Skip to content

Commit 920f229

Browse files
authored
Merge pull request #7636 from jasonsandys-microsoft/patch-14
Update cloud-native-endpoints-on-premises.md
2 parents 18d74dc + d662e8a commit 920f229

1 file changed

Lines changed: 3 additions & 8 deletions

File tree

memdocs/cloud-native-endpoints-on-premises.md

Lines changed: 3 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -31,11 +31,6 @@ ms.collection:
3131

3232
# Cloud native endpoints and on-premises resources
3333

34-
**TO DO:**
35-
36-
- ??Answer some outstanding questions.??
37-
- ??In the "Authentication and access to on-premises resources" section, is there an image we can add? It might help??
38-
3934
> [!TIP]
4035
> [!INCLUDE [cloud-native-endpoints-definitions](./includes/cloud-native-endpoints-definitions.md)]
4136
@@ -83,7 +78,7 @@ The following list is a common set of on-premises resources that users can acces
8378

8479
The following steps describe how an Azure AD joined endpoint authenticates and accesses (based on permissions) an on-premises resource.
8580

86-
The following steps are an overview. For more specific information, see [Primary Refresh Token (PRT) and Azure AD](/azure/active-directory/devices/concept-primary-refresh-token).
81+
The following steps are an overview. For more specific information, including detailed swimlane graphics describing the full process, see [Primary Refresh Token (PRT) and Azure AD](/azure/active-directory/devices/concept-primary-refresh-token).
8782

8883
1. When users sign in, their credentials are sent to the Cloud Authentication Provider (CloudAP) and the Web Account Manager (WAM).
8984

@@ -112,11 +107,11 @@ The following steps are an overview. For more specific information, see [Primary
112107
>
113108
> [MS-PKCA: Public Key Cryptography for Initial Authentication (PKINIT) in Kerberos Protocol](/openspecs/windows_protocols/ms-pkca/d0cf1763-3541-4008-a75f-a577fa5e8c5b)
114109
115-
6. The DC authenticates the user. The DC returns a Kerberos Ticket-Granting Ticket (TGT) or a NTLM token based on the protocol that the on-premises resource or application supports (which Windows caches). ??Caches what specifically??
110+
6. The DC authenticates the user. The DC returns a Kerberos Ticket-Granting Ticket (TGT) or a NTLM token based on the protocol that the on-premises resource or application supports (Windows caches the returned TGT or NTLM token for future use).
116111

117112
If the attempt to get the Kerberos TGT or NTLM token for the domain fails (related DCLocator timeout can cause a delay), then Windows Credential Manager retries. Or, the user may receive an authentication pop-up requesting credentials for the on-premises resource.
118113

119-
7. All apps that use [Windows Integrated Authentication (WIA)](/aspnet/web-api/overview/security/integrated-windows-authentication) automatically get SSO when a user tries to access the apps. **This** includes standard user authentication to an on-premises AD domain using NTLM or Kerberos when accessing on-premises services or resources. ??What's meant by 'this'? Do you mean SSO??
114+
7. All apps that use [Windows Integrated Authentication (WIA)](/aspnet/web-api/overview/security/integrated-windows-authentication) automatically use SSO when a user tries to access the apps. Windows integrated authentication includes standard user authentication to an on-premises AD domain using NTLM or Kerberos when accessing on-premises services or resources.
120115

121116
For more information, see [How SSO to on-premises resources works on Azure AD joined devices](/azure/active-directory/devices/azuread-join-sso).
122117

0 commit comments

Comments
 (0)