Configure
Prerequisites
To perform the configuration, you first need to register an application in your Azure Active Directory tenant (to allow AzureCP to query it).
Configure with administration pages
AzureCP comes with 2 administration pages added in central administration > Security:
- Global configuration: Add / remove Azure AD tenants and configure various settings.
- Claim types configuration: Define the claim types, and their mapping with Azure AD users and groups.
Configure with PowerShell
Starting with v12, AzureCP can be configured with PowerShell:
AzureCP configuration is stored as a persisted object in the SharePoint configuration database, and can be returned with this SQL command:
Configure proxy for internet access
AzureCP may be used by each SharePoint process (w3wp, owstimer) on any server, so they all need to be able to connect to Azure AD, which is comprised of various endpoints that depend on the region of your Azure AD tenant. Windows also needs to be able to validate the certificates.
Configure the proxy for SharePoint processes
If SharePoint servers connect to internet through a proxy, additional configuration is required in the configuration files:
This configuration must be set on the following processes, on all SharePoint servers of the farm:
- SharePoint sites that use AzureCP
- SharePoine central administration site
- SharePoint STS located in 16\WebServices\SecurityToken
- SharePoint Web Services root site
- SharePoint Timer service (if necessary, create file owstimer.exe.config in 16\BIN)
Configure the proxy for Windows processes
Connection to Azure AD is secured, and Windows validates all certificates in the chain.
If Windows cannot validate them, the usual symptom is a hang during 1 minute upon sign-in, and errors are recorded in CAPI2 event log.
Certificate validation is performed by lsass.exe, which uses the proxy configuration set with netsh.exe: