Events
Apr 9, 3 PM - Apr 10, 12 PM
Code the Future with AI and connect with Java peers and experts at JDConf 2025.
Register NowThis browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
This article gives you technical details into how the Microsoft Entra seamless single sign-on (Seamless SSO) feature works.
This section has three parts to it:
Seamless SSO is enabled using Microsoft Entra Connect as shown here. While enabling the feature, the following steps occur:
AZUREADSSOACC
) is created in your on-premises Active Directory (AD) in each AD forest that you synchronize to Microsoft Entra ID (using Microsoft Entra Connect).Important
The AZUREADSSOACC
computer account needs to be strongly protected for security reasons. Only Domain Admins should be able to manage the computer account. Ensure that Kerberos delegation on the computer account is disabled, and that no other account in Active Directory has delegation permissions on the AZUREADSSOACC
computer account.. Store the computer account in an Organization Unit (OU) where they are safe from accidental deletions and where only Domain Admins have access. The Kerberos decryption key on the computer account should also be treated as sensitive. We highly recommend that you roll over the Kerberos decryption key of the AZUREADSSOACC
computer account at least every 30 days.
Important
Seamless SSO supports the AES256_HMAC_SHA1
, AES128_HMAC_SHA1
and RC4_HMAC_MD5
encryption types for Kerberos. It is recommended that the encryption type for the AzureADSSOAcc$
account is set to AES256_HMAC_SHA1
, or one of the AES types vs. RC4 for added security. The encryption type is stored on the msDS-SupportedEncryptionTypes
attribute of the account in your Active Directory. If the AzureADSSOAcc$
account encryption type is set to RC4_HMAC_MD5
, and you want to change it to one of the AES encryption types, please make sure that you first roll over the Kerberos decryption key of the AzureADSSOAcc$
account as explained in the FAQ document under the relevant question, otherwise Seamless SSO will not happen.
Once the set-up is complete, Seamless SSO works the same way as any other sign-in that uses integrated Windows authentication (IWA).
The sign-in flow on a web browser is as follows:
The user tries to access a web application (for example, the Outlook Web App - https://outlook.office365.com/owa/) from a domain-joined corporate device inside your corporate network.
If the user isn't already signed in, the user is redirected to the Microsoft Entra sign-in page.
The user types in their user name into the Microsoft Entra sign-in page.
Note
For certain applications, steps 2 & 3 are skipped.
Using JavaScript in the background, Microsoft Entra ID challenges the browser, via a 401 Unauthorized response, to provide a Kerberos ticket.
The browser, in turn, requests a ticket from Active Directory for the AZUREADSSOACC
computer account (which represents Microsoft Entra ID).
Active Directory locates the computer account and returns a Kerberos ticket to the browser encrypted with the computer account's secret.
The browser forwards the Kerberos ticket it acquired from Active Directory to Microsoft Entra ID.
Microsoft Entra ID decrypts the Kerberos ticket, which includes the identity of the user signed into the corporate device, using the previously shared key.
After evaluation, Microsoft Entra ID either returns a token back to the application or asks the user to perform additional proofs, such as multifactor authentication.
If the user sign-in is successful, the user is able to access the application.
The following diagram illustrates all the components and the steps involved.
Seamless SSO is opportunistic. This means that if it fails, the sign-in experience falls back to its regular behavior. In that case, the user needs to enter their password to sign in.
The sign-in flow on a native client is as follows:
The following diagram illustrates all the components and the steps involved.
Events
Apr 9, 3 PM - Apr 10, 12 PM
Code the Future with AI and connect with Java peers and experts at JDConf 2025.
Register Now