Microsoft Entra ID | Hybrid Azure AD Join | Federated Domain

  Рет қаралды 16,436

Concepts Work

Concepts Work

Күн бұрын

Пікірлер: 50
@Ambedkarites_Indian
@Ambedkarites_Indian Жыл бұрын
How much valuable this channel, its should be more than 1lac subscribers. Guys please keep sharing this.
@akk2766
@akk2766 3 жыл бұрын
This is a gem of channel...
@akk2766
@akk2766 2 жыл бұрын
Any chance you can show the differences involved if the domain is federated via SAML2.0?
@michaelwaterman3553
@michaelwaterman3553 4 жыл бұрын
Your videos are an absolute joy to watch, thanks for sharing!
@ConceptsWork
@ConceptsWork 4 жыл бұрын
Glad you like them!
@abulaith4485
@abulaith4485 5 жыл бұрын
WOW, although it is complicated but brilliantly explained, Thank you.
@yassinesouabni5192
@yassinesouabni5192 2 жыл бұрын
UserCertificates ADComputer object's attribute is populated only if scp (ad or client side) is configured
@MarwaMohamed-es8pe
@MarwaMohamed-es8pe 4 жыл бұрын
That's brilliant, Thanks a lot - well explained
@ConceptsWork
@ConceptsWork 4 жыл бұрын
Glad it was helpful!
@77mrharidas
@77mrharidas 4 жыл бұрын
explained very deep thanks.....
@srinivasnaidu173
@srinivasnaidu173 8 ай бұрын
All devices in tenant are already azure ad registered(onprem+workplace joined) .if i enable entra hybrid join in entra connect it will automatically convert to entra hybrid join or i have to manually remove the azure ad registered state and then enable for entra hybrid join
@sampathkovuri
@sampathkovuri 4 жыл бұрын
Hi, I have two forests under one tenant. Recently we migrated some user mailboxes from different organization and they have their email address not matched with the domain name where we migrated. Only the migrated mailbox user laptops are showing as pending in hybrid domain join. How can I write down 6th claim rules in this scenario.
@nikhilmhatre4388
@nikhilmhatre4388 4 жыл бұрын
Super! Very well explained. Thank you.
@Venugopal-xu1ks
@Venugopal-xu1ks 3 жыл бұрын
@concepts work, Client device are joined to Azure AD and Intune. Now when we try to join the device to On-premises AD with AD admin and we get error. Can you please guide me how to join a device to On-premises AD which is already Azure AD joined and Intune compliance.
@ConceptsWork
@ConceptsWork 3 жыл бұрын
Currently a machine joined to Azure AD cannot be joined to Local AD.
@Venugopal-xu1ks
@Venugopal-xu1ks 3 жыл бұрын
@@ConceptsWork Thanks for the update. If we remove device from Azure AD, will device also goes out from Intune ? After we remove device from Azure AD and before rejoin to On-premises AD and Azure AD do we need rename the hostname of the device ?
@ConceptsWork
@ConceptsWork 3 жыл бұрын
Make sure that the device is completely removed from the all the three resources, Azure AD, local AD and Microsoft Intune, before re-imaging and join the machine back to local ad and syncing to Azure AD, other wise there will be stale entries. The fundamental idea is more over related to object guid, of the device.
@kundan0294
@kundan0294 4 жыл бұрын
I could not understand differnce between this and previous video... its on federated but many things are same.. could you please let me know how you have configured claims in adfs
@ConceptsWork
@ConceptsWork 4 жыл бұрын
Please check this article. docs.microsoft.com/en-us/azure/active-directory/devices/hybrid-azuread-join-manual
@soydlm8658
@soydlm8658 4 жыл бұрын
The claims in the Adfs are created automatically with the Ad Connect wizard when configuring the hybrid options, or you have to create them manually ?Thank you.
@ConceptsWork
@ConceptsWork 4 жыл бұрын
If you have deployed adfs from aad connect the claims will be created automatically, but if you have deplolyed adfs and aad connect individually, then you have manually create claim rules.
@ronald0122
@ronald0122 4 жыл бұрын
how to add the devices in Intune?
@ShankarKumar-YogMitr
@ShankarKumar-YogMitr 2 жыл бұрын
Thanks for the informative video. In a federated environment, is it mandatory to use win HTTP proxy if we are not using wpad?
@safetime100
@safetime100 2 жыл бұрын
Thanks please do more ❤️
@prabhanshumani7008
@prabhanshumani7008 2 жыл бұрын
Hello sir I have one question While configuring the hybrid joined for downlevel device the option is greyed out for us and asking to enable seamless sso Can we hybrid joined the downlevel devices without enabling the seamless sso Or do we need to enable it In my test machine when i have tested the option is enable after enabling the seamless sso Thanks
@ConceptsWork
@ConceptsWork 2 жыл бұрын
For down leavel devices, seamless sso is a pre req.
@DeepakKumarpark
@DeepakKumarpark Жыл бұрын
can you share the claim rules please
@wail841
@wail841 4 жыл бұрын
Do we need to be connecting into the Enterprise network domain to register in the on premise Ad and in AAD?
@ConceptsWork
@ConceptsWork 4 жыл бұрын
Yes, you need to be connected to local AD domain.
@johnpark7302
@johnpark7302 4 жыл бұрын
Thank you for the great content. I get this error message from the Azure AD Connect wizard when trying to configure: An error occurred while executing the 'Update-MsolFederatedDomain' command. MSIS7612: Each identifier for a relying party trust must be unique across all relying party trusts in AD FS configuration. ---> System.Management.Automation.RemoteException: MSIS7612: Each identifier for a relying party trust must be unique across all relying party trusts in AD FS configuration. Does this mean I need to configure the relying party trust for Azure AD on my AD FS server? Thanks for any advice.
@ConceptsWork
@ConceptsWork 3 жыл бұрын
As per this error message, there are multiple entries of the same identifier, and being honest, I have never seen this behavior, as ADFS will not allow you to save the duplicate Identifier values. To be sure about it, please check the identifier field of every relying party trust.
@kundan0294
@kundan0294 4 жыл бұрын
Awesome videos, could you please let me know if you have uploaded application integration and Azure powershell videos as well ? could you please provide url if yes..
@ConceptsWork
@ConceptsWork 4 жыл бұрын
kzbin.info/www/bejne/gJKmlmCKatepjJo
@brushenas
@brushenas 5 жыл бұрын
Thank you for the great video and explanation. I heart that if you are in a federated domain with ADFS, once your devices can discover the SCP, they auto-register with Azure AD without even having the computer account already synchronized in Azure AD. is that correct? is there any document or video that explains that? Thank you
@ConceptsWork
@ConceptsWork 5 жыл бұрын
Please watch this - kzbin.info/www/bejne/aKbahIZ_rdR4pLc Also check this article - docs.microsoft.com/en-us/azure/active-directory/devices/hybrid-azuread-join-managed-domains
@mojo3717
@mojo3717 4 жыл бұрын
Hi Bruce, you are correct. You don't need ADConnect to synchronize the object for a successful hybrid join. ADFS can handle that for you. However, if somehow ADFS fails to create the object in Azure AD, the machine will fallback on the sync option. In order to let this work, you have to enable synchronization for that particular computer object in ADconnect. But in the end, that is optional.
@cli3335
@cli3335 2 жыл бұрын
@@mojo3717 Hey Peter, glad i found this comment...would this explain why my Hybrid domain join devices aren't syncing...meaning if i disable the onprem AD computer, nothing happens to the Azure AD device object. I read somewhere if you're running Hybrid Domain AD Join with ADFS, the syncing will not work...(especially not ideal for managing stale devices)
@ehabgalal9181
@ehabgalal9181 5 жыл бұрын
Hello, Where I can find the cliams rules ?
@ConceptsWork
@ConceptsWork 5 жыл бұрын
Please check this document - docs.microsoft.com/bs-latn-ba/azure/active-directory/devices/hybrid-azuread-join-manual
@ejsanvelas2705
@ejsanvelas2705 3 жыл бұрын
Thanks for the informative video. For the claims required for federated domains, are those only required for environments that use ADFS? If you use an Identity provider other than ADFS, are those claim rules still needed?
@ConceptsWork
@ConceptsWork 3 жыл бұрын
These claims must be present even if you are using any other Identity Provider.
@andrewivanof2940
@andrewivanof2940 4 жыл бұрын
your videos very helpful and structured well. Thank you so much! I have probably stupid question.... probably not related to this. Does Hybrid Azure AD Join device has ability to login to windows outside of corporate network? In my case I setup Hybrid AD Joined device and windows hello for business key based trust model. Inside corp network all work absolutely amazed but if i change network to internet then I have error that i cannot login.
@ConceptsWork
@ConceptsWork 4 жыл бұрын
It must work outside the organization as well, windows hello for bussiness key is device specific.
@andrewivanof2940
@andrewivanof2940 4 жыл бұрын
@@ConceptsWork thanks for answer. So, lets skip part about WHFB and imagine computer hybrid azure joined. Let's also imagine that I have group policy to remove "Logon Cache" (Interactive logon: Number of previous logons to cache (in case domain controller is not available) = 0). Would I able to logon to my computer outside organization?
@ademilolashonibare758
@ademilolashonibare758 4 жыл бұрын
Thanks for the great videos. Please i have something i hope you can help me with. I want users to be able to authenticate against the azure AD to login to windows 10 device which is hybrid azure AD join instead of on-prem DC. I want to achieve this so that remote users can still authenticate when the device is on another network. Please Can i used ADFS to achieve this?
@ConceptsWork
@ConceptsWork 4 жыл бұрын
If the machine is hybrid Azure AD joined, Active directory will always take precedence as per the current behavior.
@mateuszdrab
@mateuszdrab 4 жыл бұрын
Thank you for this useful video. I am having issue understanding one concept and I am wondering if you could help me out. After joining my device to azure ad in hybrid mode, I intially had issues getting the EnterprisePrt token. After some changes to the Azure AD Connect setup ADFS environment that included initialising device registration using the Initialize-ADDeviceRegistration command, enabling device writeback via AD Connect and enabling device registration with Set-AdfsGlobalAuthenticationPolicy -DeviceAuthenticationEnabled $true, I managed to get a token. I had to follow the stops from docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust-devreg which confused me enough already as I wasn't enabling WH4B and considering I had AD FS setup automatically, I expected no additional configuration needed after running the enable hybrid domain join in the AD Connect Tool) Unfortunately, the PRT token doesn't seem to work for AD FS when connecting externally from my joined laptop and using the Edge (Chromium) browser. Using IE and legacy Edge, I am able to pass through AD FS authentication just fine. I am using the AD FS Xray tool as a relying trust party for AD FS. My question is, what is the role of the EnterprisePrt token? I'm unable to find any documentation on it that would be applicable to the AD FS and Hybrid Azure Join scenario. I simply expected that with the hybrid join, I could take my device outside the network and enjoy seamless Azure AD logon (which works in both IE and legacy/chromium Edge) and seamless AD FS logon (which doesn't work with the Chromium edge but works in IE and I can see the PRT password claim). Thanks
@ConceptsWork
@ConceptsWork 4 жыл бұрын
Enteprise PRT is not required for Azure AD SSO. Enterprise PRT is show when you are using ADFS device registration. What you have to check is, if the machine is hybrid azure AD join Azure AD PRT is showing as yes or not. If you are not getting Azure AD prt, then only you will experience SSO issues.
@mateuszdrab
@mateuszdrab 4 жыл бұрын
@@ConceptsWork thanks. Turns out the root cause is that Edge (Chromium) doesn't support Enterprise PRT yet. This explains why Azure PRT worked fine. In my case, both enterprise prt and azure ad prt are set to yes. Unfortunately, due to Edge's lack of support of the Enterprise PRT I did a bit of a workaround and federated ADFS back to Azure AD as an IDP and with come claims magic, I was able to get ADFS SSO with Azure AD as IDP which means SSO even when the enterprise PRT isn't working. This means my ADFS federated apps can now authenticate seamlessly even on my phone which is a registered device or on my PC with Chrome when the Office addon is installed as that adds Azure PRT support :) Thanks
ADFS VS Azure Active Directory | 2023
19:11
Concepts Work
Рет қаралды 43 М.
Microsoft Entra ID | Hybrid Azure AD Join Devices | Managed Domains
30:23
Ful Video ☝🏻☝🏻☝🏻
1:01
Arkeolog
Рет қаралды 14 МЛН
Непосредственно Каха: сумка
0:53
К-Media
Рет қаралды 12 МЛН
JISOO - ‘꽃(FLOWER)’ M/V
3:05
BLACKPINK
Рет қаралды 137 МЛН
Emerging Technologies Transforming the HR Landscape
3:01
BP International
Рет қаралды 1
Microsoft Entra ID | Conditional Access Policy Configuration
17:53
Concepts Work
Рет қаралды 41 М.
Microsoft Entra ID | Azure Active Directory Joined Devices
15:31
Concepts Work
Рет қаралды 25 М.
Onboard Hybrid Azure AD Joined Devices to Intune
17:01
Concepts Work
Рет қаралды 44 М.
AAD Connect Installation | Hybrid Identity Model
35:22
Concepts Work
Рет қаралды 45 М.
Authentication fundamentals: Federation | Microsoft Entra ID
6:19
Microsoft Azure
Рет қаралды 140 М.
Migrating from ADFS to Azure Active Directory: Benefits and Best Practices
40:35
Oxford Computer Group US
Рет қаралды 6 М.
Microsoft Entra ID | Azure Active Directory Groups
18:56
Concepts Work
Рет қаралды 18 М.
Ful Video ☝🏻☝🏻☝🏻
1:01
Arkeolog
Рет қаралды 14 МЛН