Skip to content

Deyda.net

Deyda Consulting Blog

  • Start Page
  • Consulting
  • About me
    • Privacy Policy
    • Imprint
    • Contact me
    • GitHub
  • NeverRed – Update your Software, the lazy way
    • NeverRed – Changelog
  • LinkedIn
  • Xing
  • Instagram
  • Twitter
  • E-Mail
Deyda.net

Activation of Azure AD Seamless Single Sign-On

Table of Contents

  • Seamless Single Sign-On
    • Advantage
    • Sequence of authentication with a web application
      • EXAMPLE ADDRESSES FOR DOMAIN_HINT & LOGIN_HINT
    • Sequence of authentication with a native app
  • Activation Seamless SSO – AD Connect
    • Requirement
    • Activating Pass-through authentication
    • Activating Password Hash Synchronization
  • Local Active Directory
  • Azure Portal
  • Group Policy Object
  • Renew the Kerberos Decryption Key
  • Result
    • Scenario 1 – Company network with company address
    • Scenario 2 – Company network with general address
    • Scenario 3 – Outside company network with company address

For quite some time (Beginning of 2017) it is now possible to solve SSO scenarios with Azure even without ADFS infrastructure. However, it is only recently that companies has started to not insist on ADFS. Now one may finally also point out the alternative solutions of Microsoft.

The possible scenarios for Seamless SSO are:

  • Pass-through authentication (PTA)
  • Password Hash Sync (PHS)

Pass-through authentication (PTA)

Disadvantages

  • No automatic detection of leaked login data
  • Azure AD DS requires enabled Password Hash Synchronization feature in tenant to work
  • Is not part of Azure AD Connect Health

Password Hash Sync (PHS)

“Disadvantage“

  • Password is synchronized to the cloud (as hash value)

Seamless Single Sign-On

Seamless Single Sign-On automatically logs users on to certain websites (e.g. myapps.microsoft.com) and native applications (e.g. Office365 Outlook) when they are in the corporate network (local, VPN or Direct Access) with their corporate device.

Users do not need to enter their password to log in to Azure AD and usually do not even need to enter their username (for domain hint addresses).

It is important that it provides easy access without the need for additional local components such as ADFS.

Advantage

  • Users don’t have to enter their password all the time
  • No additional local components required
  • Can be introduced for some or all users using a Group Policy
  • No further license costs
  • Can be easily activated via AD Connect
  • Username can be the local default username (UPN) or another LDAP attribute configured in Azure AD Connect
  • If an error occurs for any reason, the regular user logon is performed, e.g. users must enter their password on the logon page
  • If an application forwards the domain_hint parameter or the login_hint parameter in the Azure AD logon request, users are automatically logged on without entering a user name or password.

Sequence of authentication with a web application

Sequence of Seamless SSO
  1. The user tries to access a web application (e.g. https://myapps.microsoft.com/) via a domain computer in the corporate network (Local, VPN or Direct Access)
  2. If the user is not already logged in, the user will be redirected to the Azure AD logon page
  3. The user enters his user name on the Azure AD login page
  4. When JavaScript is used in the background, Azure AD prompts the browser to provide a Kerberos ticket via a 401 – Unauthorized response
  5. The browser again requests a ticket from Active Directory for the AZUREADSSOACC computer account (which Azure AD creates when Seamless SSO is enabled in the local AD).
  6. Active Directory searches for the computer account and returns a Kerberos ticket to the browser encrypted with the computer account’s Azure AD Decryption Key.
  7. The browser forwards the Kerberos ticket retrieved from Active Directory to Azure AD.
  8. Azure AD decrypts the Kerberos ticket, which contains the identity of the logged-on user, using the exchanged decryption key of the AZUREADSSOACC computer account
  9. After evaluation, Azure AD either returns a token to the application or prompts the user to provide additional evidence, such as multi-factor authentication.
  10. If the login is successful, the user can access the application

Note: If under point 1 an address is used which contains a domain_hint or login_hint parameter function. If points 2 & 3 are skipped.

EXAMPLE ADDRESSES FOR DOMAIN_HINT & LOGIN_HINT

Microsoft Access Panel
https://myapps.microsoft.com/<Azure AD Domain>https://myapps.microsoft.com/deyda.net
Web Outlook
https://outlook.office365.com/<Azure AD Domain>https://outlook.office365.com/deyda.net
Office365 Portal
https://portal.office.com?domain_hint=<Azure AD Domain>https://www.office.com?domain_hint=deyda.net
https://www.office.com?domain_hint=<Azure AD Domain>https://portal.office.com?domain_hint=deyda.net
Azure Portal
https://portal.azure.com/<Azure AD Domain>https://portal.azure.com/deyda.net

Sequence of authentication with a native app

Sequence of Seamless SSO
  1. The user starts a native application (e.g. Office365 Word Client) via a domain computer in the company network (Local, VPN or Direct Access)
  2. If the user is not already logged in, Word retrieves the user name from the Windows session of the device
  3. The app sends the username to Azure AD and gets back the WS-Trust-MEX endpoint of the tenant
  4. Word queries the WS Trust MEX endpoint to determine if the Integrated Authentication Endpoint (IWA) is available
  5. If step 4 is successful, a Kerberos request is executed to the local Active Directory
  6. The received Kerberos ticket will be forwarded to the IWA of Azure AD
  7. Azure AD decrypts and verifies the Kerberos ticket
  8. Azure AD sign on the user and outputs a SAML token for the app
  9. Word then transmit the SAML token to the OAuth2 token endpoint of Azure AD
  10. Azure AD checks the SAML token and issues an access token to the app, as well as an update token & an ID token for the specified resource
  11. The user gets access to the resource of the app

Activation Seamless SSO – AD Connect

I will now show you how to enable Pass-through authentication and Password Hash Synchronization. Only one feature is needed to use Seamless SSO.

Requirement

  • AD Connect version installed and configured > 1.1.644.0
  • Firewall release for *.msappproxy.net on port 443
  • Domain administrator credentials for the domains that connected to Azure AD via AD Connect
  • Office Version > 16.0.8730
  • Users need to work on a computer that is a domain member
  • Computer must have a connection to the domain (Local, VPN or Direct Access)
  • Internet Explorer may not in Enhanced Protected Mode

Activating Pass-through authentication

To enable Pass-through authentication, connect to the AD member on which AD Connect is installed.

  • Start Azure AD Connect
Azure AD Connect
  • Click on Configure in the Welcome Screen
Welcome to Azure AD Connect
  • Now click on Change user sign-in and confirm this with Next
Additional tasks Change user sign-in
  • Enter the credentials of the Global Administrator and confirm the entry with Next
Connect to Azure AD Global Administrator
  • Possibly another login mask is requested because of an MFA
Bei ihrem Konto anmelden
  • Select Pass-through authentication and then Enable single sign-on. Confirm with Next
User sign-in Pass-through authentication
  • Under Single single-on click on Enter credentials
Single sign-on Enable single sign-on Enter credentials
  • In the following windows, enter the credentials of a local domain administrator and click OK
Forest Credentials Domain
  • Click on Configure to perform the described actions
Configure Ready to configure
  • Confirm the successful execution in the Configuration complete window with Exit
Configuration complete

Activating Password Hash Synchronization

To activate Password Hash Synchronization connect to the AD member on which AD Connect is installed.

  • Start Azure AD Connect
Azure AD Connect
  • Click on Configure in the Welcome Screen
Welcome to Azure AD Connect
  • Now click on Change user sign-in and confirm this with Next
Additional tasks Change user sign-in
  • Enter the credentials of the Global Administrator and confirm the entry with Next
Connect to Azure AD Global Administrator
  • Possibly another login mask is requested because of an MFA
Bei ihrem Konto anmelden
  • Select Password Hash Synchronization and then Enable single sign-on. Confirm with Next
User sign-in Password Hash Synchronization
  • Under Single single-on click on Enter credentials
Single sign-on Enable single sign-on Enter credentials
  • In the following windows, enter the credentials of a local domain administrator and click OK
Forest Credentials Domain
  • Click on Configure to perform the described actions
Configure Ready to configure
  • Confirm the successful execution in the Configuration complete window with Exit
Configuration complete

Local Active Directory

In the local Active Directory you can now find a new computer object called AZUREADSSOACC. This object should be protected from deletion.

Active Directory Users and COmputers AZUREADSSOACC

Azure Portal

In the Azure Portal you can also see the activated Seamless SSO methods.

  • In the Azure Portal, click on Azure Active Directory > Azure AD Connect
Azure Portal Azure Active Directory Azure AD Connect
  • Now click on the method set up via Azure AD Connect
Azure AD Connect User Sign-In

Under Seamless single sign-on you can see the domains created with Password Hash Synchronization.

Seamless single sign-on

With Pass-through authentication, a Warning Symbol is displayed because the agent is only stored on one server.

Pass-through Authentication

According to Microsoft this should be distributed on 3 internal servers.

Pass-through Authentication

Group Policy Object

In order for Seamless SSO to work on the end devices, some settings still have to be distributed via GPOs.

  • Connect to a computer that has the Group Policy Management Console installed.
Group Policy Management
  • Now adds the following settings to an existing or a new GPO
  • In the GPO, go to User / Computer Configuration > Adminstrative Templates > Windows Components > Internet Explorer > Internet Control Panel > Security Page and edit the Site to Zone Assignment List with the following values
Value NameValue
login.microsoftonline.com3
aadg.windows.net.nsatc.net1
autologon.microsoftazuread-sso.com1
secure.aadcdn.microsoftonline-p.com1
device.login.microsoftonline.com1

Note: If Seamless SSO is to be disabled for individual groups or users, the GPO must be turned to the Value 4 for these people.

Site to Zone Assignment List
  • Then go to the path User / Computer Configuration > Adminstrative Templates > Windows Components > Internet Explorer > Internet Control Panel > Security Page > Intranet Zone and set the Allow updates to status bar via script entry to Enabled
Allow updates to status bar via script

Renew the Kerberos Decryption Key

Microsoft recommends rolling out the Kerberos Decyption Key at least every 30 days.

This reduces the risk of spying on the Kerberos Decryption Key.

Microsoft is working on the introduction of an automated function to perform this task.

To renew the Kerberos Decryption Key of the AZUREADSSOACC computer account, you must first download the Azure AD PowerShell module from the PowerShell Gallery.

Start PowerShell as the administrator on the computer on which AD Connect is installed and run the following command:

PowerShell
1
Install-Module MSOnline
Install-Module MSOnline

Navigate to the path C:\Program Files\Microsoft Azure Active Directory Connect and import the module AzureADSSO.psd1

AzureADSSO.psd1

Execute the New-AzureADSSOAuthenticationContext command

New-AzureADSSOAuthenticationContext

Enter the credentials of an Azure administrator in the following window.

Then run Get-AzureADSSOStatus. This checks which domains are stored and activated in the Seamless SSO tenant.

Get-AzureADSSOStatus

Then run the command $passwd = Get-Credential and enter the credentials of a local domain administrator in the following window.

$passwd = Get-Credential

Finally, executes the following command to complete the update of the Decryption Key of the AZUREADSSOACC computer account.

PowerShell
1
Update-AzureADSSOForest -OnPremCredentials $passwd
Update-AzureADSSOForest -OnPremCredentials $passwd

This must be done for all domains configured for Seamless SSO.

Result

After a gpupdate /force has been performed on the end devices, we can start testing.

Scenario 1 – Company network with company address

Scenario is a computer (Domain Member) in the corporate network that opens the following page via Internet Explorer:

https://myapps.microsoft.com/deyda.net

domain_hint Web Site

You are logged in directly, without entering your username or password, via Seamless SSO and can use your resources (e.g. Citrix FAS) directly.

Domain_Hint Web Sote succesfull

Scenario 2 – Company network with general address

Scenario is a computer (Domain Member) in the corporate network that opens the following page via Internet Explorer:

https://myapps.microsoft.com/

Web Site

You will be asked to enter a user name.

Web Site

Then you are logged in via Seamless SSO without entering your password and can use your resources (e.g. Citrix FAS) directly.

myapps.microsoft.com

Scenario 3 – Outside company network with company address

Scenario is a computer (Domain Member) outside the corporate network that opens the following page via Internet Explorer:

https://myapps.microsoft.com/deyda.net

You will be asked to enter a user name.

You will then be prompted to enter a password.

You will then be redirected to the stored resources.

Teilen mit:

  • Click to share on X (Opens in new window) X
  • Click to share on X (Opens in new window) X
  • Click to share on Bluesky (Opens in new window) Bluesky
  • Click to share on Mastodon (Opens in new window) Mastodon
  • Click to share on Threads (Opens in new window) Threads
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print

Like this:

Like Loading...

Related posts:

  1. SAML Authentication with Azure AD as IdP and Citrix as SP
  2. Why a Windows Server 2019 VDI should be Hybrid Azure AD joined
  3. Citrix ADC as initial IdP for Office365
  4. Microsoft Azure MFA Server in Citrix ADC
Author Manuel WinkelPosted on July 18, 2019December 11, 2020Categories Azure, Citrix, Microsoft, Office365, Virtual Apps and DesktopsTags Azure, Azure Active Directory, Azure AD, Azure AD Connect, Azure AD DS, AZUREADSSOACC, Citrix, Domain_Hint, Kerberos Decryption Key, Login_Hint, Microsoft, myapps.microsoft.com, Office365, Pass-through authentication, Password Hash Synchronization, PHS, PTA, SAML, Seamless Single-Sign On, Seamless SSO, Single-Sign On, Tenant, UPN

Post navigation

Previous Previous post: SAML Authentication with Azure AD as IdP and Citrix as SP
Next Next post: Upgrade from Citrix Virtual Apps and Desktops Current Release

Sprachen

  • Deutsch
  • English

Manuel Winkel Follow

Citrix Technology Professional (CTP) - Presales Engineer at @ControlUp - Deyda Consulting - CCE-V - CCE-N - CCP-M - MCSA - MCSE - Father of 3

Deyda84
etguenni Günter Born @etguenni ·
9 Jun

Im Oktober 2025 fallen Windows 10, Office 2016/2019, Exchange 2016/2019 aus dem Support. Für Windows 10 gibt es Lösungen.

https://www.borncity.com/blog/2025/06/08/14-oktober-2025-support-ende-fuer-windows-10-und-weitere-software/

Reply on Twitter 1932132260850917407 Retweet on Twitter 1932132260850917407 3 Like on Twitter 1932132260850917407 6 Twitter 1932132260850917407
samilaiho Sami Laiho @samilaiho ·
11 May

Microsoft Teams will soon block screen capture during meetings

Reply on Twitter 1921554453368328452 Retweet on Twitter 1921554453368328452 7 Like on Twitter 1921554453368328452 20 Twitter 1921554453368328452
christian_joens Christian Jöns @christian_joens ·
1 Mar

🚨🚨🚨 Check your Citrix License Servers.
We had issues with Build 51000 that the License are no longer available. Downgrade to Build 49000 as Workaround #citrix

Reply on Twitter 1895743833176240488 Retweet on Twitter 1895743833176240488 8 Like on Twitter 1895743833176240488 23 Twitter 1895743833176240488
Load More...

Categories

  • Basic (1)
  • Citrix (42)
    • ADC (13)
    • StoreFront (3)
    • Virtual Apps and Desktops (20)
    • WEM (13)
  • Microsoft (20)
    • Azure (8)
    • Exchange (1)
    • FSLogix (4)
    • Office365 (11)
    • PowerShell (3)
    • SQL (2)
  • NVIDIA (1)

Tag Cloud

NetScaler Azure AD Unified Gateway Intelligent Memory Optimization UPM AppLocker Windows Server Virtual Desktop ADMX XenApp Remote Desktop Office XenDesktop Norskale Broker Service StoreFront SQL Express Canonical Name Microsoft Applet Name Single-Sign On FSLogix SAML Administration Console Citrix Gateway PowerShell Citrix Configuration Set Workspace Environment Management Active Directory Performance Management User Environment Management Virtual Apps Intelligent I/O Optimization NetScaler LoadBalancer Universal Profile Management WEM Citrix ADC UEM Intelligent CPU Optimization Upgrade Teams Folder Redirection NetScaler Gateway Office365 SQL Server

Recent Posts

  • Install new Microsoft Teams (version 2) in Citrix May 17, 2024
  • Checklist for NetScaler (Citrix ADC) CVE-2023-4966 December 12, 2023
  • SAML Authentication between Citrix & Microsoft with Azure MFA September 8, 2023
  • Checklist for NetScaler (Citrix ADC) CVE-2023-3519 July 19, 2023
  • Web Authentication Action in NetScaler October 13, 2022

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
  • Start Page
  • Consulting
  • About me
    • Privacy Policy
    • Imprint
    • Contact me
    • GitHub
  • NeverRed – Update your Software, the lazy way
    • NeverRed – Changelog
  • LinkedIn
  • Xing
  • Instagram
  • Twitter
  • E-Mail
Deyda.net Privacy Policy Proudly powered by WordPress
%d