
FSPs are used in Active Directory Domain Services (AD DS) to represent members from other forests in a security group. Multiple forests: match usersĬommon to all these scenarios is that distribution and security groups can contain a mix of users, contacts, and Foreign Security Principals (FSPs). In the preceding picture, each object in every forest is represented once in the metaverse and aggregated in the target Azure AD tenant. These forests are in the same organization in Azure AD and appear with a unified GAL. This topology might be the situation after a merger/acquisition or in an organization where each business unit operates independently. Each forest has its own Exchange organization, and there's no GALSync between the forests. In this environment, all on-premises forests are treated as separate entities. (While not supported, this still works.) Multiple forests, single sync server, users are represented in only one directory This topology differs from the one below in that multiple sync servers connected to a single Azure AD tenant is not supported. The exception is the use of a staging server. Having more than one Azure AD Connect sync server connected to a single Azure AD tenant is not supported. Multiple forests, multiple sync servers to one Azure AD tenant You can find more details in Understanding the default configuration. This change is intentionally a different behavior to better support multiple-forest scenarios. A linked mailbox in DirSync is always represented as a normal mailbox. The user account is not represented as a member in any group. A linked mailbox with no other active account is not exported to Azure AD.If you have more than one active account or more than one mailbox, the sync engine picks one and ignores the other.If your environment does not match these assumptions, the following things happen: If you have a linked mailbox, there's also an account in a different forest used for sign-in.If there's no mailbox for the user, any forest can be used to contribute these attribute values. The forest that hosts the mailbox for a user has the best data quality for attributes visible in the Exchange Global Address List (GAL).UserPrincipalName and sourceAnchor/immutableID come from this forest.
#MULTIPLE VLC INSTANCES PASSWORD#
This assumption is for password hash sync, pass-through authentication and federation. Each user has only one enabled account, and the forest where this account is located is used to authenticate the user.The default configuration in Azure AD Connect sync assumes:
#MULTIPLE VLC INSTANCES FULL#
Duplicated groups are not consolidated with the default configuration.Ĭommon topologies are discussed in the sections about separate topologies, full mesh, and the account-resource topology. The consolidation is configured only for users. On the Uniquely identifying your users page, select the corresponding option that represents your topology. There are some common topologies that you can configure in the custom installation path in the installation wizard. The goal is that a user is represented only once in Azure AD. The Azure AD Connect installation wizard offers several options to consolidate users who are represented in multiple forests.

If necessary to reach all forests, you can place the server in a perimeter network (also known as DMZ, demilitarized zone, and screened subnet). When you have multiple forests, all forests must be reachable by a single Azure AD Connect sync server. Typical examples are designs with account-resource forests and the result of a merger or acquisition. There are various reasons for having more than one on-premises Active Directory forest. Many organizations have environments with multiple on-premises Active Directory forests. (No errors occur when a new Azure AD Sync Server is configured for a new Azure AD forest and a new verified child domain.) Multiple forests, single Azure AD tenant You might have considered this topology if you can't reach all domains in the forest from a single server, or if you want to distribute load across several servers. It's unsupported even if these servers are configured to synchronize with a mutually exclusive set of objects. Having multiple Azure AD Connect sync servers connected to the same Azure AD tenant is not supported, except for a staging server. Single forest, multiple sync servers to one Azure AD tenant

The express installation of Azure AD Connect supports only this topology.


For Azure AD authentication, password hash synchronization is used. The most common topology is a single on-premises forest, with one or multiple domains, and a single Azure AD tenant. As a result, Microsoft can't provide technical support for such deployments. Any of these configurations or actions might result in an inconsistent or unsupported state of Azure AD Connect sync. Microsoft doesn't support modifying or operating Azure AD Connect sync outside of the configurations or actions that are formally documented.
