Skip to content

Commit 14f948b

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into patricka-encryption-rest
2 parents 848dc75 + fdca4f8 commit 14f948b

19 files changed

+441
-368
lines changed

articles/active-directory/fundamentals/road-to-the-cloud-establish.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: martinco
77
ms.service: active-directory
88
ms.topic: how-to
99
ms.subservice: fundamentals
10-
ms.date: 06/14/2023
10+
ms.date: 07/27/2023
1111
ms.author: jricketts
1212
ms.custom: references_regions
1313
---

articles/active-directory/fundamentals/road-to-the-cloud-implement.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: martinco
77
ms.service: active-directory
88
ms.topic: how-to
99
ms.subservice: fundamentals
10-
ms.date: 06/03/2022
10+
ms.date: 07/27/2023
1111
ms.author: jricketts
1212
ms.custom: references_regions
1313
---
@@ -27,7 +27,7 @@ You can enrich user attributes in Azure AD to make more user attributes availabl
2727

2828
* App provisioning: The data source of app provisioning is Azure AD, and necessary user attributes must be in there.
2929

30-
* Application authorization: A token that Azure AD issues can include claims generated from user attributes so that applications can make authorization decisions based on the claims in the token.
30+
* Application authorization: A token that Azure AD issues can include claims generated from user attributes so that applications can make authorization decisions based on the claims in the token. It can also contain attributes coming from external data sources through a [custom claims provider](../develop/custom-claims-provider-overview.md).
3131

3232
* Group membership population and maintenance: Dynamic groups enable dynamic population of group membership based on user attributes, such as department information.
3333

@@ -37,7 +37,7 @@ These two links provide guidance on making schema changes:
3737

3838
* [Attributes synchronized by Azure AD Connect](../hybrid/reference-connect-sync-attributes-synchronized.md)
3939

40-
These links provide more information on this topic but are not specific to changing the schema:
40+
These links provide more information on this topic but aren't specific to changing the schema:
4141

4242
* [Use Azure AD schema extension attributes in claims - Microsoft identity platform](../develop/active-directory-schema-extensions.md)
4343

@@ -59,7 +59,7 @@ These links provide more information about groups:
5959

6060
* [Restrict guest access permissions in Azure Active Directory](../enterprise-users/users-restrict-guest-permissions.md)
6161

62-
You and your team might feel compelled to change your current employee provisioning to use cloud-only accounts at this stage. The effort is non-trivial but doesn't provide enough business value. We recommend that you plan this transition at a different phase of your transformation.
62+
You and your team might feel compelled to change your current employee provisioning to use cloud-only accounts at this stage. The effort is nontrivial but doesn't provide enough business value. We recommend that you plan this transition at a different phase of your transformation.
6363

6464
## Devices
6565

@@ -71,6 +71,8 @@ Client workstations are traditionally joined to Active Directory and managed via
7171

7272
[Windows Autopilot](/mem/autopilot/windows-autopilot) can help you establish a streamlined onboarding and device provisioning, which can enforce these directives.
7373

74+
[Windows Local Administrator Password Solution](../devices/howto-manage-local-admin-passwords.md) (LAPS) enables a cloud-first solution to manage the passwords of local administrator accounts.
75+
7476
For more information, see [Learn more about cloud-native endpoints](/mem/cloud-native-endpoints-overview).
7577

7678
## Applications

articles/active-directory/fundamentals/road-to-the-cloud-introduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: martinco
77
ms.service: active-directory
88
ms.topic: how-to
99
ms.subservice: fundamentals
10-
ms.date: 06/14/2023
10+
ms.date: 07/27/2023
1111
ms.author: jricketts
1212
ms.custom: references_regions
1313
---

articles/active-directory/fundamentals/road-to-the-cloud-migrate.md

Lines changed: 13 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: martinco
77
ms.service: active-directory
88
ms.topic: how-to
99
ms.subservice: fundamentals
10-
ms.date: 06/03/2022
10+
ms.date: 07/27/2023
1111
ms.author: jricketts
1212
ms.custom: references_regions
1313
---
@@ -53,7 +53,7 @@ To transform groups and distribution lists:
5353

5454
* For self-managed group capabilities provided by Microsoft Identity Manager, replace the capability with self-service group management.
5555

56-
* You can [convert distribution lists to Microsoft 365 groups](/microsoft-365/admin/manage/upgrade-distribution-lists) in Outlook. This is a great way to give your organization's distribution lists all the features and functionality of Microsoft 365 groups.
56+
* You can [convert distribution lists to Microsoft 365 groups](/microsoft-365/admin/manage/upgrade-distribution-lists) in Outlook. This approach is a great way to give your organization's distribution lists all the features and functionality of Microsoft 365 groups.
5757

5858
* Upgrade your [distribution lists to Microsoft 365 groups in Outlook](https://support.microsoft.com/office/7fb3d880-593b-4909-aafa-950dd50ce188) and [decommission your on-premises Exchange server](/exchange/decommission-on-premises-exchange).
5959

@@ -79,11 +79,15 @@ You can reduce your on-premises footprint by moving the HR provisioning workflow
7979

8080
Azure AD cloud HR provisioning can also manage Active Directory accounts for existing employees. For more information, see [Plan cloud HR application to Azure Active Directory user provisioning](../app-provisioning/plan-cloud-hr-provision.md) and [Plan the deployment project](../app-provisioning/plan-auto-user-provisioning.md).
8181

82+
### Move lifecycle workflows
83+
84+
Evaluate your existing joiner/mover/leaver workflows and processes for applicability and relevance to your Azure AD cloud environment. You can then simplify these workflows and [create new ones](../governance/create-lifecycle-workflow.md) using [lifecycle workflows](../governance/what-are-lifecycle-workflows.md).
85+
8286
### Move external identity management
8387

8488
If your organization provisions accounts in Active Directory or other on-premises directories for external identities such as vendors, contractors, or consultants, you can simplify your environment by managing those third-party user objects natively in the cloud. Here are some possibilities:
8589

86-
* For new external users, use [Azure AD External Identities](../external-identities/external-identities-overview.md), which will stop the Active Directory footprint of users.
90+
* For new external users, use [Azure AD External Identities](../external-identities/external-identities-overview.md), which stops the Active Directory footprint of users.
8791

8892
* For existing Active Directory accounts that you provision for external identities, you can remove the overhead of managing local credentials (for example, passwords) by configuring them for business-to-business (B2B) collaboration. Follow the steps in [Invite internal users to B2B collaboration](../external-identities/invite-internal-users.md).
8993

@@ -161,7 +165,7 @@ There are three main ways to categorize your apps:
161165

162166
* **Legacy apps**: These applications use legacy protocols such as Kerberos, LDAP, Radius, Remote Desktop, and NTLM (not recommended).
163167

164-
Azure AD can be used with each type of application to provide levels of functionality that will result in different migration strategies, complexity, and trade-offs. Some organizations have an application inventory that can be used as a discovery baseline. (It's common that this inventory isn't complete or updated.)
168+
Azure AD can be used with each type of application to provide levels of functionality that results in different migration strategies, complexity, and trade-offs. Some organizations have an application inventory that can be used as a discovery baseline. (It's common that this inventory isn't complete or updated.)
165169

166170
To discover modern authentication apps:
167171

@@ -217,13 +221,13 @@ Use the following table to determine what Azure-based tools you can use to repla
217221

218222
Here's more information that you can use for application server management:
219223

220-
* [Azure Arc](https://azure.microsoft.com/services/azure-arc/) enables Azure features for non-Azure VMs. For example, you can use it to get Azure features for Windows Server when it's used on-premises or on Amazon Web Services.
224+
* [Azure Arc](https://azure.microsoft.com/services/azure-arc/) enables Azure features for non-Azure VMs. For example, you can use it to get Azure features for Windows Server when it's used on-premises or on Amazon Web Services, or [authenticate to Linux machines with SSH](/azure/azure-arc/servers/ssh-arc-overview?tabs=azure-cli).
221225

222226
* [Manage and secure your Azure VM environment](https://azure.microsoft.com/services/virtual-machines/secure-well-managed-iaas/).
223227

224228
* If you must wait to migrate or perform a partial migration, you can use GPOs with [Azure AD DS](https://azure.microsoft.com/services/active-directory-ds/).
225229

226-
If you require management of application servers with Microsoft Configuration Manager, you can't achieve this by using Azure AD DS. Microsoft Configuration Manager isn't supported to run in an Azure AD DS environment. Instead, you'll need to extend your on-premises Active Directory instance to a domain controller running on an Azure VM. Or, you'll need to deploy a new Active Directory instance to an Azure IaaS virtual network.
230+
If you require management of application servers with Microsoft Configuration Manager, you can't achieve this requirement by using Azure AD DS. Microsoft Configuration Manager isn't supported to run in an Azure AD DS environment. Instead, you need to extend your on-premises Active Directory instance to a domain controller running on an Azure VM. Or, you need to deploy a new Active Directory instance to an Azure IaaS virtual network.
227231

228232
### Define the migration strategy for legacy applications
229233

@@ -241,7 +245,7 @@ To reduce or eliminate those dependencies, you have three main approaches.
241245

242246
In the most preferred approach, you undertake projects to migrate from legacy applications to SaaS alternatives that use modern authentication. Have the SaaS alternatives authenticate to Azure AD directly:
243247

244-
1. Deploy Azure AD DS into an Azure virtual network.
248+
1. Deploy Azure AD DS into an Azure virtual network and [extend the schema](/azure/active-directory-domain-services/concepts-custom-attributes) to incorporate additional attributes needed by the applications.
245249

246250
2. Lift and shift legacy apps to VMs on the Azure virtual network that are domain-joined to Azure AD DS.
247251

@@ -313,9 +317,9 @@ Here are key points about usage of Azure AD for VPN authentication:
313317

314318
### Move remote access to internal applications
315319

316-
To simplify your environment, you can use [Azure AD Application Proxy](../app-proxy/application-proxy.md) or [secure hybrid access](../manage-apps/secure-hybrid-access.md) partners to provide remote access. This will allow you to remove the dependency on on-premises reverse proxy solutions.
320+
To simplify your environment, you can use [Azure AD Application Proxy](../app-proxy/application-proxy.md) or [secure hybrid access](../manage-apps/secure-hybrid-access.md) partners to provide remote access. This allows you to remove the dependency on on-premises reverse proxy solutions.
317321

318-
It's important to mention that enabling remote access to an application by using the preceding technologies is an interim step. You'll need to do more work to completely decouple the application from Active Directory.
322+
It's important to mention that enabling remote access to an application by using the preceding technologies is an interim step. You need to do more work to completely decouple the application from Active Directory.
319323

320324
Azure AD DS allows you to migrate application servers to the cloud IaaS and decouple from Active Directory, while using Azure AD Application Proxy to enable remote access. To learn more about this scenario, check [Deploy Azure AD Application Proxy for Azure Active Directory Domain Services](../../active-directory-domain-services/deploy-azure-app-proxy.md).
321325

articles/active-directory/fundamentals/road-to-the-cloud-posture.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: martinco
77
ms.service: active-directory
88
ms.topic: how-to
99
ms.subservice: fundamentals
10-
ms.date: 06/14/2023
10+
ms.date: 07/27/2023
1111
ms.author: jricketts
1212
ms.custom: references_regions
1313
---

0 commit comments

Comments
 (0)