evaluates the request and returns
the appropriate response (success, failure, password expired, or user locked out) to the
agent.
9. The Authentication Agent, in turn, returns this response back to Azure AD.
10. Azure AD evaluates the response and responds to the user as appropriate. For example,
Azure AD either signs the user in immediately or requests for Azure Multi-Factor
Authentication.
11. If the user sign-in is successful, the user can access the application.
9
Planning for Pass-through Authentication
Update Azure AD Connect
Azure AD Connect is the tool to integrate your on-premises directories with Azure AD. In addition to
directory synchronization, Azure AD Connect provides a wizard-driven experience for configuring
your Azure AD authentication settings and other features.
Microsoft strongly recommends updating Azure AD Connect to the latest version as part of this
implementation project. The deployment steps and captured screens on this deployment guide were
developed using the latest available version of Azure AD Connect.
As a minimum to successfully perform the steps on this document, you should have Azure AD
connect 1.1.819.0. This version contains significant changes to the way sign-in conversion is
performed and reduces the overall time to migrate from Federation to Cloud Authentication from
potentially hours to minutes.
Important! Outdated documentation, tools and blogs indicate that user conversion is a required
step when converting domains from Federated to Managed. Note that converting users is not
required anymore and Microsoft is working on updating documentation and tools to reflect this.
To understand how to update Azure AD Connect to the latest version, see the following article.
https://docs.microsoft.com/en-us/azure/active-directory/connect/active-directory-aadconnect-
upgrade-previous-version
For most customers two or three authentication agents are sufficient for high availability and
capacity, and a tenant can have no more than 12 agents registered. The first agent is always
installed on the AAD Connect server itself.
For more information on network traffic estimations and performance guidance refer to the
document on limitations.
Once you have determined the number of agents, record the servers on which you will install the
agents in the following table.
If performance is a concern for your Azure AD Connect server, or if you wish to prevent the agent
installed on it from servicing any authentication requests then the agent services, “Microsoft Azure
10
AD Connect Authentication Agent” and “Microsoft Azure AD Connect Agent Updater”, can be safely
disabled provided you have successfully installed at least another agent on a server elsewhere in
your environment. Record your plan below.
Important! The servers where the Authentication Agents are deployed should be considered a Tier 0
system according to the Active Directory administrative tier model.
1. Using Azure AD Connect. If AD FS was originally configured using Azure AD Connect, then
the change to Pass-through Authentication must be performed through the Azure AD
Connect wizard.
When using Azure AD Connect, it runs the Set-MsolDomainAuthentication cmdlet for you
automatically when you change the user sign-in method, and hence you have no control
over it un-federating all of the verified federated domains in your Azure AD tenant.
Note: At this time, you cannot avoid un-federating all domains in your tenant when you
change the user sign-in to Pass-through Authentication when AAD Connect was originally
used to configure AD FS for you.
2. Using Azure AD Connect with PowerShell. This method may be used only when AD FS was
not originally configured with Azure AD Connect. You still need to change the user sign-in
method via the Azure AD Connect wizard, but the core difference is that it will not
automatically run the Set-MsolDomainAuthentication cmdlet for you as it has no awareness
of your AD FS farm, and hence you have full control over which domains are converted and
in which order.
To understand what method you should use, perform the steps on the following section.
In the User Sign In section, verify that Federation is Enabled and that Seamless Single Sign-on and
Pass-through Authentication are Disabled.
11
Verify How Federation was Configured
1. Go to your Azure AD Connect server and launch Azure AD Connect, then select Configure.
2. On the Additional Tasks screen, select View Current Configuration and then select Next.
3. In the Review Your Solution screen scroll down to Active Directory Federation Services (AD
FS).
12
If you see that the AD FS configuration is in this section then you can safely assume AD FS
was originally configured through Azure AD Connect and hence the conversion of your
domain(s) from federated to managed can be driven through the Azure AD Connect “Change
user sign-in” option, this process is detailed in the section “Option 1: Configuring Pass-
through Authentication by using Azure AD Connect”.
4. If you can’t see Active Directory Federation Services listed in the current settings, then you
will need to manually convert the domains from federated to managed via PowerShell which
is detailed in the section Option 2 - Switch from Federation to PTA using Azure AD Connect
and PowerShell.
For example:
13
Validate any settings that might have been customized to your Federation design and deployment
documentation, specifically the following, in the event that you need to roll back:
Settings Values
PreferredAuthenticationProtocol
SupportsMfa
PromptLoginBehavior
Note: If the SupportsMfa value is currently set to “True” then this means you are using an On-
Premises MFA solution to inject a 2nd factor challenge into the user authentication flow. This will no
longer work for Azure AD authentication scenarios, and instead you will have to leverage the Azure
MFA (cloud-based) service to perform the same function. Carefully evaluate your MFA requirements
before moving forward and make sure you understand how to leverage Azure MFA, the licensing
implications, and the end user registration process before converting your domains. Our deployment
guide for Azure MFA that goes into more detail can be found at https://aka.ms/deploymentplans.
If you choose not to use the AD FS Rapid Restore Tool, then at a minimum, you should export the
"Microsoft Office 365 Identity Platform" relying party trust and any associated custom claim rules
you may have added. You can do this via the following PowerShell example
14
Deployment Considerations and AD FS Usage
Validate Your Current AD FS Usage
Before converting from Federated to Managed you should look closely at how you are using AD FS
today for Azure AD/Office 365 and other applications (relying party trusts). Specifically, you should
consider the following:
If Then
You are going to retain AD FS for those You will be using both AD FS and Azure AD and will
other applications. need to consider the end user experience as a result.
Users may need to authenticate twice in some
scenarios, once to Azure AD (where they will get SSO
onwards to other applications like Office 365) and
again for any applications still bound to AD FS as a
relying party trust.
AD FS is heavily customized and reliant You will need to verify that your current
on specific customization settings in the customization requirements can be met by Azure AD
onload.js file that cannot be duplicated before proceeding. Refer to the AD FS Branding and
in Azure AD AD FS Customization sections of this document for
(for example, you have changed the sign- further information and guidance.
in experience so that users only enter a
SamAccountName format for their
username as opposed to a UPN, or have
a heavily branded the login experience)
You are blocking legacy authentication Consider replacing the controls to block legacy
clients via AD FS. authentication clients currently present on AD FS
with a combination of Conditional Access controls for
Legacy Authentication and Exchange Online Client
Access Rules.
You require users to perform MFA You won't be able to inject an MFA challenge via the
against an on-premises MFA server on-premises MFA solution into the authentication
solution when authenticating to AD FS. flow for a managed domain, however you can use the
Azure MFA service to do so going forward once the
domain is converted. If users are not using Azure MFA
today, then this will involve a onetime end user
registration step that you will have to prepare for and
communicate to your end users.
You use Access Control Policies (AuthZ Consider replacing these with the equivalent Azure
rules) today in AD FS to control access to AD Conditional Access Policies and Exchange Online
Office 365. Client Access Rules.
15
The InsideCorporateNetwork claim won’t be available anymore once your domains are converted to
Pass-through Authentication. Named Locations in Azure AD can be used to replace this functionality.
Once Named Locations have been configured, all Conditional Access policies configured to include or
exclude the network locations “All trusted locations” or “MFA Trusted IPs” must be updated to
reflect the newly created Named Locations.
See Active Directory Conditional Access Locations for more information on the Location condition in
Conditional Access.
To ensure Hybrid Join continues working for any new devices joined to the domain once your
domains have been converted to Pass-through Authentication, Azure AD Connect must be
configured to synchronize Active Directory computer accounts for Windows 10 clients to Azure AD.
For Windows 7 and Windows 8 computer accounts, Hybrid Join will use Seamless SSO to register the
computer in Azure AD and you do not have to sync them as you do for Windows 10 devices. You will
however have to deploy an updated workplacejoin.exe file (via an .msi) to these down-level clients
so they can register themselves using Seamless SSO. Download the .msi.
Branding
Your organization may have customized your ADFS sign-in pages to display information more
pertinent to the organization. If so, consider making similar customizations to the Azure AD sign-in
page.
While similar customizations are available, some visual changes should be expected. You may want
to include expected changes in your communications to end users.
Note: Company branding is available only if you purchased the Premium or Basic license for Azure
AD or have an Office 365 license.
Lockout Duration automatically increases with a continuing attack. Machine intelligence algorithms
attempt to distinguish between genuine users and attackers. Factors include past sign-in behavior,
and user’s devices and browsers. The Smart Lockout settings can be adjusted via Graph API but
16
require an Azure AD P2 license to do so. It is recommended to configure the Smart Lockout
threshold to a number lower than your current on-premises account lockout threshold to invoke
Smart Lockout before allowing the failed password attempts to traverse on-premises and trip the
lockout threshold group policy.
For more information on Smart Lockout feature and how to edit its configuration please refer to this
document.
If you don’t have an account lockout threshold group policy set today in Active Directory, then there
is no requirement for you to edit the Smart Lockout behavior and you can safely go with the default
settings and still stay protected. If you have an on-premises Group Policy object that locks accounts
after fewer than 10 failed password attempts, an Azure AD P2 license is required for a single Global
Administrator account so that they can edit Smart Lockout settings in Azure AD to tune it to your
environment and prevent unintended lockouts resulting from Pass-through Authentication requests.
How modern authentication works for Office 2013 and Office 2016 client apps
17
The deployment of Seamless Single Sign-On comprises two main steps:
Enabling client devices to utilize Seamless SSO by modifying the users “Intranet Zone”
settings through Active Directory Group Policies.
Enable the Seamless SSO feature in AAD Connect which creates a special computer account
in the On-Premises Active Directory called AZUREADSSOACC
Client devices can be enabled for Seamless SSO using a group policy. We recommend performing
this step before enabling the Seamless SSO feature and converting your domains to Managed to
minimize the time in which your users might be prompted for a username and password.
For more information on the changes required, refer to the section Step 1 – Prepare for Seamless
SSO.
In the table below, document the backup schedule, the system, and the responsible parties. You may
not need separate auditing and reporting backups, but you should have a separate backup from
which you can recover from an issue.
Note: This will only impact users who access the services via a browser during this post conversion
window until the service side cache is cleared. Legacy clients (Exchange ActiveSync, Outlook
2010/2013) should not be impacted as Exchange Online keeps a cache of their credentials for a
period of time that is used to re-authenticate the user silently without needing to go back to AD FS.
Credentials stored on the device for these clients are used to re-authenticate themselves silently
once this cached is cleared and hence users should not receive any password prompts as a result of
the domain conversion process. Conversely, for Modern Authentication clients (Office 2013/2016,
IOS, and Android Apps) these use a valid Refresh Token to obtain new access tokens for continued
18
access to resources instead of going back to AD FS, and hence are immune to any password prompts
as a result of the domain conversion process and will continue to function without any extra
configuration required.
Microsoft recommends: don’t shut down your AD FS environment or remove the Office 365
relying party trust until you have verified all users are successfully authenticating using cloud
authentication.
Rolling back
Consult your Federation design and deployment documentation for your particular deployment
details. The process should involve:
In the following table, record your documentation and backup settings, and additional information.
After both Pass-through Authentication and Seamless SSO are deployed, the end user sign-in
experience will change when accessing Office 365 and other associated resources authenticated
through Azure AD. Users external to the network will now see the Azure AD logon page only, as
opposed to being redirected to the forms-based page presented by the external facing Web
Application Proxy servers.
There are multiple elements to planning your communication strategy. These include:
Use the following table to plan your communications strategies. In the channels column, record the
channels you will use for communications, including email, Yammer, Slack, intranet sites, etc.
19
Communication Channels Person Person Date of
customizing communicating communication
content
Creation of end-
user emails
Initial
communication
to all users for
launch
Posters up for
Launch
Exec. Comms.
For launch
Maintenance
window starting
Maintenance
window
complete
Post-launch
follow-up
communications
20
Test Planning
In this section, document how you will test during the pre-production phases of your roll-out, as well
as post-launch. Testing should ensure that your business use cases are covered. You can then use
this table to record results. We have added a few cases based on the sample business requirements
in this document, and on typical technical scenarios. You should add others specific to your needs.
Solution Components
Implementation includes the following components:
By default, the browser automatically calculates the correct zone, either Internet or Intranet, from a
specific URL. For example, "http://contoso/" maps to the Intranet zone, whereas
"http://intranet.contoso.com/" maps to the Internet zone (because the URL contains a period).
Browsers will not send Kerberos tickets to a cloud endpoint, like the Azure AD URL, unless you
explicitly add the URL to the browser's Intranet zone.
Follow the steps on the following article to make the required changes to your devices.
21
https://docs.microsoft.com/en-us/azure/active-directory/connect/active-directory-aadconnect-sso-
quick-start#step-3-roll-out-the-feature
Important! Making this change won’t modify the way your users sign in to Azure AD. However,
it’s important this configuration is applied to all your devices before you continue with the Step
3. Also note that users signing in on devices that have not received this configuration will simply
need to enter username and password to sign in to Azure AD.
Important! Remember that by following the steps below all your domains will be converted
from Federated to Managed. Review the section Plan Migration Method for more
information.
22
After the change:
Note: starting with Azure AD Connect version 1.1.880.0, the Seamless single sign-on checkbox is
enabled by default.
5) In Enable Single Sign-on screen, enter the credentials of Domain Administrator account, then
select Next.
Note: Domain Administrator credentials are required for enabling Seamless Single Sign-on as the
process performs the following actions which require these elevated permissions. The domain
administrator credentials are not stored in Azure AD Connect or in Azure AD. They're used only
to enable the feature and then discarded after successful completion
23
A computer account named AZUREADSSOACC (which represents Azure AD) is created in
your on-premises Active Directory (AD).
The computer account's Kerberos decryption key is shared securely with Azure AD.
In addition, two Kerberos service principal names (SPNs) are created to represent two
URLs that are used during Azure AD sign-in.
The domain administrator credentials are not stored in Azure AD Connect or in Azure
AD. They're used only to enable the feature and then discarded after successful
completion
6) In the Ready to Configure screen, make sure “Start Synchronization process when configuration
completes” checkbox is selected. Then select Configure.
7) Open the Azure AD portal, select Azure Active Directory, and then select Azure AD Connect.
8) Verify that that Federation is Disabled while Seamless single sign on and Pass-thorough
authentication are Enabled.
24
Deploy Additional Authentication Agents
Open the Azure Portal, browse to Azure Active Directory, Azure AD Connect and click Pass-through
Authentication.
From the Pass-through Authentication page, click on the Download button. From the Download
Agent screen, click on Accept terms and download.
The download of additional authentication agents will begin. Install the secondary Authentication
Agent on a domain-joined server.
NOTE: the first agent is always installed on the Azure AD Connect server itself as part of the
configuration changes made in the User Sign In section of the Azure AD Connect tool. Any additional
Authentication Agents should be installed on a separate server. It is recommended to have between
2-3 additional Authentication Agents available.
Run the Authentication Agent installation. During the installation you will need to provide
credentials of a Global Administrator account.
25
Once the Authentication Agent is installed you can go back to the Pass-through Authentication Agent
health page to check the status of the additional agents.
26
Before the change:
Note: starting with Azure AD Connect version 1.1.880.0, the Seamless single sign-on checkbox is
enabled by default.
5) In Enable Single Sign-on screen, enter the credentials of Domain Administrator account, then
select Next.
27
Note: Domain
Administrator credentials are required for enabling Seamless Single Sign-on as the process performs
the following actions which require these elevated permissions. The domain administrator
credentials are not stored in Azure AD Connect or in Azure AD. They're used only to enable the
feature and then discarded after successful completion.
A computer account named AZUREADSSOACC (which represents Azure AD) is created in your
on-premises Active Directory (AD).
The computer account's Kerberos decryption key is shared securely with Azure AD.
In addition, two Kerberos service principal names (SPNs) are created to represent two URLs
that are used during Azure AD sign-in.
28
6) In the Ready to Configure screen, make sure “Start Synchronization process when configuration
completes” checkbox is selected. Then select Configure.
7) Verify that Federation is still Enabled and Seamless single sign on and Pass-thorough
authentication are now Enabled.
29
Select Pass-through Authentication and verify that the status is Active.
If the
Authentication Agent is not active, follow these troubleshooting steps before proceeding with the
domain conversation process in the next step. You risk causing an authentication outage if you
convert your domains prior to validating that your PTA agents have installed successfully and that
their status shows as “Active” in the Azure portal.
From the Pass-through Authentication page, click on the Download button. From the Download
Agent screen, click on Accept terms and download.
The download of additional authentication agents will begin. Install the secondary Authentication
Agent on a domain-joined server.
NOTE: the first agent is always installed on the Azure AD Connect server itself as part of the
configuration changes made in the User Sign In section of the Azure AD Connect tool. Any additional
Authentication Agents should be installed on a separate server. It is recommended to have between
2-3 additional Authentication Agents available.
Run the Authentication Agent installation. During the installation you will need to provide
credentials of a Global Administrator account.
30
Once the Authentication Agent is installed you can go back to the Pass-through Authentication Agent
health page to check the status of the additional agents.
Not all domains need the be converted at the same time, you might choose to start with a test
domain on your production tenant or the domain with the least number of users.
31
3) Open the Azure AD portal, select Azure Active Directory, and then select Azure AD Connect.
4) Once you have converted all your federated domains, verify that that Federation is Disabled
while Seamless single sign on and Pass-through authentication are Enabled.
32
Testing and Next Steps
Test Pass-through Authentication
When your tenant was using federation, users were getting redirected from the Azure AD login page
to your AD FS environment. Now that the tenant is configured to use Pass-through Authentication
instead of federation, users will not get redirected to AD FS and instead will login directly through
the Azure AD Login page.
Open Internet Explorer in InPrivate mode to avoid Seamless SSO signing you in automatically and go
to the Office 365 login page (http://portal.office.com). Type the UPN of your user and click Next.
Make sure to type UPN of a hybrid user that was synced from your on-premises Active Directory and
who was previously federated. The user will see the screen to type in their username and password.
33
Once you type the password, you should get redirected to the Office 365 portal.
34
Test Seamless single sign on
Login to a domain joined machine that is connected to the corporate network. Open Internet
Explorer or Chrome and go to one of the following URLs:
https://myapps.microsoft.com/contoso.com
https://myapps.microsoft.com/contoso.onmicrosoft.com (replace Contoso with your domain).
The user will be briefly redirected to the Azure AD login page and see the message “Trying to sign
you in” and should not be prompted for either a username or a password.
Then, the user will get redirected and signed into the Access Panel successfully:
NOTE: Seamless Single Sign-On works on Office 365 services that supports domain hint (for example,
myapps.microsoft.com/contoso.com). The Office 365 portal (portal.office.com) currently doesn’t
35
support domain hint and therefore it is expected that users will need to type their UPN. Once a UPN
is entered, Seamless single sign on can retrieve the Kerberos ticket on behalf of the user and log
them in without typing a password.
Microsoft recommends deploying Azure AD Hybrid Join on Windows 10 for an improved single
sign-on experience.
If AD FS is not being used for other purposes (other Relying Party Trusts have been configured), it is
safe to decommission ADFS now.
Rollback
If a major issue is found and cannot be resolved quickly, you might decide to roll back the solution
back to Federation.
Consult your Federation design and deployment documentation for your particular deployment
details. The process should involve:
For instructions on how to verify or enable this feature, refer to the following article:
Support Planning
Your support team should understand how to troubleshoot any authentication issues that arise
either during, or after the change from federation to managed. Use the following troubleshooting
documentation to help your support team familiarize themselves with the common troubleshooting
steps and appropriate actions that can help to isolate and resolve the issue.
36
Manage your solution
This section describes the recommended task to be performed regularly on Pass-through
Authentication and Seamless SSO deployments.
Follow these steps on the on-premises server where you are running Azure AD Connect to initiate
the rollover of the Kerberos decryption key.
How can I roll over the Kerberos decryption key of the AZUREADSSOACC computer account?
Authentication Agents log operations to Windows event logs under “Application and Service Logs\
Microsoft\AzureAdConnect\AuthenticationAgent\Admin”.
For more information about monitoring and logging refer to the following document.
https://docs.microsoft.com/en-us/azure/active-directory/connect/active-directory-aadconnect-
troubleshoot-Pass-through-authentication#collecting-Pass-through-authentication-agent-logs
© 2018 Microsoft Corporation. All rights reserved. This document is provided "as-
is." Information and views expressed in this document, including URL and other
Internet Web site references, may change without notice. You bear the risk of using
it.
Some examples are for illustration only and are fictitious. No real association is
intended or inferred.
This document does not provide you with any legal rights to any intellectual property
in any Microsoft product. You may copy and use this document for your internal,
reference purposes. You may modify this document for your internal, reference
purposes
37