If you have read this blog post, at some point you will need to create a Service Connection Point (SCP), so that your clients know where to find the Azure AD Tenant those clients should register in. In that blog post, and that was the only possibility since the beginning, you create the SCP in the configuration partition of the AD forest.
If your AD forest had to be serviced by just a single Azure AD tenant, you were good to go. If not, you would have a problem.
If you wanted to have all your Windows clients register at at once in the Azure AD tenant you were good to go. If you wanted to deploy in a phased manner, you would have a problem!
–
Therefore if you need to deploy different Hybrid Azure AD Join settings to your Windows clients, and/or you need to deploy in a phased manner, you can provide the SCP settings in a GPO to configure the required REGISTRY settings.
–
Clear the SCP from AD
Use the Active Directory Services Interfaces Editor (ADSI Edit) to modify the SCP objects in AD.
- Launch the ADSI Edit desktop application from and administrative workstation or a domain controller as an Enterprise Administrator.
- Connect to the Configuration Naming Context of your domain.
- Browse to CN=Configuration,DC=contoso,DC=com > CN=Services > CN=Device Registration Configuration
- Right click on the leaf object under CN=Device Registration Configuration and select Properties
- Select keywords from the Attribute Editor window and click Edit
- Select the values of azureADId and azureADName (one at a time) and click Remove
- Close ADSI Edit
–
Configure client-side registry setting for SCP
Use the following example to create a Group Policy Object (GPO) to deploy a registry setting configuring an SCP entry in the registry of your devices.
- Open a Group Policy Management console and create a new Group Policy Object in your domain.
- Provide your newly created GPO a name (for example, ClientSideSCP).
- Edit the GPO and locate the following path: Computer Configuration > Preferences > Windows Settings > Registry
- Right-click on the Registry and select New > Registry Item
- On the General tab, configure the following
- Action: Update
- Hive: HKEY_LOCAL_MACHINE
- Key Path: SOFTWARE\Microsoft\Windows\CurrentVersion\CDJ\AAD
- Value name: TenantId
- Value type: REG_SZ
- Value data: The GUID or Directory ID of your Azure AD instance (This value can be found in the Azure portal > Azure Active Directory > Properties > Directory ID)
- Click OK
- On the General tab, configure the following
- Right-click on the Registry and select New > Registry Item
- On the General tab, configure the following
- Action: Update
- Hive: HKEY_LOCAL_MACHINE
- Key Path: SOFTWARE\Microsoft\Windows\CurrentVersion\CDJ\AAD
- Value name: TenantName
- Value type: REG_SZ
- Value data: Your verified domain name if you are using federated environment such as AD FS. Your verified domain name or your onmicrosoft.com domain name for example, contoso.onmicrosoft.com if you are using managed environment (in case of PHS or PTA as the primary Auth)
- Click OK
- On the General tab, configure the following
- Close the editor for the newly created GPO
- Link the newly created GPO to the desired OU containing domain-joined computers that belong to your controlled rollout population
–
PS: if you are using ADFS, that same GPO must ALSO target the ADFS Servers!
–
More information: Controlled validation of hybrid Azure AD join
–
Cheers,
Jorge
————————————————————————————————————————————————————-
This posting is provided "AS IS" with no warranties and confers no rights!
Always evaluate/test everything yourself first before using/implementing this in production!
This is today’s opinion/technology, it might be different tomorrow and will definitely be different in 10 years!
DISCLAIMER: https://jorgequestforknowledge.wordpress.com/disclaimer/
————————————————————————————————————————————————————-
########################### Jorge’s Quest For Knowledge ##########################
#################### http://JorgeQuestForKnowledge.wordpress.com/ ###################
————————————————————————————————————————————————————-