Skip to content

Update how-to-connect-sso-faq.yml#1955

Open
ARL-DW wants to merge 4 commits intoMicrosoftDocs:mainfrom
ARL-DW:patch-3
Open

Update how-to-connect-sso-faq.yml#1955
ARL-DW wants to merge 4 commits intoMicrosoftDocs:mainfrom
ARL-DW:patch-3

Conversation

@ARL-DW
Copy link
Copy Markdown
Contributor

@ARL-DW ARL-DW commented Apr 27, 2026

Updated invalid encoding on words with apostrophes.

Replacing ` with ' for better readability

Updated invalid encoding on words with apostrophes. 

Replacing ` with ' for better readability
@ARL-DW
Copy link
Copy Markdown
Contributor Author

ARL-DW commented Apr 27, 2026

@microsoft-github-policy-service agree

@prmerger-automator
Copy link
Copy Markdown
Contributor

@ARL-DW : Thanks for your contribution! The author(s) and reviewer(s) have been notified to review your proposed change.

@learn-build-service-prod
Copy link
Copy Markdown
Contributor

Learn Build status updates of commit d9f39ca:

⚠️ Validation status: warnings

File Status Preview URL Details
docs/identity/hybrid/connect/how-to-connect-sso-faq.yml ⚠️Warning Details

docs/identity/hybrid/connect/how-to-connect-sso-faq.yml

  • Line 146, Column 319: [Warning: disallowed-html-tag - See documentation] HTML tag 'fqdn' isn't allowed. Replace it with approved Markdown or escape the brackets if the content is a placeholder.

For more details, please refer to the build report.

Note: Your PR may contain errors or warnings or suggestions unrelated to the files you changed. This happens when external dependencies like GitHub alias, Microsoft alias, cross repo links are updated. Please use these instructions to resolve them.

@learn-build-service-prod
Copy link
Copy Markdown
Contributor

Learn Build status updates of commit ddaffce:

⚠️ Validation status: warnings

File Status Preview URL Details
docs/identity/hybrid/connect/how-to-connect-sso-faq.yml ⚠️Warning Details

docs/identity/hybrid/connect/how-to-connect-sso-faq.yml

  • Line 146, Column 319: [Warning: disallowed-html-tag - See documentation] HTML tag 'value' isn't allowed. Replace it with approved Markdown or escape the brackets if the content is a placeholder.

For more details, please refer to the build report.

Note: Your PR may contain errors or warnings or suggestions unrelated to the files you changed. This happens when external dependencies like GitHub alias, Microsoft alias, cross repo links are updated. Please use these instructions to resolve them.

@learn-build-service-prod
Copy link
Copy Markdown
Contributor

Learn Build status updates of commit 31f832e:

⚠️ Validation status: warnings

File Status Preview URL Details
docs/identity/hybrid/connect/how-to-connect-sso-faq.yml ⚠️Warning Details

docs/identity/hybrid/connect/how-to-connect-sso-faq.yml

  • Line 146, Column 319: [Warning: disallowed-html-tag - See documentation] HTML tag 'fqdn' isn't allowed. Replace it with approved Markdown or escape the brackets if the content is a placeholder.

For more details, please refer to the build report.

Note: Your PR may contain errors or warnings or suggestions unrelated to the files you changed. This happens when external dependencies like GitHub alias, Microsoft alias, cross repo links are updated. Please use these instructions to resolve them.

@learn-build-service-prod
Copy link
Copy Markdown
Contributor

Learn Build status updates of commit a0ec8f8:

✅ Validation status: passed

File Status Preview URL Details
docs/identity/hybrid/connect/how-to-connect-sso-faq.yml ✅Succeeded

For more details, please refer to the build report.

@prmerger-automator
Copy link
Copy Markdown
Contributor

PRMerger Results

Issue Description
Yaml File(s) This PR includes changes to .yml file(s) owned by another author.

@ttorble
Copy link
Copy Markdown
Contributor

ttorble commented Apr 27, 2026

@omondiatieno

Can you review the proposed changes?

IMPORTANT: When the changes are ready for publication, adding a #sign-off comment is the best way to signal that the PR is ready for the review team to merge.

#label:"aq-pr-triaged"
@MicrosoftDocs/public-repo-pr-review-team

Copy link
Copy Markdown
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

This PR updates the Seamless SSO FAQ content to replace backtick-wrapped inline text with apostrophes/single quotes, aiming to address readability/encoding concerns around apostrophes.

Changes:

  • Replaced many inline-code backticks (for parameters, attributes, account names, and PowerShell cmdlets) with single quotes.
  • Updated several command/path examples and one placeholder (<fqdn>) representation.


- question: |
What applications take advantage of `domain_hint` or `login_hint` parameter capability of Seamless SSO?
What applications take advantage of 'domain_hint' or 'login_hint' parameter capability of Seamless SSO?
Copy link

Copilot AI Apr 27, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Use inline code formatting (backticks) for parameter names like domain_hint/login_hint; single quotes remove code styling and diverge from existing docs conventions (for example, how-to-connect-sso.md uses backticks for these parameters).

Suggested change
What applications take advantage of 'domain_hint' or 'login_hint' parameter capability of Seamless SSO?
What applications take advantage of `domain_hint` or `login_hint` parameter capability of Seamless SSO?

Copilot uses AI. Check for mistakes.
Comment on lines +79 to +84
How can I roll over the Kerberos decryption key of the 'AZUREADSSO' computer account?
answer: |
It's important to frequently roll over the Kerberos decryption key of the `AZUREADSSO` computer account (which represents Microsoft Entra ID) created in your on-premises AD forest.
It's important to frequently roll over the Kerberos decryption key of the 'AZUREADSSO' computer account (which represents Microsoft Entra ID) created in your on-premises AD forest.

>[!IMPORTANT]
>We highly recommend that you roll over the Kerberos decryption key at least every **30 days** using the `Update-AzureADSSOForest` cmdlet. When using the `Update-AzureADSSOForest` cmdlet, ensure that you *don't* run the `Update-AzureADSSOForest` command more than once per forest. Otherwise, the feature stops working until the time your users' Kerberos tickets expire and are reissued by your on-premises Active Directory.
>We highly recommend that you roll over the Kerberos decryption key at least every **30 days** using the 'Update-AzureADSSOForest' cmdlet. When using the 'Update-AzureADSSOForest' cmdlet, ensure that you *don't* run the 'Update-AzureADSSOForest' command more than once per forest. Otherwise, the feature stops working until the time your users' Kerberos tickets expire and are reissued by your on-premises Active Directory.
Copy link

Copilot AI Apr 27, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Use backticks for the computer account name (AZUREADSSO) and cmdlet name (Update-AzureADSSOForest). Single quotes drop the usual command/identifier styling and reduce scanability in a procedural FAQ.

Copilot uses AI. Check for mistakes.
Comment on lines +95 to +96
1. Navigate to the '$env:programfiles"\Microsoft Azure Active Directory Connect"' folder.
2. Import the Seamless SSO PowerShell module using this command: 'Import-Module .\AzureADSSO.psd1'.
Copy link

Copilot AI Apr 27, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The path shown as $env:programfiles"\Microsoft Azure Active Directory Connect" isn't valid PowerShell syntax. Consider showing it as a proper expandable string (for example, "$env:ProgramFiles\Microsoft Azure Active Directory Connect") or via Join-Path, and keep it in backticks for code formatting.

Suggested change
1. Navigate to the '$env:programfiles"\Microsoft Azure Active Directory Connect"' folder.
2. Import the Seamless SSO PowerShell module using this command: 'Import-Module .\AzureADSSO.psd1'.
1. Navigate to the `"$env:ProgramFiles\Microsoft Azure Active Directory Connect"` folder.
2. Import the Seamless SSO PowerShell module using this command: `Import-Module .\AzureADSSO.psd1`.

Copilot uses AI. Check for mistakes.
>The domain administrator account used must not be a member of the Protected Users group. If so, the operation fails.

2. Call `Update-AzureADSSOForest -OnPremCredentials $creds`. This command updates the Kerberos decryption key for the `AZUREADSSO` computer account in this specific AD forest and updates it in Microsoft Entra ID.
2. Call 'Update-AzureADSSOForest -OnPremCredentials $creds'. This command updates the Kerberos decryption key for the 'AZUREADSSO' computer account in this specific AD forest and updates it in Microsoft Entra ID.
Copy link

Copilot AI Apr 27, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The cmdlet call Update-AzureADSSOForest -OnPremCredentials $creds and the AZUREADSSO account name should be inline code (backticks). Using single quotes removes the standard command/identifier styling and makes the command harder to copy correctly.

Copilot uses AI. Check for mistakes.
Comment on lines +141 to +143
1. Navigate to the '$env:ProgramFiles"\Microsoft Azure Active Directory Connect"' folder.
2. Import the Seamless SSO PowerShell module using this command: 'Import-Module .\AzureADSSO.psd1'.
3. Run PowerShell as an Administrator. In PowerShell, call 'New-AzureADSSOAuthenticationContext'. This command should give you a popup to enter your tenant's Hybrid Identity Administrator credentials.
Copy link

Copilot AI Apr 27, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The Option B steps show $env:ProgramFiles"\Microsoft Azure Active Directory Connect" which isn't valid PowerShell syntax as written. Prefer an expandable string (for example, "$env:ProgramFiles\Microsoft Azure Active Directory Connect") or Join-Path, and keep module/cmdlet invocations in backticks rather than single quotes.

Copilot uses AI. Check for mistakes.
Does Seamless SSO support 'Alternate ID' as the username, instead of 'userPrincipalName'?
answer: |
Yes. Seamless SSO supports `Alternate ID` as the username when configured in Microsoft Entra Connect as shown [here](how-to-connect-install-custom.md). Not all Microsoft 365 applications support `Alternate ID`. Refer to the specific application's documentation for the support statement.
Yes. Seamless SSO supports 'Alternate ID' as the username when configured in Microsoft Entra Connect as shown [here](how-to-connect-install-custom.md). Not all Microsoft 365 applications support 'Alternate ID'. Refer to the specific application's documentation for the support statement.
Copy link

Copilot AI Apr 27, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Use inline code formatting (backticks) for identifiers like Alternate ID and userPrincipalName. Replacing backticks with single quotes removes monospace formatting and makes these look like prose rather than attribute names.

Suggested change
Yes. Seamless SSO supports 'Alternate ID' as the username when configured in Microsoft Entra Connect as shown [here](how-to-connect-install-custom.md). Not all Microsoft 365 applications support 'Alternate ID'. Refer to the specific application's documentation for the support statement.
Yes. Seamless SSO supports `Alternate ID` as the username when configured in Microsoft Entra Connect as shown [here](how-to-connect-install-custom.md). Not all Microsoft 365 applications support `Alternate ID`. Refer to the specific application's documentation for the support statement.

Copilot uses AI. Check for mistakes.
**Step 2. Update the Kerberos decryption key on each AD forest that it was set up on**

1. Call `$creds = Get-Credential`. When prompted, enter the Domain Administrator credentials for the intended AD forest.
1. Call '$creds = Get-Credential'. When prompted, enter the Domain Administrator credentials for the intended AD forest.
Copy link

Copilot AI Apr 27, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Commands like $creds = Get-Credential are currently wrapped in single quotes; these should be formatted as inline code (backticks) so they render as commands rather than quoted text.

Copilot uses AI. Check for mistakes.
4. Call 'Enable-AzureADSSO -Enable $false'.

At this point Seamless SSO is disabled but the domains remain configured in case you would like to enable Seamless SSO back. If you would like to remove the domains from Seamless SSO configuration completely, call the following cmdlet after you completed step 5 above: `Disable-AzureADSSOForest -DomainFqdn <fqdn>`.
At this point Seamless SSO is disabled but the domains remain configured in case you would like to enable Seamless SSO back. If you would like to remove the domains from Seamless SSO configuration completely, call the following cmdlet after you completed step 5 above: Disable-AzureADSSOForest -DomainFqdn "&lt;fqdn&gt;"
Copy link

Copilot AI Apr 27, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The Disable-AzureADSSOForest example lost inline code formatting and now contains an HTML-escaped placeholder ("<fqdn>") which will render incorrectly and is harder to copy. Use backticks and a literal placeholder. Also, this sentence references "step 5" even though Option B has 4 steps here—please correct the step reference.

Suggested change
At this point Seamless SSO is disabled but the domains remain configured in case you would like to enable Seamless SSO back. If you would like to remove the domains from Seamless SSO configuration completely, call the following cmdlet after you completed step 5 above: Disable-AzureADSSOForest -DomainFqdn "&lt;fqdn&gt;"
At this point Seamless SSO is disabled but the domains remain configured in case you would like to enable Seamless SSO back. If you would like to remove the domains from Seamless SSO configuration completely, call the following cmdlet after you complete step 4 above: `Disable-AzureADSSOForest -DomainFqdn "<fqdn>"`

Copilot uses AI. Check for mistakes.
Comment on lines +158 to +161
1. Navigate to the '$env:ProgramFiles"\Microsoft Azure Active Directory Connect"' folder.
2. Import the Seamless SSO PowerShell module using this command: 'Import-Module .\AzureADSSO.psd1'.
3. Run PowerShell as an Administrator. In PowerShell, call 'New-AzureADSSOAuthenticationContext'. This command should give you a popup to enter your tenant's Hybrid Identity Administrator credentials.
4. Call 'Get-AzureADSSOStatus | ConvertFrom-Json'. This command provides you with the list of AD forests (look at the "Domains" list) on which this feature has been enabled.
Copy link

Copilot AI Apr 27, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

These steps again show $env:ProgramFiles"\Microsoft Azure Active Directory Connect" (invalid PowerShell syntax) and wrap commands in single quotes. Please use a valid PowerShell path expression and format commands/identifiers as inline code (backticks).

Copilot uses AI. Check for mistakes.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants