Skip to content

Commit 1085bb0

Browse files
authored
Merge pull request #4004 from MicrosoftDocs/FromPrivateRepo
From private repo
2 parents e0e4743 + 05c9c02 commit 1085bb0

File tree

150 files changed

+2236
-527
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

150 files changed

+2236
-527
lines changed

articles/active-directory-domain-services/active-directory-ds-networking.md

Lines changed: 34 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Networking considerations for Azure Active Directory Domain Service
44
services: active-directory-ds
55
documentationcenter: ''
66
author: mahesh-unnikrishnan
7-
manager: stevenpo
7+
manager: mahesh-unnikrishnan
88
editor: curtand
99

1010
ms.assetid: 23a857a5-2720-400a-ab9b-1ba61e7b145a
@@ -13,7 +13,7 @@ ms.workload: identity
1313
ms.tgt_pltfrm: na
1414
ms.devlang: na
1515
ms.topic: article
16-
ms.date: 09/23/2017
16+
ms.date: 12/01/2017
1717
ms.author: maheshu
1818

1919
---
@@ -36,7 +36,7 @@ The following guidelines help you select a virtual network to use with Azure AD
3636
* See the [Azure services by region](https://azure.microsoft.com/regions/#services/) page to know the Azure regions in which Azure AD Domain Services is available.
3737

3838
### Requirements for the virtual network
39-
* **Proximity to your Azure workloads**: Select the virtual network that currently hosts/will host virtual machines that need access to Azure AD Domain Services. You may also choose to connect virtual networks if your workloads are deployed in a different virtual network than the managed domain.
39+
* **Proximity to your Azure workloads**: Select the virtual network that currently hosts/will host virtual machines that need access to Azure AD Domain Services. If your workloads are deployed in a different virtual network than the managed domain, you may also choose to connect the virtual networks.
4040
* **Custom/bring-your-own DNS servers**: Ensure that there are no custom DNS servers configured for the virtual network. An example of a custom DNS server is an instance of Windows Server DNS running on a Windows Server VM that you have deployed in the virtual network. Azure AD Domain Services does not integrate with any custom DNS servers deployed within the virtual network.
4141
* **Existing domains with the same domain name**: Ensure that you do not have an existing domain with the same domain name available on that virtual network. For instance, assume you have a domain called 'contoso.com' already available on the selected virtual network. Later, you try to enable an Azure AD Domain Services managed domain with the same domain name (that is 'contoso.com') on that virtual network. You encounter a failure when trying to enable Azure AD Domain Services. This failure is due to name conflicts for the domain name on that virtual network. In this situation, you must use a different name to set up your Azure AD Domain Services managed domain. Alternately, you can de-provision the existing domain and then proceed to enable Azure AD Domain Services.
4242

@@ -45,12 +45,11 @@ The following guidelines help you select a virtual network to use with Azure AD
4545
>
4646
>
4747
48-
## Network Security Groups and subnet design
49-
A [Network Security Group (NSG)](../virtual-network/virtual-networks-nsg.md) contains a list of Access Control List (ACL) rules that allow or deny network traffic to your VM instances in a Virtual Network. NSGs can be associated with either subnets or individual VM instances within that subnet. When an NSG is associated with a subnet, the ACL rules apply to all the VM instances in that subnet. In addition, traffic to an individual VM can be restricted further by associating an NSG directly to that VM.
48+
49+
## Guidelines for choosing a subnet
5050

5151
![Recommended subnet design](./media/active-directory-domain-services-design-guide/vnet-subnet-design.png)
5252

53-
### Guidelines for choosing a subnet
5453
* Deploy Azure AD Domain Services to a **separate dedicated subnet** within your Azure virtual network.
5554
* Do not apply NSGs to the dedicated subnet for your managed domain. If you must apply NSGs to the dedicated subnet, ensure you **do not block the ports required to service and manage your domain**.
5655
* Do not overly restrict the number of IP addresses available within the dedicated subnet for your managed domain. This restriction prevents the service from making two domain controllers available for your managed domain.
@@ -61,20 +60,40 @@ A [Network Security Group (NSG)](../virtual-network/virtual-networks-nsg.md) con
6160
>
6261
>
6362
64-
### Ports required for Azure AD Domain Services
63+
## Ports required for Azure AD Domain Services
6564
The following ports are required for Azure AD Domain Services to service and maintain your managed domain. Ensure that these ports are not blocked for the subnet in which you have enabled your managed domain.
6665

67-
| Port number | Purpose |
68-
| --- | --- |
69-
| 443 |Synchronization with your Azure AD tenant |
70-
| 3389 |Management of your domain |
71-
| 5986 |Management of your domain |
72-
| 636 |Secure LDAP (LDAPS) access to your managed domain |
66+
| Port number | Required? | Purpose |
67+
| --- | --- | --- |
68+
| 443 | Mandatory |Synchronization with your Azure AD tenant |
69+
| 5986 | Mandatory | Management of your domain |
70+
| 3389 | Optional | Management of your domain |
71+
| 636 | Optional | Secure LDAP (LDAPS) access to your managed domain |
72+
73+
**Port 443 (Synchronization with Azure AD)**
74+
* It is used to synchronize your Azure AD directory with your managed domain.
75+
* It is mandatory to allow access to this port in your NSG. Without access to this port, your managed domain is not in sync with your Azure AD directory. Users may not be able to sign in as changes to their passwords are not synchronized to your managed domain.
76+
* You can restrict inbound access to this port to IP addresses belonging to the Azure IP address range.
7377

74-
Port 5986 is used to perform management tasks using PowerShell remoting on your managed domain. The domain controllers for your managed domain do not usually listen on this port. The service opens this port on managed domain controllers only when a management or maintenance operation needs to be performed for the managed domain. As soon as the operation completes, the service shuts down this port on the managed domain controllers.
78+
**Port 5986 (PowerShell remoting)**
79+
* It is used to perform management tasks using PowerShell remoting on your managed domain.
80+
* It is mandatory to allow access through this port in your NSG. Without access to this port, your managed domain cannot be updated, configured, backed-up, or monitored.
81+
* You can restrict inbound access to this port to the following source IP addresses: 52.180.183.8, 23.101.0.70, 52.225.184.198, 52.179.126.223, 13.74.249.156, 52.187.117.83, 52.161.13.95, 104.40.156.18, 104.40.87.209, 52.180.179.108, 52.175.18.134, 52.138.68.41, 104.41.159.212, 52.169.218.0, 52.187.120.237, 52.161.110.169, 52.174.189.149, 13.64.151.161
82+
* The domain controllers for your managed domain do not usually listen on this port. The service opens this port on managed domain controllers only when a management or maintenance operation needs to be performed for the managed domain. As soon as the operation completes, the service shuts down this port on the managed domain controllers.
7583

76-
Port 3389 is used for remote desktop connections to your managed domain. This port also remains largely turned off on your managed domain. The service enables this port only if we need to connect to your managed domain for troubleshooting purposes, initiated in response to a service request you initiate. This mechanism is not used on an ongoing basis since management and monitoring tasks are performed using PowerShell remoting. This port is used only in the rare event that we need to connect remotely to your managed domain for advanced troubleshooting. The port is closed as soon as the troubleshooting operation is complete.
84+
**Port 3389 (Remote desktop)**
85+
* It is used for remote desktop connections to domain controllers for your managed domain.
86+
* Opening this port through your NSG is optional.
87+
* This port also remains largely turned off on your managed domain. This mechanism is not used on an ongoing basis since management and monitoring tasks are performed using PowerShell remoting. This port is used only in the rare event that Microsoft needs to connect remotely to your managed domain for advanced troubleshooting. The port is closed as soon as the troubleshooting operation is complete.
7788

89+
**Port 636 (Secure LDAP)**
90+
* It is used to enable secure LDAP access to your managed domain over the internet.
91+
* Opening this port through your NSG is optional. Open the port only if you have secure LDAP access over the internet enabled.
92+
* You can restrict inbound access to this port to the source IP addresses from which you expect to connect over secure LDAP.
93+
94+
95+
## Network Security Groups
96+
A [Network Security Group (NSG)](../virtual-network/virtual-networks-nsg.md) contains a list of Access Control List (ACL) rules that allow or deny network traffic to your VM instances in a Virtual Network. NSGs can be associated with either subnets or individual VM instances within that subnet. When an NSG is associated with a subnet, the ACL rules apply to all the VM instances in that subnet. In addition, traffic to an individual VM can be restricted further by associating an NSG directly to that VM.
7897

7998
### Sample NSG for virtual networks with Azure AD Domain Services
8099
The following table illustrates a sample NSG you can configure for a virtual network with an Azure AD Domain Services managed domain. This rule allows inbound traffic over the required ports to ensure your managed domain stays patched, updated and can be monitored by Microsoft. The default 'DenyAll' rule applies to all other inbound traffic from the internet.

articles/active-directory/active-directory-coreapps-assign-user-azure-portal.md

Lines changed: 76 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@ title: Assign a user or group to an enterprise app in Azure Active Directory | M
33
description: How to select an enterprise app to assign a user or group to it in Azure Active Directory
44
services: active-directory
55
documentationcenter: ''
6-
author: curtand
7-
manager: femila
6+
author: daveba
7+
manager: mtillman
88
editor: ''
99

1010
ms.assetid: 5817ad48-d916-492b-a8d0-2ade8c50a224
@@ -13,22 +13,24 @@ ms.workload: identity
1313
ms.tgt_pltfrm: na
1414
ms.devlang: na
1515
ms.topic: article
16-
ms.date: 08/28/2017
17-
ms.author: curtand
16+
ms.date: 11/30/2017
17+
ms.author: daveba
1818

19-
ms.reviewer: asteen
19+
ms.reviewer: luleon
2020

2121
---
2222
# Assign a user or group to an enterprise app in Azure Active Directory
23-
It's easy to assign a user or a group to your enterprise applications in Azure Active Directory (Azure AD). You must have the appropriate permissions to manage the enterprise app, and you must be global admin for the directory.
23+
To assign a user or group to an enterprise app, you must have the appropriate permissions to manage the enterprise app, and you must be global admin for the directory.
24+
> [!NOTE]
25+
> For Microsoft Applications (such asOffice 365 apps), use PowerShell to assign users to an enterprise app.
2426
25-
## How do I assign user access to an enterprise app?
27+
## How do I assign user access to an enterprise app in the Azure portal?
2628
1. Sign in to the [Azure portal](https://portal.azure.com) with an account that's a global admin for the directory.
2729
2. Select **More services**, enter Azure Active Directory in the text box, and then select **Enter**.
2830
3. On the **Azure Active Directory - *directoryname*** blade (that is, the Azure AD blade for the directory you are managing), select **Enterprise applications**.
2931

3032
![Opening Enterprise apps](./media/active-directory-coreapps-assign-user-azure-portal/open-enterprise-apps.png)
31-
4. On the **Enterprise applications** blade, select **All applications**. You'll see a list of the apps you can manage.
33+
4. On the **Enterprise applications** blade, select **All applications**. This lists the apps you can manage.
3234
5. On the **Enterprise applications - All applications** blade, select an app.
3335
6. On the ***appname*** blade (that is, the blade with the name of the selected app in the title), select **Users & Groups**.
3436

@@ -39,7 +41,72 @@ It's easy to assign a user or a group to your enterprise applications in Azure A
3941
![Assign a user or group to the app](./media/active-directory-coreapps-assign-user-azure-portal/assign-users.png)
4042
9. On the **Users and groups** blade, select one or more users or groups from the list and then select the **Select** button at the bottom of the blade.
4143
10. On the **Add Assignment** blade, select **Role**. Then, on the **Select Role** blade, select a role to apply to the selected users or groups, and then select the **OK** button at the bottom of the blade.
42-
11. On the **Add Assignment** blade, select the **Assign** button at the bottom of the blade. The assigned users or groups will have the permissions defined by the selected role for this enterprise app.
44+
11. On the **Add Assignment** blade, select the **Assign** button at the bottom of the blade. The assigned users or groups have the permissions defined by the selected role for this enterprise app.
45+
46+
## How do I assign a user to an enterprise app using PowerShell?
47+
48+
1. Open an elevated Windows PowerShell command prompt.
49+
50+
>[!NOTE]
51+
> You need to install the AzureAD module (use the command `Install-Module -Name AzureAD`). If prompted to install a NuGet module or the new Azure Active Directory V2 PowerShell module, type Y and press ENTER.
52+
53+
2. Run `Connect-AzureAD` and sign in with a Global Admin user account.
54+
3. Use the following script to assign a user and role to an application:
55+
56+
```powershell
57+
# Assign the values to the variables
58+
$username = "<You user's UPN>"
59+
$app_name = "<Your App's display name>"
60+
$app_role_name = "<App role display name>"
61+
62+
# Get the user to assign, and the service principal for the app to assign to
63+
$user = Get-AzureADUser -ObjectId "$username"
64+
$sp = Get-AzureADServicePrincipal -Filter "displayName eq '$app_name'"
65+
$appRole = $sp.AppRoles | Where-Object { $_.DisplayName -eq $app_role_name }
66+
67+
# Assign the user to the app role
68+
New-AzureADUserAppRoleAssignment -ObjectId $user.ObjectId -PrincipalId $user.ObjectId -ResourceId $sp.ObjectId -Id $appRole.Id
69+
```
70+
71+
For more information about how to assign a user to an application role visit the documentation for [New-AzureADUserAppRoleAssignment](https://docs.microsoft.com/en-us/powershell/module/azuread/new-azureaduserapproleassignment?view=azureadps-2.0)
72+
73+
### Example
74+
75+
This example assigns the user Britta Simon to the [Microsoft Workplace Analytics](https://products.office.com/en-us/business/workplace-analytics) application using PowerShell.
76+
77+
1. In PowerShell, assign the corresponding values to the variables $username, $app_name and $app_role_name.
78+
79+
```powershell
80+
# Assign the values to the variables
81+
$username = "[email protected]"
82+
$app_name = "Workplace Analytics"
83+
```
84+
85+
2. In this example, we don't know what is the exact name of the application role we want to assign to Britta Simon. Run the following commands to get the user ($user) and the service principal ($sp) using the user UPN and the service principal display names.
86+
87+
```powershell
88+
# Get the user to assign, and the service principal for the app to assign to
89+
$user = Get-AzureADUser -ObjectId "$username"
90+
$sp = Get-AzureADServicePrincipal -Filter "displayName eq '$app_name'"
91+
```
92+
93+
3. Run the command `$sp.AppRoles` to display the roles available for the Workplace Analytics application. In this example, we want to assign Britta Simon the Analyst (Limited access) Role.
94+
95+
![Workplace Analytics Role](media/active-directory-coreapps-assign-user-azure-portal/workplace-analytics-role.png)
96+
97+
4. Assign the role name to the `$app_role_name` variable.
98+
99+
```powershell
100+
# Assign the values to the variables
101+
$app_role_name = "Analyst (Limited access)"
102+
```
103+
104+
5. Run the following command to assign the user to the app role:
105+
106+
```powershell
107+
# Assign the user to the app role
108+
New-AzureADUserAppRoleAssignment -ObjectId $user.ObjectId -PrincipalId $user.ObjectId -ResourceId $sp.ObjectId -Id $appRole.Id
109+
```
43110
44111
## Next steps
45112
* [See all of my groups](active-directory-groups-view-azure-portal.md)

articles/active-directory/active-directory-reporting-activity-sign-ins.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ This topic gives you an overview of the sign-in activities.
4949
With the information provided by the user sign-in report, you find answers to questions such as:
5050

5151
* What is the sign-in pattern of a user?
52-
* How many users have users signed in over a week?
52+
* How many users have signed in over a week?
5353
* What’s the status of these sign-ins?
5454

5555
Your first entry point to all sign-in activities data is **Sign-ins** in the Activity section of **Azure Active**.

0 commit comments

Comments
 (0)